Patents Examined by Matthew B. Smithers
  • Patent number: 7978852
    Abstract: A method of partially scrambling a data stream (6) including transport stream packets (7), each transport stream packet (7) having a header (8) and a payload (9), wherein a sequence of transport stream packets (7) has payloads carrying encoded data elements, arranged in units (15), includes: selecting transport stream packets (7) forming a subsequence of the sequence, and scrambling at least part of the payloads (9) of each transport stream packet (7) in the subsequence. The method further includes monitoring the payloads (9) of at least some of the transport stream packets (7) in the sequence for the presence of data (22) indicating a boundary between two subsequent units (15), and, for selected units (15), including at least one of the transport stream packets (7) carrying data forming part of the selected unit (15) in the sub-sequence.
    Type: Grant
    Filed: July 26, 2004
    Date of Patent: July 12, 2011
    Assignee: Irdeto Access B.V.
    Inventors: Andrew Augustine Wajs, Gerard Johan Dekker, David Neil Siedle, Roelof Van Wijk, Ronaldus Petrus Johannes Hoogenboom, James Stewart Crosbie Palmer, Thomas Franz Stockhammer
  • Patent number: 7979708
    Abstract: A digital rights management is provided. In the digital rights management method and contents service method, a user terminal of the digital contents encodes the digital contents based on specific information of the terminal. When using the digital contents encoded based on the identification of the terminal, the digital contents are decoded using the identification of the corresponding terminal. A billing is performed with respect to the use of the digital contents encoded or decoded based on the identification of the terminal.
    Type: Grant
    Filed: December 27, 2005
    Date of Patent: July 12, 2011
    Assignee: LG Electronics Inc.
    Inventor: Kwang Cheol Park
  • Patent number: 7975301
    Abstract: A SPAM detection system is provided. The system includes a graph clustering component to analyze web data. A link analysis component can be associated with the graph clustering component to facilitate SPAM detection in accordance with the web data.
    Type: Grant
    Filed: September 30, 2007
    Date of Patent: July 5, 2011
    Assignee: Microsoft Corporation
    Inventors: Jennifer T. Chayes, Christian H. Borgs, Krishna Chaitanya Gade, John E. Hopcroft, Seyed Vahab Mirrokni, Amit Prakash, Tao Tao
  • Patent number: 7974406
    Abstract: A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets.
    Type: Grant
    Filed: November 29, 2007
    Date of Patent: July 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Chris P Vanden Berghe, Tadeusz J Pietraszek, Jan Leonhard Camenisch, Dieter Sommer
  • Patent number: 7974407
    Abstract: A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets.
    Type: Grant
    Filed: March 26, 2008
    Date of Patent: July 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Chris P Vanden Berghe, Tadeusz J Pietraszek, Jan Leonhard Camenisch, Dieter Sommer
  • Patent number: 7975151
    Abstract: An ASIC or ASSP has processor circuitry (110), a predetermined initialization program (100) for execution by the processor circuitry at power up, and a non-volatile key table (120) readable by the initialization program, and not accessible otherwise by the processor circuitry. The initialization program reads a key index associated with encrypted data, from external memory, and uses the key index to read a corresponding key from the table, to decrypt the encrypted data for use by the processor circuitry. Optionally another key is first decrypted and used for the decryption of the encrypted data. By keeping the key on board the chip and restricting access in this way, the key and therefore the encrypted data can be protected from software based reverse engineering. This means the encrypted data can cheaper memory chips or other storage. Thus the processor circuitry can be formed on a smaller integrated circuit.
    Type: Grant
    Filed: October 24, 2006
    Date of Patent: July 5, 2011
    Assignee: ON Semiconductor Trading Ltd.
    Inventor: Ivo Leonardus Coenen
  • Patent number: 7975303
    Abstract: A scanning optimization manager scans files for malicious code. The scanning optimization manager creates listings of the portions of scanned files accessed during the scanning. The scanning optimization manager proceeds to utilize these listings of accessed portions of files as I/O hints to optimize subsequent scans of the files for malicious code.
    Type: Grant
    Filed: June 27, 2005
    Date of Patent: July 5, 2011
    Assignee: Symantec Corporation
    Inventor: John Millard
  • Patent number: 7975304
    Abstract: In one embodiment, a portable storage device includes a removable device interface and a non-volatile memory having a read-only partition and a regular storage partition. The read-only partition may include a protection program for scanning data in the regular storage partition for viruses. Upon connection of the portable storage device into a computer, the protection program may be read from the read-only partition for loading and running in the main memory of the computer. The protection program may be configured to stop running in the main memory upon removal of the portable storage device from the computer. The device interface may comprise the Universal Serial Bus (USB) interface, for example.
