Patents Examined by Maung Lwin
-
Patent number: 8880871Abstract: Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key space and the resultant hash codes that can generated. Transformation data can be inserted into the key in various ways, which can result in a greater degree of variance in the resultant hash code calculated based upon the transformed key.Type: GrantFiled: September 27, 2012Date of Patent: November 4, 2014Assignee: Broadcom CorporationInventors: Brad Matthews, Bruce Kwan, Puneet Agarwal
-
Patent number: 8880653Abstract: A remote computing device associated with a remote apparatus obtains information related to the apparatus, and generates a file containing the information. The file is uploaded to a file transfer server. An apparatus management and computing system monitors the file transfer server and identifies newly generated and uploaded files. The files are downloaded and parsed to extract the information related to the remote apparatus. The parsed information is stored in a database and made available to a user through a monitor application. The system may be configured for the monitoring of multiple remote apparatuses. The remote computing device associated with a given remote apparatus may also monitor the file transfer server and obtain instruction files generated and uploaded by the apparatus management and computing system.Type: GrantFiled: October 25, 2011Date of Patent: November 4, 2014Assignee: Novx Systems Canada, Inc.Inventors: Keith Beckley, Phil Sikora, Basil Allos
-
Patent number: 8880662Abstract: Methods, media, and network devices are provided for automatically re-provisioning a network device. The network devices include several triggers for re-provisioning the network device. When a trigger is satisfied, the network devices may switch communication networks by replacing current provisioning credentials with provisioning credentials for other communication networks. After the switch, the home address for the network devices point to the other communication networks.Type: GrantFiled: August 1, 2011Date of Patent: November 4, 2014Assignee: Sprint Communications Company L.P.Inventors: Geoffrey Scott Martin, Michael Philip Dougan
-
Patent number: 8874937Abstract: A user interface for a fuel dispenser has a display, a display controller, and control circuitry. The control circuitry includes a processing device, memory, and at least one microswitch. The display controller and the control circuitry are positioned such that the microswitch connects the control circuitry to the display controller. The microswitch is activated if the control circuitry is separated from the display controller. Activation of the microswitch causes any sensitive information stored by the control circuitry to be erased. In one aspect, separation of the display controller from the control circuitry is the only manner by which the processing device and/or the memory may be accessed.Type: GrantFiled: June 9, 2010Date of Patent: October 28, 2014Assignee: Gilbarco, S.r.l.Inventor: Giovanni Carapelli
-
Patent number: 8869264Abstract: A method, apparatus and program product for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system.Type: GrantFiled: September 23, 2011Date of Patent: October 21, 2014Assignee: International Business Machines CorporationInventors: David N. Mackintosh, Jose J. P. Perez, James W. Walker
-
Patent number: 8856865Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for prioritizing content classification categories. One of the methods includes maintaining two or more content categories including a first content category and a second content category, each content category having an associated score, receiving, from a user device, a request to access a resource, the resource being associated both with the first content category and with the second content category, determining a content access policy for the user device to the resource based on the respective scores associated with the first and second content categories, and selectively permitting or denying access to the resource by the user device depending on the determined content access policy.Type: GrantFiled: May 16, 2013Date of Patent: October 7, 2014Assignee: iboss, Inc.Inventor: Paul Michael Martini
-
Patent number: 8849950Abstract: In one example, a device for receiving information for multimedia data includes one or more processors configured to determine a byte range of a file of a representation of multimedia content to request from a source device, form a uniform resource locator (URL) that specifies, in a file path portion of the URL, according to a template, the file and the byte range in accordance with requirements of the source device, and issue a GET request that specifies the formed URL to the source device.Type: GrantFiled: April 4, 2012Date of Patent: September 30, 2014Assignee: QUALCOMM IncorporatedInventors: Thomas Stockhammer, Donald W. Gillies, Michael G. Luby, Fatih Ulupinar
-
Patent number: 8850024Abstract: A method includes sending a request for network services to plural devices, where the request identifies the network services using a self-describing data structure, and receiving a response to the request from at least one device, where the response identifies which of the network services are supported by the at least one device.Type: GrantFiled: April 2, 2012Date of Patent: September 30, 2014Assignee: Communications Acquisitions, LLCInventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
