Patents Examined by Muhammad Chaudhry
  • Patent number: 9372704
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, relating to software execution. One of the methods includes executing, on a computer including a single memory for storing data and instructions, a virtual environment including a data memory and an instruction memory, the instruction memory configured to be unreadable by instructions stored in the instruction memory; receiving, at the virtual environment, a software module comprising multiple instructions; and performing validation of the software module including: identifying, in the software module one or more calls to the single memory; and verifying that the one or more calls to the single memory are in the data memory.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: June 21, 2016
    Assignee: Google Inc.
    Inventors: David C. Sehr, J. Bradley Chen, Bennet S. Yee
  • Patent number: 9355262
    Abstract: Embodiments of an invention for modifying memory permissions in a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to modify access permissions for a page in a secure enclave. The execution unit is to execute the instruction. Execution of the instruction includes setting new access permissions in an enclave page cache map entry. Furthermore, the page is immediately accessible from inside the secure enclave according to the new access permissions.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: May 31, 2016
    Assignee: Intel Corporation
    Inventors: Rebekah Leslie-Hurd, Ilya Alexandrovich, Ittai Anati, Alex Berenzon, Michael Goldsmith, Simon Johnson, Francis McKeen, Carlos Rozas, Uday Savagaonkar, Vincent Scarlata, Vedvyas Shanbhogue, Wesley Smith
  • Patent number: 9356918
    Abstract: A first communication session is conducted between a media device and a mobile device. The first communication session includes requesting an authorization code from the mobile device and receiving the authorization code from the mobile device. The mobile device acts as an intermediary for obtaining authentication from a content server. The mobile device initiates a second communication session with a provider authorization service of the content server. The second communication session includes obtaining a token from the provider authorization service using the authorization code. The media device initiates a third communication session with the content server. The third communication session includes utilizing the token to obtain content from the content server. The system automatically attempts to renew the token in response to an expiration of the token.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 31, 2016
    Assignee: Google Inc.
    Inventors: Francis Tsui, Majd Bakar
  • Patent number: 9344406
    Abstract: According to an embodiment, an information processing device includes an event processor and a first determining unit. The event processor includes an event detecting unit. The event detecting unit is configured to detect an event and suspend execution of the event. The first determining unit registering unit is configured to register the first determining unit when stored first identification information and identification information of the first determining unit match with each other. The first determining unit includes a second determining unit. The second determining unit registering unit is configured to register a second application as a second determining unit when the verification of a signature of the second application is successful. The event detecting unit cancels suspending of the event and executes the event when the result of determination indicates permission of the execution.
    Type: Grant
    Filed: July 19, 2013
    Date of Patent: May 17, 2016
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Hiroshi Isozaki, Ryuiti Koike, Jun Kanai, Jun Ohashi, Kentaro Takeda
  • Patent number: 9344404
    Abstract: In one embodiment, a method includes establishing a connection with an access-point (AP) device via a first communication path. The method further includes establishing a connection with a proxy device for the AP device via a second communication path that is distinct from the first communication path. In addition, the method includes determining a set of connection credentials maintained by the AP device. Furthermore, the method includes determining a set of connection credentials maintained by the proxy device. Additionally, the method includes identifying a correct set of connection credentials. The correct set includes at least one of the first set and the second set. The method also includes synchronizing the first set and the second set according to the correct set.
    Type: Grant
    Filed: January 31, 2013
    Date of Patent: May 17, 2016
    Assignee: Dell Products L.P.
    Inventors: Abu Shaher Sanaullah, Yuan-Chang Lo, Raziuddin Ali, Claude Lano Cox, Michael S. Gatson, Karthikeyan Krishnakumar
  • Patent number: 9325728
    Abstract: Processes for the implementation and scoring of computer and network system defense exercises include base and modified scoring in accordance with various parameters and across multiple types of participants including attackers, defenders, forensic analysts, judges and referees. Effects-based scoring includes scoring for ascertaining status of an external client system by a participant in an independent client system.
