Patents Examined by Madhuri Herzog
-
Patent number: 8218760Abstract: Method and device for generating factors of a RSA modulus N with a predetermined portion Nh, the RSA modulus comprising at least two factors. A first prime p is generated; a value Nh that forms a part of modulus N is obtained; a second prime q is generated in an interval dependent from p and Nh so that pq is a RSA modulus that shares Nh; and information enabling the calculation of the modulus/V is outputted.Type: GrantFiled: February 19, 2008Date of Patent: July 10, 2012Assignee: Thomson LicensingInventor: Marc Joye
-
Patent number: 8214897Abstract: Methods of detecting, and providing a notification of, the existence of misinformation using usage patterns of a network service enable an organization to respond to the misinformation. The method includes establishing common usage patterns of the network service, identifying an irregular usage pattern, determining that the irregular usage pattern was caused by misinformation, and responding to the misinformation.Type: GrantFiled: August 14, 2008Date of Patent: July 3, 2012Assignee: International Business Machines CorporationInventors: Peter Kenneth Malkin, Thomas David Erickson, Brent Tzion Hailpern, Wendy Anne Kellogg
-
Patent number: 8199834Abstract: System and method of providing improved signal compression using frame decimation through frame simplification and generating an encoded bitstream of video frames therefrom are disclosed. The encoding method comprises zeroing a difference frame generated by an encoder by using a feedback loop that injects a reconstructed frame, generated by the encoder of the difference frame, as a next frame of the video frames to be processed by the encoder. The encoding system comprises an input configured to provide a stream of video frames; a first process configured to generate a difference frame, and a second process configured to generate a reconstructed frame. A feedback loop of the system is configured to inject a generated reconstructed frame from the second process of a generated difference frame from the first process as a next frame of the video frames in the stream to be processed into the encoded bitstream by the encoding system.Type: GrantFiled: December 20, 2006Date of Patent: June 12, 2012Assignee: University of DaytonInventors: Frank Scarpino, Eric Balster, Thaddeus Marrara
-
Patent number: 8189688Abstract: An image decoding device includes an error detecting unit that detects a decoding error in each unit area in one frame of an image; an error compensating determining unit that determines an error compensating area for which error compensation should be performed for the decoding error; and an error compensating unit that performs error compensation to the error compensating area. The error compensating area determining unit determines a unit area where the decoding error occurs, and a predetermined area adjacent to the unit area, as the error compensating area.Type: GrantFiled: December 1, 2006Date of Patent: May 29, 2012Assignee: Panasonic CorporationInventors: Hiroto Tomita, Takashi Hashimoto
-
Patent number: 8181252Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.Type: GrantFiled: April 12, 2010Date of Patent: May 15, 2012Assignee: George Mason Intellectual Properties, Inc.Inventors: Sushil Jajodia, Steven E Noel, Eric B Robertson
-
Patent number: 8175149Abstract: Provided is a method and apparatus for controlling a bit-rates in which an amount of generated bits is adjusted according to the complexity of each frame, and a bit-rate within a frame can be further effectively adjusted by applying different quantization parameter (QP) values to respective macro blocks. In the apparatus for controlling a bit-rate, a motion compensated temporal filtering (MCTP) operation is performed for each group of pictures (GOP) in an input scalable layer, and thereafter bits are allocated to respective frames in consideration of frame type and frame complexity. Furthermore, a QP is adaptively determined in the unit of a macro block on the basis of the allocated bits.Type: GrantFiled: November 21, 2006Date of Patent: May 8, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Dong-San Jun, Jae Gon Kim, Jin Woo Hong, Jong-Ki Han, Nae-ri Park
-
Patent number: 8176548Abstract: A protection system for a display apparatus and a method thereof are provided. The protection system includes an electronic key and a protection module. The protection system performs security identification with a plurality of passwords and updates the passwords every time after the security identification is completed to improve the security of the display apparatus. The display apparatus is allowed to be turned on when one of the passwords is correct, and the passwords are separately updated after the security identification is completed. The protection system is highly secure and provides greater convenience to users.Type: GrantFiled: August 6, 2007Date of Patent: May 8, 2012Assignee: Coretronic CorporationInventors: Chao-Wang Wu, Lien-Fu Cheng
-
Patent number: 8166518Abstract: A computer implemented method provides remote access to a plurality of sessions at a computer. The method includes initiating a master process in a context independent from the sessions, establishing a first slave process in a context of a first session, and maintaining communication between the master process and the first slave process. The master process provides access to the computer's display while the display is under control of the first session, detects a second session, having a respective second slave process, communicates with the second slave process, and provides access to the computer's display while the display is under control of the second user session.Type: GrantFiled: November 15, 2006Date of Patent: April 24, 2012Assignee: Netopia, Inc.Inventors: Michael Byron Price, Marc A. Epard, Donald W. Griffin
-
Patent number: 8161558Abstract: Method and arrangements are provided for use in managing a network having one more user computing entities and one or more administrative computing entities. One method includes monitoring network traffic from a user computing entity; detecting a client request sent from the user computing entity, and scanning the user computing entity for vulnerabilities.Type: GrantFiled: April 25, 2006Date of Patent: April 17, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventor: Richard James Smith
-
Patent number: 8156559Abstract: To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.Type: GrantFiled: November 30, 2006Date of Patent: April 10, 2012Assignee: Microsoft CorporationInventors: Shuo Chen, Jose Meseguer, Ralf Sasse, Jiahe Helen Wang, Yi-Min Wang
