Patents Examined by Maung Lwin
  • Patent number: 8880871
    Abstract: Disclosed are various embodiments for improving hash table utilization. A key corresponding to a data item to be inserted into a hash table can be transformed to improve the entropy of the key space and the resultant hash codes that can generated. Transformation data can be inserted into the key in various ways, which can result in a greater degree of variance in the resultant hash code calculated based upon the transformed key.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: November 4, 2014
    Assignee: Broadcom Corporation
    Inventors: Brad Matthews, Bruce Kwan, Puneet Agarwal
  • Patent number: 8880653
    Abstract: A remote computing device associated with a remote apparatus obtains information related to the apparatus, and generates a file containing the information. The file is uploaded to a file transfer server. An apparatus management and computing system monitors the file transfer server and identifies newly generated and uploaded files. The files are downloaded and parsed to extract the information related to the remote apparatus. The parsed information is stored in a database and made available to a user through a monitor application. The system may be configured for the monitoring of multiple remote apparatuses. The remote computing device associated with a given remote apparatus may also monitor the file transfer server and obtain instruction files generated and uploaded by the apparatus management and computing system.
    Type: Grant
    Filed: October 25, 2011
    Date of Patent: November 4, 2014
    Assignee: Novx Systems Canada, Inc.
    Inventors: Keith Beckley, Phil Sikora, Basil Allos
  • Patent number: 8880662
    Abstract: Methods, media, and network devices are provided for automatically re-provisioning a network device. The network devices include several triggers for re-provisioning the network device. When a trigger is satisfied, the network devices may switch communication networks by replacing current provisioning credentials with provisioning credentials for other communication networks. After the switch, the home address for the network devices point to the other communication networks.
    Type: Grant
    Filed: August 1, 2011
    Date of Patent: November 4, 2014
    Assignee: Sprint Communications Company L.P.
    Inventors: Geoffrey Scott Martin, Michael Philip Dougan
  • Patent number: 8874937
    Abstract: A user interface for a fuel dispenser has a display, a display controller, and control circuitry. The control circuitry includes a processing device, memory, and at least one microswitch. The display controller and the control circuitry are positioned such that the microswitch connects the control circuitry to the display controller. The microswitch is activated if the control circuitry is separated from the display controller. Activation of the microswitch causes any sensitive information stored by the control circuitry to be erased. In one aspect, separation of the display controller from the control circuitry is the only manner by which the processing device and/or the memory may be accessed.
    Type: Grant
    Filed: June 9, 2010
    Date of Patent: October 28, 2014
    Assignee: Gilbarco, S.r.l.
    Inventor: Giovanni Carapelli
  • Patent number: 8869264
    Abstract: A method, apparatus and program product for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system.
    Type: Grant
    Filed: September 23, 2011
    Date of Patent: October 21, 2014
    Assignee: International Business Machines Corporation
    Inventors: David N. Mackintosh, Jose J. P. Perez, James W. Walker
  • Patent number: 8856865
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for prioritizing content classification categories. One of the methods includes maintaining two or more content categories including a first content category and a second content category, each content category having an associated score, receiving, from a user device, a request to access a resource, the resource being associated both with the first content category and with the second content category, determining a content access policy for the user device to the resource based on the respective scores associated with the first and second content categories, and selectively permitting or denying access to the resource by the user device depending on the determined content access policy.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: October 7, 2014
    Assignee: iboss, Inc.
    Inventor: Paul Michael Martini
  • Patent number: 8849950
    Abstract: In one example, a device for receiving information for multimedia data includes one or more processors configured to determine a byte range of a file of a representation of multimedia content to request from a source device, form a uniform resource locator (URL) that specifies, in a file path portion of the URL, according to a template, the file and the byte range in accordance with requirements of the source device, and issue a GET request that specifies the formed URL to the source device.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: September 30, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Thomas Stockhammer, Donald W. Gillies, Michael G. Luby, Fatih Ulupinar
  • Patent number: 8850024
    Abstract: A method includes sending a request for network services to plural devices, where the request identifies the network services using a self-describing data structure, and receiving a response to the request from at least one device, where the response identifies which of the network services are supported by the at least one device.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: September 30, 2014
    Assignee: Communications Acquisitions, LLC
    Inventors: Julian Wray West, Eric J. Martin, Rajesh K. Mishra
  • Patent number: 8849899
    Abstract: An example method includes monitoring client devices to identify a subset of client devices actively connected to an internet gateway server, and maintaining a record of media data chunks cached at each client device of the subset of client devices. The method includes receiving a request from a first client device for a media data item stored at a media server device, and determining that a first target portion of the media data item is cached at a second client device actively connected to the internet gateway server. The method includes instructing the first client device to establish a peer-to-peer connection with the second client device, to request, and to receive the first target portion of the media data item from the second client device. The method includes retrieving and sending the remainder of the media data item to the first client device.