    Type: Grant
    Filed: July 22, 2013
    Date of Patent: April 26, 2016
    Assignee: Leidos, Inc.
    Inventors: Scott Kennedy, Carleton Rose Ayers, II, Susan Banks, Ian Carroll Allison, Myoki Elizabeth Spencer, Michael Anthony Diaz
  • Patent number: 9317717
    Abstract: The disclosed embodiments provide a system that processes data. During operation, the system uses a first key to protect a write operation on the data. Next, the system uses a second key to protect a read operation on the data.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: April 19, 2016
    Assignee: Open Invention Network, LLC
    Inventors: Geoffrey G. Thomas, John Whaley, Thomas Joseph Purtell, II
  • Patent number: 9306742
    Abstract: A first portion of a cryptographic key can be conveyed through a secure channel to a device that can interact with a home network. After the first portion is received, a prompt can be sent by the recipient of the portion through a non-secure channel to the sender of the portion to send a second portion of the key. The cryptographic key can be constituted from the received portions and used by the device to secure communications with home network.
    Type: Grant
    Filed: February 5, 2013
    Date of Patent: April 5, 2016
    Assignee: Google Inc.
    Inventors: Girts Folkmanis, Paul Heninwolf
  • Patent number: 9292696
    Abstract: A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Data to be transmitted is received from a user computer. The data includes a plurality of fields of data. One or more fields of data are selected for anonymization. The selected one or more fields are anonymized. The data with one or more fields anonymized is transmitted to the destination computing device.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 22, 2016
    Assignee: CipherCloud, Inc.
    Inventors: Pravin Kothari, Debabrata Dash, Viswa Soubramanien
  • Patent number: 9276735
    Abstract: An information processing apparatus including a random number generation unit configured to generate a pair of random numbers from a seed, a message generation unit configured to generate a message based on a pair of multi-order multivariate polynomials F=(f1, . . . , fm) defined in a ring K, the pair of random numbers, and a vector s that is an element of a set Kn, a message supply unit configured to supply the message to a verifier storing the pair of multi-order multivariate polynomials F and vectors y=(y1, . . . , ym)=(f1(s), . . . , fm(s)), and a response supply unit configured to supply the verifier with response information corresponding to a verification pattern selected by the verifier from among k (where k?3) verification patterns.
    Type: Grant
    Filed: August 17, 2012
    Date of Patent: March 1, 2016
    Assignee: Sony Corporation
    Inventors: Harunaga Hiwatari, Koichi Sakumoto, Taizo Shirai
  • Patent number: 9245116
    Abstract: A system includes a physical analysis module, a cyber analysis module, and a determination module. The physical analysis module is configured to obtain physical diagnostic information, and to determine physical analysis information using the physical diagnostic information. The cyber analysis module is configured to obtain cyber security data of the functional system, and to determine cyber analysis information using the cyber security data. The determination module is configured to obtain the physical analysis information and the cyber analysis information, and to determine a state of the functional system using the physical analysis information and the cyber analysis information. The state determined corresponds to at least one of physical condition or cyber security threat. The determination module is also configured to identify if the state corresponds to one or more of a non-malicious condition or a malicious condition.
    Type: Grant
    Filed: March 21, 2013
    Date of Patent: January 26, 2016
    Assignee: General Electric Company
    Inventors: Scott Charles Evans, Richard Brownell Arthur, Bouchra Bouqata, Piyush Mishra, Weizhong Yan, Anil Varma
  • Patent number: 9240882
    Abstract: According to an embodiment, a key generating device connected to an external device includes a generating unit configured to generate an encryption key; a first communicating unit configured to transmit and receive the encryption key to and from the external device; a storage unit configured to stores therein state information indicating a communication state with respect to an application using the encryption key; and a controller configured to make a control of changing a frequency at which the generating unit generates the encryption key or a frequency at which the first communicating unit transmits and receives the encryption key according to the state information.