-
Patent number: 8849899Abstract: An example method includes monitoring client devices to identify a subset of client devices actively connected to an internet gateway server, and maintaining a record of media data chunks cached at each client device of the subset of client devices. The method includes receiving a request from a first client device for a media data item stored at a media server device, and determining that a first target portion of the media data item is cached at a second client device actively connected to the internet gateway server. The method includes instructing the first client device to establish a peer-to-peer connection with the second client device, to request, and to receive the first target portion of the media data item from the second client device. The method includes retrieving and sending the remainder of the media data item to the first client device.Type: GrantFiled: January 30, 2011Date of Patent: September 30, 2014Inventors: Israel L'Heureux, Mark D. Alleman
-
Patent number: 8844012Abstract: Technology is disclosed for sharing an authentication profile for accessing a Wi-Fi network between multiple devices. To access a particular Wi-Fi network on a first device and a second device, authentication information, e.g., a password for the Wi-Fi network, may have to be input on both the devices. In some embodiments, the technology facilitates obtaining an approval for accessing the Wi-Fi network on the second device from the first device. Upon receiving a request from a user of the second device to access the Wi-Fi network on the second device, the second device requests if any of the devices, e.g., devices in proximity, can approve the access request. A notification is displayed on the first device regarding the access request. The user associated with first device can then approve the access request, which causes authentication information for accessing the Wi-Fi network to be transmitted to the second device.Type: GrantFiled: April 14, 2014Date of Patent: September 23, 2014Assignee: Nextbit Systems Inc.Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
-
Patent number: 8843621Abstract: Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold).Type: GrantFiled: October 25, 2011Date of Patent: September 23, 2014Assignee: International Business Machines CorporationInventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
-
Patent number: 8839371Abstract: A method and system for securing access to a storage device including one or more locked logical sections. The method includes providing an interface device including a first port connected to a computing system and a second port connected to the storage device. Further, the method includes receiving a unique identifier from a wireless device, and deriving a key from the unique identifier. Based on the derived key, the method unlocks a logical section in the storage device. The method may further store access permission rights for the locked logical sections in the interface device and unlock the logical section based on the access permission rights. Moreover, the method may further authenticate the identity of a user of the wireless device for unlocking the storage device.Type: GrantFiled: August 26, 2010Date of Patent: September 16, 2014Assignee: Standard Microsystems CorporationInventors: Atish Ghosh, Mark Bohm
-
Patent number: 8839402Abstract: A network security device may gather a large amount of metadata pertaining to the connections being managed thereby. A refinement module may filter and/or aggregate the connection metadata. The metadata may be refined on the network security device. The refined metadata may be provided for display on a terminal. The refined metadata may include a subset of the larger connection metadata, which may reduce the overhead required to display and/or transmit monitoring information to the terminal device. The refined metadata may comprise connection groups, which may be formed based on aggregation criteria, such as connection source, destination, application, security policy, protocol, port, and/or the like. The connection groups may be ranked in accordance with ranking criteria.Type: GrantFiled: August 21, 2013Date of Patent: September 16, 2014Assignee: Watchguard Technologies, Inc.Inventors: Mark D. Hughes, Eivind Naess
-
Patent number: 8839417Abstract: A device, system, and method for defending a computer network are described. network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. The traffic filter routes normal communications to the correct device within its network for servicing he service requested by the communications. The traffic filter routes any anomalous communications to a virtual space engine, which is configured to fake a requested service (e.g., to entice deployment of a malicious payload). Anomalous communications are analyzed using an analytical engine, which can dynamically develop rules for handling anomalous communications in-line, and the rules developed by the analytical engine can be employed by the traffic filter against future received communications.Type: GrantFiled: November 17, 2004Date of Patent: September 16, 2014Assignee: McAfee, Inc.Inventor: Christopher J. Jordan