-
Patent number: 8151324Abstract: An accessor function interfaces among a client, a relying party, and an identity provider. The identity provider can “manage” personal (i.e., self-asserted) information cards on behalf of a user, making the personal information cards available on clients on which the personal information cards are not installed. The client can be an untrusted client, vulnerable to attacks such as key logging, screen capture, and memory interrogation. The accessor function can also asked as a proxy for the relying party in terms of invoking and using the information cards system, for use with legacy relying parties.Type: GrantFiled: April 29, 2008Date of Patent: April 3, 2012Inventors: Lloyd Leon Burch, Daniel S. Sanders, Andrew A. Hodgkinson, Stephen R. Carter
-
Patent number: 8145905Abstract: Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.Type: GrantFiled: May 1, 2008Date of Patent: March 27, 2012Assignee: QUALCOMM IncorporatedInventors: Ravindra Patwardhan, Fatih Ulupinar, Jun Wang, Lakshminath Reddy Dondeti, Parag Arun Agashe, Peerapol Tinnakornsrisuphap, Raymond Tah-Sheng Hsu, Vidya Narayanan
-
Patent number: 8141125Abstract: Policies can combine the efficiency of rule sets with the flexible expression power of workflow engines, as well as advantages of other programming languages and engines. Consistent modelling of policy rules is provided across different levels, such as network, control, and service levels. In one system, a policy module can orchestrate rule set and workflow engines in order to evaluate different conditions of a policy. In another embodiment, a hybrid language can be used that allows rule set and other variables to be used in a business process container, workflow and other variables to be used in a rule set container, rule set and business process variables to be used in other containers. In this way, a subset of conditions in a policy can be evaluated using multiple languages and/or engines in order to enforce or evaluate a policy.Type: GrantFiled: November 30, 2006Date of Patent: March 20, 2012Assignee: Oracle International CorporationInventor: Stephane H. Maes
-
Patent number: 8141148Abstract: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.Type: GrantFiled: October 17, 2006Date of Patent: March 20, 2012Assignee: ThreatMETRIX Pty LtdInventors: Scott Thomas, David G. Jones
-
Patent number: 8117652Abstract: Digits are randomly distributed into any number of a first group of sets. A type and frequency of a user input action, such as clicking a computer mouse, is associated with each set. Next, all the digits from each set are randomly distributed into a second group of sets. Each of the second group of sets may contain at most a single digit from one of the first group of sets, but may contain any number of digits total. A user input action, is also associated with each set in the second group. To input a particular digit in the password, the user selects one set of the first group of sets that contains the correct digit and selects one set of the second group of sets that also contains the same digit. Selection may occur by mouse clicking, key pressing or touching a screen. Once all digits of the password have been selected in this manner, the software determines the correct digits of the password by comparing the user selections for each digit in the password.Type: GrantFiled: April 30, 2008Date of Patent: February 14, 2012Assignee: Trend Micro, Inc.Inventor: Chien-Chih Lu
-
Patent number: 8095791Abstract: A distributed storage system implements high-speed data reconstitution processing while ensuring a high security level. Devices (63) in a device group (51) with security level “low” distributedly store fragmented data. When a process requesting device (60) belonging to a device group (50) with security level “high” instructs devices (62) belonging to the same group to reconstitute the data, the devices (62) collect and reconstitute part of the fragmented and stored data. After that, the process requesting device (60) collects the data partially reconstituted by the devices (62) and completely reconstitutes the data.Type: GrantFiled: October 18, 2006Date of Patent: January 10, 2012Assignee: Canon Kabushiki KaishaInventor: Takeshi Suwabe
-
Patent number: 8042184Abstract: A system, method and computer program product for anti-malware processing of data stream that includes a plurality of logical data streams formed from a primary data stream; and a plurality of stream buffers, each buffering data of a corresponding logical data stream. A plurality of processing handlers each associated with one of the data streams, where the handlers are processing the data of the logical data stream buffered by its stream buffer. Each processing handler is associated with a particular functionality and at least one processing handler scans its logical data stream for malware presence. Each stream buffer has a configurable buffering policy. At least one of the processing handlers decompresses the data into one or more secondary streams. At least one of the processing handlers parses its logical data stream, creating one or more instances of secondary data streams. The scanning can be based on a signature search.Type: GrantFiled: October 18, 2006Date of Patent: October 18, 2011Assignee: Kaspersky Lab, ZAOInventor: Vyacheslav A. Batenin
-
Patent number: 8020004Abstract: Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages.Type: GrantFiled: June 30, 2006Date of Patent: September 13, 2011Assignee: Verance CorporationInventor: Joseph M. Winograd
-
Patent number: 8001596Abstract: A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.Type: GrantFiled: May 3, 2007Date of Patent: August 16, 2011Assignee: Microsoft CorporationInventors: Matthias Wollnik, Nir Ben Zvi, Hakki Tunc Bostanci, John Richard McDowell, Aaron Goldsmid
-
Patent number: 8001593Abstract: A user authentication method for an electronic apparatus makes a user authentication based on received first user identification information and registered user identification information and sets the electronic apparatus in an authenticated state if the received first user identification information matches the registered user identification information, and controls the authenticated state after the user authentication based on received second user identification, by continuing the authenticated state if the received second user identification information matches the registered user identification information.Type: GrantFiled: April 28, 2006Date of Patent: August 16, 2011Assignee: Ricoh Company, Ltd.Inventor: Takahiko Uno