Patents Examined by Madhuri Herzog
  • Patent number: 8218760
    Abstract: Method and device for generating factors of a RSA modulus N with a predetermined portion Nh, the RSA modulus comprising at least two factors. A first prime p is generated; a value Nh that forms a part of modulus N is obtained; a second prime q is generated in an interval dependent from p and Nh so that pq is a RSA modulus that shares Nh; and information enabling the calculation of the modulus/V is outputted.
    Type: Grant
    Filed: February 19, 2008
    Date of Patent: July 10, 2012
    Assignee: Thomson Licensing
    Inventor: Marc Joye
  • Patent number: 8214897
    Abstract: Methods of detecting, and providing a notification of, the existence of misinformation using usage patterns of a network service enable an organization to respond to the misinformation. The method includes establishing common usage patterns of the network service, identifying an irregular usage pattern, determining that the irregular usage pattern was caused by misinformation, and responding to the misinformation.
    Type: Grant
    Filed: August 14, 2008
    Date of Patent: July 3, 2012
    Assignee: International Business Machines Corporation
    Inventors: Peter Kenneth Malkin, Thomas David Erickson, Brent Tzion Hailpern, Wendy Anne Kellogg
  • Patent number: 8199834
    Abstract: System and method of providing improved signal compression using frame decimation through frame simplification and generating an encoded bitstream of video frames therefrom are disclosed. The encoding method comprises zeroing a difference frame generated by an encoder by using a feedback loop that injects a reconstructed frame, generated by the encoder of the difference frame, as a next frame of the video frames to be processed by the encoder. The encoding system comprises an input configured to provide a stream of video frames; a first process configured to generate a difference frame, and a second process configured to generate a reconstructed frame. A feedback loop of the system is configured to inject a generated reconstructed frame from the second process of a generated difference frame from the first process as a next frame of the video frames in the stream to be processed into the encoded bitstream by the encoding system.
    Type: Grant
    Filed: December 20, 2006
    Date of Patent: June 12, 2012
    Assignee: University of Dayton
    Inventors: Frank Scarpino, Eric Balster, Thaddeus Marrara
  • Patent number: 8189688
    Abstract: An image decoding device includes an error detecting unit that detects a decoding error in each unit area in one frame of an image; an error compensating determining unit that determines an error compensating area for which error compensation should be performed for the decoding error; and an error compensating unit that performs error compensation to the error compensating area. The error compensating area determining unit determines a unit area where the decoding error occurs, and a predetermined area adjacent to the unit area, as the error compensating area.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: May 29, 2012
    Assignee: Panasonic Corporation
    Inventors: Hiroto Tomita, Takashi Hashimoto
  • Patent number: 8181252
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: May 15, 2012
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Steven E Noel, Eric B Robertson
  • Patent number: 8175149
    Abstract: Provided is a method and apparatus for controlling a bit-rates in which an amount of generated bits is adjusted according to the complexity of each frame, and a bit-rate within a frame can be further effectively adjusted by applying different quantization parameter (QP) values to respective macro blocks. In the apparatus for controlling a bit-rate, a motion compensated temporal filtering (MCTP) operation is performed for each group of pictures (GOP) in an input scalable layer, and thereafter bits are allocated to respective frames in consideration of frame type and frame complexity. Furthermore, a QP is adaptively determined in the unit of a macro block on the basis of the allocated bits.
    Type: Grant
    Filed: November 21, 2006
    Date of Patent: May 8, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Dong-San Jun, Jae Gon Kim, Jin Woo Hong, Jong-Ki Han, Nae-ri Park
  • Patent number: 8176548
    Abstract: A protection system for a display apparatus and a method thereof are provided. The protection system includes an electronic key and a protection module. The protection system performs security identification with a plurality of passwords and updates the passwords every time after the security identification is completed to improve the security of the display apparatus. The display apparatus is allowed to be turned on when one of the passwords is correct, and the passwords are separately updated after the security identification is completed. The protection system is highly secure and provides greater convenience to users.
    Type: Grant
    Filed: August 6, 2007
    Date of Patent: May 8, 2012
    Assignee: Coretronic Corporation
    Inventors: Chao-Wang Wu, Lien-Fu Cheng
  • Patent number: 8166518
    Abstract: A computer implemented method provides remote access to a plurality of sessions at a computer. The method includes initiating a master process in a context independent from the sessions, establishing a first slave process in a context of a first session, and maintaining communication between the master process and the first slave process. The master process provides access to the computer's display while the display is under control of the first session, detects a second session, having a respective second slave process, communicates with the second slave process, and provides access to the computer's display while the display is under control of the second user session.
    Type: Grant
    Filed: November 15, 2006
    Date of Patent: April 24, 2012
    Assignee: Netopia, Inc.
    Inventors: Michael Byron Price, Marc A. Epard, Donald W. Griffin
  • Patent number: 8161558
    Abstract: Method and arrangements are provided for use in managing a network having one more user computing entities and one or more administrative computing entities. One method includes monitoring network traffic from a user computing entity; detecting a client request sent from the user computing entity, and scanning the user computing entity for vulnerabilities.
