Patents Examined by Monjour Rahim
  • Patent number: 9141780
    Abstract: Embodiments of the present disclosure provide a method and system for authenticating communication between a plurality of accessory devices or services and one or more media devices by using a single authentication processor. The method includes the steps of establishing a communication of a media device attached to an accessory device with an authentication processor through an authentication processor manager, authenticating the accessory device by the media device based on a digital certificate and a digital signature; and authenticating the media device by the accessory device based on verification of the digital certificate and the digital signature.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: September 22, 2015
    Assignee: SMSC HOLDINGS S.A.R.L.
    Inventors: Ramanathan Subramaniam, Hooman Kashef Hamadani
  • Patent number: 9135470
    Abstract: In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a request to store input data in storage, encrypting, based least in part upon one or more keys, the input data to generate output data to store in the storage. The one or more keys may be authorized by a remote authority. Alternatively or additionally, another of these operations may include, in response, at least in part, to a request to retrieve the input data from the storage, decrypting, based at least in part upon the at least one key, the output data. Many modifications, variations, and alternatives are possible without departing from this embodiment.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: September 15, 2015
    Assignee: Intel Corporation
    Inventors: Vincent J. Zimmer, Michael A. Rothman
  • Patent number: 9129287
    Abstract: A system and method for gathering data for detecting fraudulent transactions includes, in one embodiment, a web page that contains a fraud data gathering script and causes a client device to download a fraud detection applet. The fraud data gathering script causes the client device to collect information from the client device that is usable to identify the client device. The fraud detection applet causes the client device to connect to an identification echo service server to obtain the actual IP address of the client device. The fraud detection data, including the identifying information and the actual IP address, are then sent to a web server and/or a fraud data gathering server for further processing and to determine whether a transaction with the client device is likely to be fraudulent.
    Type: Grant
    Filed: October 4, 2013
    Date of Patent: September 8, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Robert Hanson, Gregory Look
  • Patent number: 9130837
    Abstract: A method in an example embodiment includes creating an initial information package for a device in a domain of a network environment when the device is unconfigured. The method further includes communicating the initial information package to a signing authority, receiving an authorization token from the signing authority, and sending the authorization token to the unconfigured device, where the unconfigured device validates the authorization token based on a credential in the unconfigured device. In more specific embodiments, the initial information package includes a unique device identifier of the unconfigured device and a domain identifier of the domain. In further embodiments, the signing authority creates the authorization token by applying an authorization signature to the unique device identifier and the domain identifier. In other embodiments, the method includes receiving an audit history report of the unconfigured device and applying a policy to the device based on the audit history report.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: September 8, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Steinthor Bjarnason, Michael H. Behringer, Yves Francis Eugene Hertoghs, Max Pritikin
  • Patent number: 9130757
    Abstract: According to one embodiment of the present invention, a method for protecting authenticated communication in dynamic federated environments is provided. The method includes distributing shares of a private signature key to a group of users. When switching from an existing to a new group of users, the method includes producing a plurality of sub-shares from each of the distributed shares of existing users, with each sub-share being accompanied by a corresponding validity proof. The sub-shares from multiple existing users are combined to generate a set of shares for new users, with each new share being derived from sub-shares from multiple existing users.
    Type: Grant
    Filed: August 11, 2008
    Date of Patent: September 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nelly Fazio, Richard Andrew Golding, Theodore Ming-Tao Wong
  • Patent number: 9130754
    Abstract: Methods, devices, and computer program products for transmitting and receiving discovery and paging messages in a wireless communication device are described herein. In one aspect, a wireless apparatus operable in a wireless communication system includes a processor configured to encrypt at least a portion of a discovery packet using one or more credentials of an application that, when executed, provides one or more services, the discovery packet including information for advertising at least one service provided by the application to one or more receiving devices. The wireless apparatus further includes a transmitter configured to transmit the discovery packet for being received by the one or more receiving devices.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 8, 2015
    Assignee: Qualcomm Incorporated
    Inventors: Santosh Paul Abraham, George Cherian, Rolf De Vegt
  • Patent number: 9128876
    Abstract: Contents of a memory are encrypted using an encryption key that is generated based on a random number and a memory location at which the contents are stored. Each of a plurality of locations of a memory can be associated with a respective unique pointer value, and an encryption key may be generated based on the unique pointer value and the random number. In some examples, the random number is unique to a power-up cycle of a system comprising the memory or is generated based on a time at which the data to be stored by the memory at the selected memory location is written to the memory.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: September 8, 2015
    Assignee: Honeywell International Inc.
