Patents Examined by Mohammad L Rahman
-
Patent number: 9349026Abstract: System and method of anonymising data comprising the steps of reading parameters of an anonymisation procedure from a configurable anonymisation procedure resource. Receiving data to be anonymised from a data source, wherein the data source is identified by one or more of the read parameters. Applying one or more transformations to the received data according to the anonymisation procedure, wherein the one or more transformations include transforming at least an original portion of the received data into a transformed portion.Type: GrantFiled: July 20, 2012Date of Patent: May 24, 2016Assignee: Vodafone IP Licensing LimitedInventors: Adam Gianniotis, Gerald Mcquaid, Stephen Babbage
-
Patent number: 9300956Abstract: A method and apparatus are provided for redundant video coding. The apparatus includes an encoder for encoding a redundant coded picture corresponding to a source picture by selecting individual blocks in the source picture for inclusion into the redundant coded picture.Type: GrantFiled: February 27, 2007Date of Patent: March 29, 2016Assignee: THOMSON LICENSINGInventors: Zhenyu Wu, Jill MacDonald Boyce
-
Patent number: 9280680Abstract: Method and system for providing an augmented photobook that includes at least one interactive feature. An image of a symbology printed on a page of a photobook is captured, and address information contained therein is decoded. A web browser of an electronic device is directed to a website identified by the address information, and additional information related to the photobook is received from a remote computing device associated with the website. The additional information related to the photobook is displayed on the electronic device. Additionally, a level of access to the website is determined for a user of the electronic device. A user request to transmit new content to the website is received it is determined whether the level of access corresponds to permission rights for the website. If the level of access corresponds to the permission rights then the new content is transmitted and aggregated at the website.Type: GrantFiled: April 3, 2014Date of Patent: March 8, 2016Assignee: Xerox CorporationInventors: George Amos Gibson, Kerstin M. Henseleit
-
Patent number: 9282121Abstract: Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion into at least one logic language rule is described. In another example implementation, translation of a proof graph reflecting a logic language into a proof graph reflecting a security language is described. In yet another example implementation, evaluation of a logic language program using a deterministic algorithm is described.Type: GrantFiled: February 13, 2014Date of Patent: March 8, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Moritz Y. Becker, Blair B. Dillaway, Cedric Fournet, Andrew D. Gordon, Jason F. Mackay
-
Patent number: 9276906Abstract: In one embodiment, the methods and apparatuses to assign a routing address to a wireless computer that is in a different logical network from the routing addresses of other wireless computers within the same physical wireless network; and to prevent a wireless computer from learning the routing address of another wireless computer within the same physical wireless network.Type: GrantFiled: April 25, 2014Date of Patent: March 1, 2016Inventor: Alex I. Alten
-
Patent number: 9275251Abstract: A system for storing encrypted compressed data comprises a processor and a memory. The processor is configured to determine whether an encrypted compressed segment has been previously stored. The encrypted compressed segment was determined by breaking a data stream, a data block, or a data file into one or more segments and compressing and then encrypting each of the one or more segments. The processor is further configured to store the encrypted compressed segment in the event that the encrypted compressed segment has not been previously stored. The memory is coupled to the processor and configured to provide the processor with instructions.Type: GrantFiled: April 3, 2014Date of Patent: March 1, 2016Assignee: EMC CorporationInventor: Christopher R. Lumb
-
Patent number: 9269208Abstract: A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem comprising a biometric sensor for receiving a biometric signal, means for matching the biometric signal against members of the database of biometric signatures to thereby output an accessibility attribute, and means for emitting a secure access signal conveying information dependent upon said accessibility attribute, wherein the secure access signal comprises one of at least a rolling code, an encrypted Bluetooth™ protocol, and a WiFi™ protocol, and a receiver sub-system comprising means for receiving the transmitted secure access signal and means for providing conditional access to the controlled item dependent upon said information.Type: GrantFiled: August 10, 2012Date of Patent: February 23, 2016Assignee: SECURICOM (NSW) PTY LTDInventor: Christopher John Burke
-