    Type: Grant
    Filed: April 25, 2006
    Date of Patent: April 17, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Richard James Smith
  • Patent number: 8156559
    Abstract: To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: April 10, 2012
    Assignee: Microsoft Corporation
    Inventors: Shuo Chen, Jose Meseguer, Ralf Sasse, Jiahe Helen Wang, Yi-Min Wang
  • Patent number: 8151324
    Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: April 3, 2012
    Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
  • Patent number: 8145905
    Abstract: Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.
    Type: Grant
    Filed: May 1, 2008
    Date of Patent: March 27, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Ravindra Patwardhan, Fatih Ulupinar, Jun Wang, Lakshminath Reddy Dondeti, Parag Arun Agashe, Peerapol Tinnakornsrisuphap, Raymond Tah-Sheng Hsu, Vidya Narayanan
  • Patent number: 8141125
    Abstract: Policies can combine the efficiency of rule sets with the flexible expression power of workflow engines, as well as advantages of other programming languages and engines. Consistent modelling of policy rules is provided across different levels, such as network, control, and service levels. In one system, a policy module can orchestrate rule set and workflow engines in order to evaluate different conditions of a policy. In another embodiment, a hybrid language can be used that allows rule set and other variables to be used in a business process container, workflow and other variables to be used in a rule set container, rule set and business process variables to be used in other containers. In this way, a subset of conditions in a policy can be evaluated using multiple languages and/or engines in order to enforce or evaluate a policy.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: March 20, 2012
    Assignee: Oracle International Corporation
    Inventor: Stephane H. Maes
  • Patent number: 8141148
    Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.
    Type: Grant
    Filed: October 17, 2006
    Date of Patent: March 20, 2012
    Assignee: ThreatMETRIX Pty Ltd
    Inventors: Scott Thomas, David G. Jones
  • Patent number: 8117652
    Abstract: Digits are randomly distributed into any number of a first group of sets. A type and frequency of a user input action, such as clicking a computer mouse, is associated with each set. Next, all the digits from each set are randomly distributed into a second group of sets. Each of the second group of sets may contain at most a single digit from one of the first group of sets, but may contain any number of digits total. A user input action, is also associated with each set in the second group. To input a particular digit in the password, the user selects one set of the first group of sets that contains the correct digit and selects one set of the second group of sets that also contains the same digit. Selection may occur by mouse clicking, key pressing or touching a screen. Once all digits of the password have been selected in this manner, the software determines the correct digits of the password by comparing the user selections for each digit in the password.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: February 14, 2012
    Assignee: Trend Micro, Inc.
    Inventor: Chien-Chih Lu
  • Patent number: 8095791
    Abstract: A distributed storage system implements high-speed data reconstitution processing while ensuring a high security level. Devices (63) in a device group (51) with security level “low” distributedly store fragmented data. When a process requesting device (60) belonging to a device group (50) with security level “high” instructs devices (62) belonging to the same group to reconstitute the data, the devices (62) collect and reconstitute part of the fragmented and stored data. After that, the process requesting device (60) collects the data partially reconstituted by the devices (62) and completely reconstitutes the data.
    Type: Grant
    Filed: October 18, 2006
    Date of Patent: January 10, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Takeshi Suwabe
  • Patent number: 8042184
    Abstract: A system, method and computer program product for anti-malware processing of data stream that includes a plurality of logical data streams formed from a primary data stream; and a plurality of stream buffers, each buffering data of a corresponding logical data stream. A plurality of processing handlers each associated with one of the data streams, where the handlers are processing the data of the logical data stream buffered by its stream buffer. Each processing handler is associated with a particular functionality and at least one processing handler scans its logical data stream for malware presence. Each stream buffer has a configurable buffering policy. At least one of the processing handlers decompresses the data into one or more secondary streams. At least one of the processing handlers parses its logical data stream, creating one or more instances of secondary data streams. The scanning can be based on a signature search.
    Type: Grant
    Filed: October 18, 2006
    Date of Patent: October 18, 2011
    Assignee: Kaspersky Lab, ZAO
    Inventor: Vyacheslav A. Batenin
  • Patent number: 8020004
    Abstract: Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: September 13, 2011
    Assignee: Verance Corporation
    Inventor: Joseph M. Winograd
  • Patent number: 8001596
    Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
    Type: Grant
    Filed: May 3, 2007
    Date of Patent: August 16, 2011
    Assignee: Microsoft Corporation
    Inventors: Matthias Wollnik, Nir Ben Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
  • Patent number: 8001593
    Abstract: A user authentication method for an electronic apparatus makes a user authentication based on received first user identification information and registered user identification information and sets the electronic apparatus in an authenticated state if the received first user identification information matches the registered user identification information, and controls the authenticated state after the user authentication based on received second user identification, by continuing the authenticated state if the received second user identification information matches the registered user identification information.
    Type: Grant
    Filed: April 28, 2006
    Date of Patent: August 16, 2011
    Assignee: Ricoh Company, Ltd.
    Inventor: Takahiko Uno