    Type: Grant
    Filed: January 30, 2011
    Date of Patent: September 30, 2014
    Inventors: Israel L'Heureux, Mark D. Alleman
  • Patent number: 8844012
    Abstract: Technology is disclosed for sharing an authentication profile for accessing a Wi-Fi network between multiple devices. To access a particular Wi-Fi network on a first device and a second device, authentication information, e.g., a password for the Wi-Fi network, may have to be input on both the devices. In some embodiments, the technology facilitates obtaining an approval for accessing the Wi-Fi network on the second device from the first device. Upon receiving a request from a user of the second device to access the Wi-Fi network on the second device, the second device requests if any of the devices, e.g., devices in proximity, can approve the access request. A notification is displayed on the first device regarding the access request. The user associated with first device can then approve the access request, which causes authentication information for accessing the Wi-Fi network to be transmitted to the second device.
    Type: Grant
    Filed: April 14, 2014
    Date of Patent: September 23, 2014
    Assignee: Nextbit Systems Inc.
    Inventors: Michael A. Chan, Justin Quan, Daniel R. Bornstein, Tom Moss, Linda Tong
  • Patent number: 8843621
    Abstract: Embodiments of the present invention relate to an approach for using electronic feeds (e.g., online news feeds, social media resources/websites, etc.) to predict potentially harmful events and take preemptive measures/actions to minimize and/or avoid loss. In a typical embodiment, a set of electronic feeds (e.g., news feeds and/or social networking website feeds) is accessed. A query is then issued against the set of feeds based on a set of search criteria pertaining to a possible event having a potential to adversely affect the networked computing environment. A set of results is received in a computer memory medium of the networked computing environment. It may then be determined whether at least one property of the set of results (e.g., a quantity of ‘hits’) meets one or more predetermined event criteria (e.g., a predetermined threshold).
    Type: Grant
    Filed: October 25, 2011
    Date of Patent: September 23, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang, Daniel C. Krook
  • Patent number: 8839371
    Abstract: A method and system for securing access to a storage device including one or more locked logical sections. The method includes providing an interface device including a first port connected to a computing system and a second port connected to the storage device. Further, the method includes receiving a unique identifier from a wireless device, and deriving a key from the unique identifier. Based on the derived key, the method unlocks a logical section in the storage device. The method may further store access permission rights for the locked logical sections in the interface device and unlock the logical section based on the access permission rights. Moreover, the method may further authenticate the identity of a user of the wireless device for unlocking the storage device.
    Type: Grant
    Filed: August 26, 2010
    Date of Patent: September 16, 2014
    Assignee: Standard Microsystems Corporation
    Inventors: Atish Ghosh, Mark Bohm
  • Patent number: 8839402
    Abstract: A network security device may gather a large amount of metadata pertaining to the connections being managed thereby. A refinement module may filter and/or aggregate the connection metadata. The metadata may be refined on the network security device. The refined metadata may be provided for display on a terminal. The refined metadata may include a subset of the larger connection metadata, which may reduce the overhead required to display and/or transmit monitoring information to the terminal device. The refined metadata may comprise connection groups, which may be formed based on aggregation criteria, such as connection source, destination, application, security policy, protocol, port, and/or the like. The connection groups may be ranked in accordance with ranking criteria.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: September 16, 2014
    Assignee: Watchguard Technologies, Inc.
    Inventors: Mark D. Hughes, Eivind Naess
  • Patent number: 8839417
    Abstract: A device, system, and method for defending a computer network are described. network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. The traffic filter routes normal communications to the correct device within its network for servicing he service requested by the communications. The traffic filter routes any anomalous communications to a virtual space engine, which is configured to fake a requested service (e.g., to entice deployment of a malicious payload). Anomalous communications are analyzed using an analytical engine, which can dynamically develop rules for handling anomalous communications in-line, and the rules developed by the analytical engine can be employed by the traffic filter against future received communications.