Patent number: 9264228Abstract: A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic engine. The display element array includes one or more segments, and the driver outputs are configured to drive the one or more segments, respectively. The host controller is configured to send commands and data to the driver controller via the communication interface and the cryptographic engine is configured to encrypt communication data between the display element array and the host controller.Type: GrantFiled: February 11, 2014Date of Patent: February 16, 2016Assignee: BBPOS LimitedInventors: Chi Wah Lo, Hwai Sian Tsai
-
Patent number: 9264899Abstract: A mobile device, including: a wireless communication interface; a memory storing a secure software application; and a processor in communication with the memory, the processor being configured to: transmit an authentication challenge to the SIM card; receive an authentication response from the SIM card; verify the authentication response from the SIM card; and enable the secure software application when the authentication response from the SIM card is verified.Type: GrantFiled: December 19, 2013Date of Patent: February 16, 2016Assignee: NXP, B.V.Inventors: Peter Maria Franciscus Rombouts, Philippe Teuwen, Frank Michaud
-
Patent number: 9258310Abstract: A method and device for processing and tracking a TACACS+ session, wherein, the method includes: registering an attribute value in a TACACS+ packet of a TACACS+ session to be tracked; when a TACACS+ client receives a TACACS+ request packet, analyzing the TACACS+ request packet to judge whether an attribute value in the TACACS+ request packet is the same as the registered attribute value or not; if the two are the same, saving the Session_id value in the TACACS+ request packet; when the TACACS+ client receives a TACACS+ response packet, comparing the Session_id value in the TACACS+ response packet with a saved Session_id value, and if the two Session_id values are the same, setting the status of the corresponding TACACS+ session as successful. The embodiments of the present document track the TACACS+ response packet, so as to implement the function of tracking the whole TACACS+ session that conforms to specific conditions.Type: GrantFiled: August 30, 2013Date of Patent: February 9, 2016Assignee: ZTE CORPORATIONInventors: De Xu, Jianye Chen
-
Patent number: 9253160Abstract: Methods, systems and media for facilitating compression over a metered data connection are provided. In some embodiments, the methods comprise: detecting a new wireless network connection; determining that the new connection is metered; sending, via a proxy server, requests for content to a content server using the metered data connection; receiving, via the proxy server, content from the content server compressed by the proxy server using the metered data connection; detecting a second new wireless network connection; determining that the second new wireless network connection is not a metered data connection; causing the proxy server to inhibit compression of content sent to the user device in response to determining that the second new wireless network connection is not a metered data connection.Type: GrantFiled: March 13, 2015Date of Patent: February 2, 2016Inventor: Kent Lawson
-
Patent number: 9253198Abstract: Systems and methods are provided for controlling the authentication or authorization of a mobile device user for enabling access to the resources or functionality associated with an application or service executable at the user's mobile device. The user or user's mobile device may be automatically authenticated or authorized to access application or system resources at the device when the current geographic location of the user's mobile device is determined to be within a preauthorized zone, e.g., based on a predetermined geo-fence corresponding to the preauthorized zone. A security level or amount of authorization credentials required to authorize a user for data access may be varied according any of a plurality of security levels, when the current or last known geographic location of the user's mobile device is determined to be outside the preauthorized zone.Type: GrantFiled: October 29, 2013Date of Patent: February 2, 2016Assignee: MapQuest, Inc.Inventors: Joseph D. Hughes, Jr., Patrick McDevitt, Joseph Barbara
-
Patent number: 9253181Abstract: A new identification (ID) technology comprising unified and standardized object identification within Cyber Space is disclosed based upon intrinsic properties of the entity to be identified. This Cyber Gene ID (or Cyber ID) technology extracts intrinsic information from either the physical users or their cyberspace counterparts, and such information is categorized into client parameters, dynamic parameters, static parameters, cloud parameters, connection parameters and user parameters.Type: GrantFiled: July 8, 2014Date of Patent: February 2, 2016Inventors: Nanjie Liu, Jun Sun, Haitao Zhao, Chengjie Gu, Dapeng Li
-