    Type: Grant
    Filed: April 28, 2006
    Date of Patent: July 5, 2011
    Assignee: Trend Micro Incorporated
    Inventor: Chien-Chih Lu
  • Patent number: 7971262
    Abstract: Methods and software products are disclosed for protecting against software piracy. When a customer purchases software, the seller performs an activation process by identifying a unique computer identifier (ID) for the computer system of the customer, and activating the software based on the computer ID, such as by encoding the computer ID on the media storing the software. When the customer attempts to install the software on a computer system, the computer system executes an installation process. The computer system identifies its own computer ID and the computer ID used to activate the software. The computer system determines if its computer ID corresponds with the computer ID used to activate the software. If the computer IDs correspond, then the computer system is allowed to install the software. If not, the computer system is prevented from installing the software.
    Type: Grant
    Filed: July 23, 2004
    Date of Patent: June 28, 2011
    Assignee: Alcatel-Lucent USA Inc.
    Inventors: Dinesh K. Jindal, Venkateshwar Nandam
  • Patent number: 7971259
    Abstract: A device and a method for establishing a trusted path between a user interface and a software application to securely execute the software stored in a memory along the trusted path and offer the user's desired service are provided. Accordingly, the trusted path is established so that attackers can not invade a normal path between the user interface and software. Additionally, the device securely executes the original software which is not fabricated so that the user can receive desired services from the device.
    Type: Grant
    Filed: August 21, 2006
    Date of Patent: June 28, 2011
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Tymur Korkishko, Kyung-hee Lee
  • Patent number: 7971261
    Abstract: In accordance with the domain management for digital media, a device accesses a domain administrator in order to obtain a domain membership license. The domain membership license indicates that the device is part of a domain that includes multiple devices associated with a user of the device. The device also obtains multiple pieces of protected content from multiple content providers, with two or more of the multiple content providers employing different digital rights management systems. The device also accesses a license server to obtain, for each piece of protected content, a content license that is bound to the domain. The content license permits the device to play back the piece of content to the user.
    Type: Grant
    Filed: June 12, 2007
    Date of Patent: June 28, 2011
    Assignee: Microsoft Corporation
    Inventor: Florian Pestoni
  • Patent number: 7971258
    Abstract: A method for detecting malware in a computer that employs a production operating system during normal use is provided. The method includes activating on the computer a first operating system while the production operating system is dormant and ascertaining at least a portion of the production operating system that would be involved in booting up the computer if the production operating system had been activated instead. The method further includes scanning, while the first operating system is activated and while the production operating system is dormant, the portion of the production operating system. The method further includes neutralizing, while the first operating system is activated and while the production operating system is dormant, the malware responsive to the scanning.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: June 28, 2011
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Richard Hsu, Franson Fang, Zhihe Zhang, Flanker Lu, Serend Lin
  • Patent number: 7962747
    Abstract: An information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner. A reception control unit receives a random challenge (RC) from a transmission terminal and supplies it to a generation unit. The reception control unit transmits an RC reception message indicating an RC reception to a transmission side. The generation unit executes a Hash process relative to RC and supplies resultant authentication data to a generation unit. A transmission control unit controls the generation unit at a timing before a response request command from the transmission side is received, to make the generation unit generate a response message containing authentication data corresponding to the response request command, and when the response request command is received, transmits the response message to a transmission destination terminal. The apparatus is applicable to a content providing system.
    Type: Grant
    Filed: January 20, 2006
    Date of Patent: June 14, 2011
    Assignee: Sony Corporation
    Inventors: Takehiko Nakano, Hisato Shima
  • Patent number: 7961882
    Abstract: Methods and apparatus are provided for using explicit initialization vectors in both encryption and decryption processing. In one example, a sender generates an initialization vector, identifies cryptographic keys, encrypts data using the initialization vectors and the cryptographic keys, and transmits the encrypted data in a packet along with the initialization vector. A receiver identifies cryptographic keys, extracts the initialization vector from the received packet, and decrypts the encrypted data using the cryptographic keys and the initialization vector extracted from the received packet.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: June 14, 2011
    Assignee: Broadcom Corporation
    Inventors: David Chin, Mark Buer, Roger Luo
  • Patent number: 7961885
    Abstract: In one embodiment, a system comprises JTAG functionality that implements at least a portion of a JTAG protocol. The JTAG functionality supports a test data in (TDI) line, a test data out (TDO) line, a test rest (TR) line, a test mode state (TMS) line, and a test clock (TCLK) line. The system further comprises a debug interface to communicatively couple the system to a debug device external to the system. The debug interface comprises a transmit (TX) line, receive (RX) line, and a clock (CLK) line. The system transmits data output by the JTAG functionality on the TDI input on the RX line of the debug interface and receives data from the debug device on the TX line of the debug interface and provides the received data to the JTAG functionality on the TDO line, TR line and the TMS line.