    Type: Grant
    Filed: November 17, 2004
    Date of Patent: September 16, 2014
    Assignee: McAfee, Inc.
    Inventor: Christopher J. Jordan
  • Patent number: 8832313
    Abstract: According to one embodiment, a terminal device is provided, comprising: a first communication unit communicating with a network device by receiving a destination address of a server and identification information for identifying the network device, and receiving transmission data of the network device to the server and the identification information; a device information storage unit that stores the destination address in association with the identification information; a second communication unit communicating with the server, by transmitting the transmission data received from the network device to the server using the destination address that corresponds to the identification information in the device information storage, and receiving from the server a result of determining whether the transmission data transmitted from the second communication unit matches the transmission data that the network device transmits to the server; and a display unit that displays the result of the determination.
    Type: Grant
    Filed: January 28, 2011
    Date of Patent: September 9, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshiki Terashima, Kotaro Ise
  • Patent number: 8826438
    Abstract: A computerized system and method for performing behavioral clustering of malware samples, comprising: executing malware samples in a controlled computer environment for a predetermined time to obtain HTTP traffic; clustering the malware samples into at least one cluster based on network behavioral information from the HTTP traffic; and extracting, using the at least one processor, network signatures from the HTTP traffic information for each cluster, the network signatures being indicative of malware infection.
    Type: Grant
    Filed: January 18, 2011
    Date of Patent: September 2, 2014
    Assignee: Damballa, Inc.
    Inventors: Roberto Perdisci, Wenke Lee, Gunter Ollmann
  • Patent number: 8806638
    Abstract: A computer-implemented method for protecting networks from infected computing devices may include providing a computing system with a first level of access to a network. The method may also include determining that the computing system is infected with malware. The method may further include determining that the computing system cannot autonomously neutralize the malware. The method may additionally include modifying by an endpoint management system a network access control policy that controls network access of the first computing system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 10, 2010
    Date of Patent: August 12, 2014
    Assignee: Symantec Corporation
    Inventor: SivaShakthivel Mani
  • Patent number: 8806660
    Abstract: Systems and methods for reducing problems and disadvantages associated with traditional approaches to secure licensing for an information handling system are provided. In accordance with additional embodiments of the present disclosure, a method may include: (i) booting an information handling system to an operating system stored on a memory of a secure licensing device coupled to a port of the information handling system; (ii) establishing a secure wireless network connection between the secure licensing device and a licensing server; (iii) retrieving information regarding one or more hardware components of the information handling system; (iv) retrieving a license key for a software program associated with information handling system from the licensing server; (v) generating a unique marker binding the license key to the one or more hardware components; and (vi) storing the unique marker on the information handling system.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: August 12, 2014
    Assignee: Dell Products L.P.
    Inventors: Clint H. O'Connor, Gary D. Huber
  • Patent number: 8806598
    Abstract: Provided are a system and method to authenticate user identities. The method includes gathering metadata from at least one discussion involving at least one pre-defined user identity on a first social network. The method evaluates the metadata of at least one third party response related to a posting by the at least one pre-defined user identity. The at least one pre-defined user identity is authenticated based on the evaluated third party response. And an indication of authentication for the at least one pre-defined user identity is provided. The system and method may also permit bridging of the established authentication between different social networks.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: August 12, 2014
    Assignee: Megathread, Ltd.
    Inventor: Brian Assam
  • Patent number: 8806620
    Abstract: A method and device for managing security events includes establishing a security event manager on a mobile computing device. The security event manager may be embodied as software and/or hardware components. The security event manager receives security event data from a plurality of security event sources of the mobile computing device and correlates the security event data based on a security policy to determine whether a security event has occurred. The security event manager responds to the security event based on the security policy.
    Type: Grant
    Filed: December 26, 2009
    Date of Patent: August 12, 2014
    Assignee: Intel Corporation
    Inventors: Stacy P. Purcell, Alan D. Ross, Jim S. Baca, Selim Aissi, Tobias M. Kohlenberg, Dennis M. Morgan