    Inventors: Thomas Cordella, John Profumo, James L. Tucker
  • Patent number: 9129089
    Abstract: A digital rights management license provides access to a decryption key that can be used to decrypt an encrypted digital content item. The digital rights management license also includes a policy that defines circumstances in which the decryption key is allowed to decrypt encrypted content data for the purpose of creating a persistently-unencrypted version of the content data.
    Type: Grant
    Filed: January 26, 2009
    Date of Patent: September 8, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Stephen P. DiAcetis
  • Patent number: 9130992
    Abstract: Disclosed is a method for efficient transport of packets between a mobile station and a secure gateway over a wireless local area network for accessing home services. In the method, a first encryption security association is established for transporting first-type packets from the secure gateway to the mobile station, and a second encryption security association is established for transporting first-type packets from the mobile station to the secure gateway. Next, a first null-encryption security association is established for transporting second-type packets from the secure gateway to the mobile station, and a second null-encryption security association is established for transporting second-type packets from the mobile station to the secure gateway. Second-type packets are selected for transport using the second null-encryption security association based on a traffic selector.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: September 8, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Raymond Tah-Sheng Hsu, Arungundram Chandrasekaran Mahendran
  • Patent number: 9130924
    Abstract: The present invention is concerning to an information processing system includes an information input device and an information output device. The information input device includes a communication module that establishes communication with one or more information output devices, an information acquiring module that acquires device information of the respective information output devices including an identification code used only for identifying the information output device and makes a storage module store therein the device information, an input receiving module that receives an entry of an identification code, and a device specifying module that searches the device information acquired from the respective information output devices to specify the information output device to which the information is to be transmitted based on the identification code received and gives instructions to the communication module to transmit the information using the device information of the information output device specified.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: September 8, 2015
    Assignee: RICOH COMPANY, LIMITED
    Inventor: Sachiko Abe
  • Patent number: 9129321
    Abstract: Embodiments of the invention are directed to a fraud detection system that records an audit log of modifications made by a user to a selection of fraud detection rules in a merchant profile. The audit log contains details of the modifications and the user associated with the modifications. A search can be conducted on the audit log to determine details of modifications made to a merchant profile within the fraud detection system.
    Type: Grant
    Filed: April 19, 2012
    Date of Patent: September 8, 2015
    Assignee: Visa International Service Association
    Inventors: B. Scott Boding, Cory H. Siddens
  • Patent number: 9129093
    Abstract: Systems and methods providing content having digital rights management (DRM) applications separable from other authorization applications are provided. A system may include a distribution service provider system in communication with a content provider system and consumer premise equipment (CPE) for the transmission of content from the content provider system to the CPE device. The distribution service provider system may: receive A/V content provided by the content provider system, wherein the A/V content includes a DRM application; apply a conditional access system (CAS) application to the A/V content that is independent of the DRM application; and transmit the A/V content including the CAS and the DRM applications to the CPE for presentation. The CPE device can perform DRM authorizations with the content provider or a third-party DRM provider.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: September 8, 2015
    Assignee: Cox Communications, Inc.
    Inventors: Keith Alan Rothschild, Julius Bert Bagley
  • Patent number: 9131373
    Abstract: A secure network access point transmits a beacon transmission. A user device receiving it determines it does not have credentials necessary to attach with the secure network access point, and so a preliminary association is formed between the user device and the secure network access point. During the preliminary association, the user device receives or creates credentials necessary to associate with the secure network access point, forms an association with the secure network access point using the received or created credentials, and obtains internet connectivity via the secure network access point. In this embodiment there is only the secure network access point, but in another embodiment there is also a non-secure network access point which transmits a beacon using the same SSID as the secure network access point, and the preliminary association is with the non-secure network access point.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: September 8, 2015
    Assignee: Nokia Technologies Oy
    Inventors: Basavaraj Patil, Gabor Bajko
  • Patent number: 9129130
    Abstract: A system and method are provided for the secure sharing of information stored using cloud storage services and for performing data verification and replay protection for information stored on an open network.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: September 8, 2015
    Assignee: PKWARE, Inc.