    Type: Grant
    Filed: November 4, 2005
    Date of Patent: June 14, 2011
    Assignee: Honeywell International Inc.
    Inventors: Edwin D. Cruzado, William J. Dalzell, Brian R. Bernier
  • Patent number: 7958557
    Abstract: In certain embodiments, a method for tagging communications from a user system, such that a source of a malicious computer element in a computer network may be determined, includes determining tag information for a user system in the computer network, the tag information physically identifying the user system. The method further includes detecting an attempt to send a communication from the user system and, in response to detecting the attempt to send a communication from the user system, attaching the tag information to the communication prior to sending the communication from the user system. The attachment of the tag information to the communication allows the source of the communication to be determined in response to determining that the communication is associated with a malicious computer element, the source comprising the user system.
    Type: Grant
    Filed: May 17, 2006
    Date of Patent: June 7, 2011
    Assignee: Computer Associates Think, Inc.
    Inventor: Anthony Chiu-Chi Kwan
  • Patent number: 7957535
    Abstract: A method for performing a high-speed search for a content key associated with encrypted content for a key-separation-type content management method where content keys and pieces of encrypted content are correlated by ID information and stored in different recording media. An external recording medium stores content files including: pieces of encrypted content that are encrypted with different encryption keys; and content IDs, each associated with a corresponding piece of encryption content, and a semiconductor recording medium stores a list including: encryption key storage location information, each indicating where a corresponding encryption key is stored; and content IDs, the list sorted in accordance with the content IDs. When encrypted content is played back, the list is searched to find encryption key storage location information associated with content ID that matches the content ID of the encrypted content, and the encryption key is read based on the encryption key storage location information.
    Type: Grant
    Filed: January 18, 2006
    Date of Patent: June 7, 2011
    Assignee: Panasonic Corporation
    Inventors: Makoto Ochi, Kazuya Fujimura, Shinji Inoue
  • Patent number: 7958375
    Abstract: A recording medium, apparatus for decrypting data and method thereof are disclosed. The present invention includes downloading encrypted data associated with a recording medium to a local storage, decrypting data recorded in the recording medium using a first type key within a key file stored in the recording medium and decrypting the downloaded data using a second type key within one of the key file stored in the recording medium or a key file stored in the local storage. And, the present invention includes downloading the data encrypted with a key associated with a recording medium to a local storage, reading out a decryption key using link information between the data and the key, and decrypting the data using the decryption key. Accordingly, by the present invention, unauthorized copy, redistribution and the like of contents can be prevented. Hence contents can be safely provided and data can be efficiently reproduced, whereby more convenient functions can be provided to a user.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: June 7, 2011
    Assignee: LG Electronics Inc.
    Inventor: Kang Soo Seo
  • Patent number: 7954141
    Abstract: A system and method for authenticating a subscriber of a first network to access application services through a second network, wherein the second network is a packet data network.
    Type: Grant
    Filed: September 30, 2005
    Date of Patent: May 31, 2011
    Assignee: Telecom Italia S.p.A.
    Inventors: Paolo De Lutiis, Gaetano Di Caprio, Corrado Moiso
  • Patent number: 7953973
    Abstract: Methods, systems, and computer program products for passively routing secure socket layer (SSL) encoded network traffic are disclosed. According to one aspect, a method includes passively receiving a copy of SSL encoded network traffic. Further, the method includes passively parsing the received network traffic and generating an identical copy of the network traffic such that the network traffic is not decrypted and without interfering with the network traffic. A target output network device can be selected for transmission of the identical copy of the network traffic. The identical copy of the network traffic can be transmitted from the selected target output network device.
    Type: Grant
    Filed: January 19, 2007
    Date of Patent: May 31, 2011
    Assignee: Radware Ltd.
    Inventors: James Frederick Beam, Byron Lee Hargett, Douglas Wayne Hester, Ricky G. Millham, Jennifer Justina Short, Garth Douglas Somerville, Jason Moore Walker, Virgil Montgomery Wall, Robert Edward Ward