-
Patent number: 8832313Abstract: According to one embodiment, a terminal device is provided, comprising: a first communication unit communicating with a network device by receiving a destination address of a server and identification information for identifying the network device, and receiving transmission data of the network device to the server and the identification information; a device information storage unit that stores the destination address in association with the identification information; a second communication unit communicating with the server, by transmitting the transmission data received from the network device to the server using the destination address that corresponds to the identification information in the device information storage, and receiving from the server a result of determining whether the transmission data transmitted from the second communication unit matches the transmission data that the network device transmits to the server; and a display unit that displays the result of the determination.Type: GrantFiled: January 28, 2011Date of Patent: September 9, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Yoshiki Terashima, Kotaro Ise
-
Patent number: 8826438Abstract: A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer environment for a predetermined time to obtain HTTP traffic; clustering the malware samples into at least one cluster based on network behavioral information from the HTTP traffic; and extracting, using the at least one processor, network signatures from the HTTP traffic information for each cluster, the network signatures being indicative of malware infection.Type: GrantFiled: January 18, 2011Date of Patent: September 2, 2014Assignee: Damballa, Inc.Inventors: Roberto Perdisci, Wenke Lee, Gunter Ollmann
-
Patent number: 8806638Abstract: A computer-implemented method for protecting networks from infected computing devices may include providing a computing system with a first level of access to a network. The method may also include determining that the computing system is infected with malware. The method may further include determining that the computing system cannot autonomously neutralize the malware. The method may additionally include modifying by an endpoint management system a network access control policy that controls network access of the first computing system. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 10, 2010Date of Patent: August 12, 2014Assignee: Symantec CorporationInventor: SivaShakthivel Mani
-
Patent number: 8806660Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to secure licensing for an information handling system are provided. In accordance with additional embodiments of the present disclosure, a method may include: (i) booting an information handling system to an operating system stored on a memory of a secure licensing device coupled to a port of the information handling system; (ii) establishing a secure wireless network connection between the secure licensing device and a licensing server; (iii) retrieving information regarding one or more hardware components of the information handling system; (iv) retrieving a license key for a software program associated with information handling system from the licensing server; (v) generating a unique marker binding the license key to the one or more hardware components; and (vi) storing the unique marker on the information handling system.Type: GrantFiled: March 8, 2011Date of Patent: August 12, 2014Assignee: Dell Products L.P.Inventors: Clint H. O'Connor, Gary D. Huber
-
Patent number: 8806598Abstract: Provided are a system and method to authenticate user identities. The method includes gathering metadata from at least one discussion involving at least one pre-defined user identity on a first social network. The method evaluates the metadata of at least one third party response related to a posting by the at least one pre-defined user identity. The at least one pre-defined user identity is authenticated based on the evaluated third party response. And an indication of authentication for the at least one pre-defined user identity is provided. The system and method may also permit bridging of the established authentication between different social networks.Type: GrantFiled: September 21, 2011Date of Patent: August 12, 2014Assignee: Megathread, Ltd.Inventor: Brian Assam
-
Patent number: 8806620Abstract: A method and device for managing security events includes establishing a security event manager on a mobile computing device. The security event manager may be embodied as software and/or hardware components. The security event manager receives security event data from a plurality of security event sources of the mobile computing device and correlates the security event data based on a security policy to determine whether a security event has occurred. The security event manager responds to the security event based on the security policy.Type: GrantFiled: December 26, 2009Date of Patent: August 12, 2014Assignee: Intel CorporationInventors: Stacy P. Purcell, Alan D. Ross, Jim S. Baca, Selim Aissi, Tobias M. Kohlenberg, Dennis M. Morgan