    Inventors: Joe Sturonas, Theodore Czotter, Chris Nevin, James Robson
  • Patent number: 9104840
    Abstract: Embodiments relate generally to methods and systems for creating and using a watermark for verification of operation in a trusted security zone of a mobile device. The watermark may be created or chosen by a user and may be unique to the user. The watermark may be stored in a trusted security zone of the mobile device and may not be accessible from any other area of the mobile device. The watermark may comprise one or more of an image, an audio file, a video, a shape, a signature, a word, a phrase, or a number. The watermark may be verified by a user before operation of a secure application executed in the trusted security zone of the mobile device, and the watermark may also be present throughout the use of a secure application.
    Type: Grant
    Filed: March 5, 2013
    Date of Patent: August 11, 2015
    Assignee: Sprint Communications Company L.P.
    Inventors: Lyle W. Paczkowski, William M. Parsel, Carl J. Persson, Matthew C. Schlesener
  • Patent number: 9104528
    Abstract: A privacy control system is described herein for controlling dissemination of private information by a program. The privacy control system operates by performing static analysis to determine at least one flow within the program of private information, from a source to a sink. The static analysis is particularly configured to identify two types of flow, including: (a) an unvetted flow of untampered private information from the source to the sink; and (b) a flow of tampered private information from the source to the sink, whether vetted or unvetted. The privacy control system then prompts the user to provide a privacy control decision regarding the flow. The privacy control decision governs whether actual data or anonymized data is provided to the sink, or whether the program is terminated. A runtime system then runs the program in accordance with the privacy control decision.
    Type: Grant
    Filed: December 8, 2011
    Date of Patent: August 11, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xusheng Xiao, Nikolai Tillmann, Manuel A. Fahndrich, Jonathan Paul de Halleux, Michal J. Moskal
  • Patent number: 9104860
    Abstract: Disclosed is a method of checking the authenticity of an executable process including at least one section. The method includes, when an initial thread of the executable process is created in a suspended state, mapping from storage a copy of the executable process into a spare memory area, where it will not be executed. The method also includes comparing a header of a first section of the executable process with a header of a first section of the copy. The method further includes terminating the executable process when the header of the first section of the executable process and the header of the first section of the copy are not identical.
    Type: Grant
    Filed: March 6, 2013
    Date of Patent: August 11, 2015
    Assignee: APPSENSE LIMITED
    Inventor: Stephen Jones
  • Patent number: 9106609
    Abstract: A system for viewing at a client device a series of three-dimensional virtual views over the Internet of a volume visualization dataset contained on centralized databases employs a transmitter for securely sending volume visualization dataset from a remote location to the centralized database, more than one central data storage medium containing the volume visualization dataset, and a plurality of servers in communication with the centralized databases to create virtual views based on client requests. A resource manager load balances the servers, a security device controls communications between the client device and server and the resource manager and central storage medium. Physically secured sites house the components. A web application accepts at the remote location user requests for a virtual view of the volume visualization dataset, transmits the request to the servers, receives the resulting virtual view from the servers, and displays the resulting virtual view to the remote user.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: August 11, 2015
    Inventor: Kovey Kovalan
  • Patent number: 9104844
    Abstract: A platform and a method for dynamic software license are disclosed. The dynamic software license platform comprises a license pool, a register manager, a user configure unit and a license manager. The register manager receives a software application from a user end. The user configure unit grants a setting permission to the user end in response to the software application, and allows the user end to submit a license setting according to the setting permission. The license manager adds the software license provided by the software supplier to the license pool, and dynamically provides the software license from the license pool unit according to the license setting.
    Type: Grant
    Filed: August 3, 2012
    Date of Patent: August 11, 2015
    Assignee: QUANTA COMPUTER INC.
    Inventors: Tien-Chin Fang, Ching-Yu Tsai, Ming-Jen Chen, Hung-Yu Yang, Chia-Hung Lin, Chen-Chung Lee
  • Patent number: 9104858
    Abstract: A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: August 11, 2015
    Assignee: Symantec Corporation
    Inventors: Sharada Sundaram, Robert Koeten