Patent number: 9241263Abstract: Methods for associating a first and a second device. Each device broadcasts an identity, the first device stores new identities and counts them. Upon user instruction and if there just one new identity, the first device sends a request for association to the second device that acknowledges this. The second device then sends, upon user instruction, a confirmation to the first device that verifies that the confirmation was sent by the second device and acknowledges this. The method is particularly suitable for use on devices that are unable to display identities of other devices.Type: GrantFiled: October 24, 2007Date of Patent: January 19, 2016Assignee: THOMSON LICENSINGInventors: Olivier Courtay, Christophe Vincent
-
Patent number: 9231936Abstract: A computer-implemented method for authenticating messages in a control area network is described. In one embodiment, a message identifier for a data message is ascertained. Each device is associated with one or more message identifiers. The data message is sent from a first device to a second device. The data message is associated with the ascertained message identifier. An authentication code computed by the first device is sent to the second device. The authentication code is sent by the first device in the data message or in an authentication message.Type: GrantFiled: February 12, 2014Date of Patent: January 5, 2016Assignee: Symantec CorporationInventors: Qiyan Wang, Shankar Somasundaram
-
Patent number: 9231915Abstract: A method for handling hyper-text transfer protocol (“HTTP”) requests from client devices is disclosed. The method comprises receiving an HTTP request from a client device to connect to a destination server. It further comprises extracting a plurality of HTTP headers from the HTTP request using a gateway device in accordance with a user defined configuration to create a subset of the request. Next, it comprises forwarding the subset to an external security device from the gateway device to perform URL policy processing using the request. Finally, it comprises based on a received result of the URL policy processing, transmitting the client request to the destination server.Type: GrantFiled: October 29, 2013Date of Patent: January 5, 2016Assignee: A 10 NETWORKS, INCORPORATEDInventors: Xuyang Jiang, Takaaki Ishii, Masataka Noro
-
Patent number: 9223938Abstract: A method, apparatus, and electronic device with secure operation based on geography are disclosed. A positioning mechanism 404 may determine a geographic location of the apparatus or electronic device. A processor 104 may identify a secure domain for a virtual machine application. The processor 104 may determine an availability of an application programming interface for the virtual machine application based on the geographic location.Type: GrantFiled: December 31, 2007Date of Patent: December 29, 2015Assignee: Google Technology Holdings LLCInventor: James B. McGuire
-
Patent number: 9223998Abstract: Systems and methods for enhancing the security of confidential data such as customer email lists or similar contact information. Specifically, the invention is directed to a method of inserting a form of data referred to as a honey token into a data set when it is accessed by a user (such as an employee of the rightful owner of the data). In contrast to conventional forms of such tokens, the inventive token is dynamically generated and includes information identifying the user (i.e., the party accessing the data).Type: GrantFiled: February 12, 2014Date of Patent: December 29, 2015Assignee: NetSuite Inc.Inventor: Ryan Grisso
-
Patent number: 9224015Abstract: A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to prevent the smart wallet from being lost or stolen. The system comprises a fob key configured to send periodic wireless transmissions to the smart wallet device having the ability for approximate range detection. Various embodiments include audible, visual and vibrational indications for authentication, battery power and range detection.Type: GrantFiled: April 7, 2014Date of Patent: December 29, 2015Assignee: iWallet CorporationInventor: Steven Cabouli
-
Patent number: 9203823Abstract: Methods of operating a communications service are provided in which a communication that is addressed to a user of a communication service is received. A determination is made that end user authentication is required before the communication may be delivered to a first recipient electronic device. A request for end user authentication may then be forwarded to the first recipient electronic device in response to determining that end user authentication is required. End user authentication information may be received from the first recipient electronic device. The received end user authentication information may be compared to stored end user authentication information for the user. The communication may be forwarded over a network to the first electronic device in response to determining that the received end user authentication information matches the stored end user authentication information for the user.Type: GrantFiled: October 30, 2013Date of Patent: December 1, 2015Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Steven A. Siegel, Amy Zwarico, Larry B. Pearson