    Type: Grant
    Filed: December 14, 2012
    Date of Patent: January 19, 2016
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshimichi Tanizawa, Shinichi Baba
  • Patent number: 9237128
    Abstract: Mechanisms are provided for performing an operation on a received data packet. A data packet is received and a hash operation on a header field value of a header of the data packet is performed to generate a hash value. A lookup operation is performed in a hash table associated with a type of the header field value to identify a hash table entry. A bit string associated with the hash table entry is retrieved, where each bit in the bit string corresponds to a class of rules of a rule set of a firewall. A matching operation of the header field value to rules in classes of rules corresponding to bits set in the bit string is performed to select one or more search trees. Operations are performed based on rules in the classes of rules being matched by header field value of the data packet.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: January 12, 2016
    Assignee: International Business Machines Corporation
    Inventors: Donald T. Davis, Jr., Michael T. Evans
  • Patent number: 9230117
    Abstract: A method, computer program product, and system is described. An indication of a problem regarding a content item is received, the content item being subject to a workflow including an approval protocol. A request for an emergency exception to the workflow with respect to an update to the content item is received, the update being associated with the problem. Permission for circumvention of one or more aspects of the approval protocol with respect to the update is provided, in response to receiving the request for the emergency exception.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: January 5, 2016
    Assignee: International Business Machines Corporation
    Inventors: Nicholas A. Baldwin, Mark C. Hampton, Eric Martinez de Morentin, Prescilla Prescilla
  • Patent number: 9223989
    Abstract: A method, computer program product, and system is described. An indication of a problem regarding a content item is received, the content item being subject to a workflow including an approval protocol. A request for an emergency exception to the workflow with respect to an update to the content item is received, the update being associated with the problem. Permission for circumvention of one or more aspects of the approval protocol with respect to the update is provided, in response to receiving the request for the emergency exception.
    Type: Grant
    Filed: March 18, 2013
    Date of Patent: December 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Nicholas A. Baldwin, Mark C. Hampton, Eric Martinez de Morentin, Prescilla Prescilla
  • Patent number: 9185095
    Abstract: Methods and systems for behavioral profiling are described. In some embodiments, a method includes observing behavioral characteristics of user interactions during a current session with the user through one of a plurality of channels. Variations between the behavioral characteristics of the user interactions observed during the current session and a behavioral profile previously developed based on prior usage patterns of the user through the plurality of channels are identified, in real-time or near real-time. For the user to proceed in the session, a challenge level is implemented based on the variations between the behavioral characteristics and the behavioral profile.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: November 10, 2015
    Assignee: United Services Automobile Association (USAA)
    Inventors: Karen Moritz, Stephen Seyler Aultman, Joseph James Albert Campbell, Debra Casillas, Jonathan Edward Neuse, Sara Teresa Alonzo, Thomas Bret Buckingham, Gabriel Carlos Fernandez, Maland Keith Mortensen
  • Patent number: 9178901
    Abstract: The techniques described herein use training data to train classification models to detect malicious Uniform Resource Locators (URLs) that target authentic resources (e.g., Web page, Web site, or other network locations accessed via a URL). The techniques train the classification models using one or more machine learning algorithms. The training data may include known benign URLs and known malicious URLs (e.g., training URLs) that are associated with a target authentic resource. The techniques then use the trained classification models to determine whether an unknown URL is a malicious URL. The malicious URL determination may be based on one or more lexical features (e.g., brand name edit distances for a domain and path of the URL) and/or site/page features (e.g., a domain age and a domain confidence level) extracted.
    Type: Grant
    Filed: March 26, 2013
    Date of Patent: November 3, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Feng Xue, Bin Benjamin Zhu, Weibo Chu
  • Patent number: 9177122
    Abstract: Techniques for managing secure data transfer, including firmware updates and/or cryptographic keys, may be provided. For example, a portable device may be provided that includes at least a first memory configured to store data associated with secure firmware updates while the device is interacting with a second device. In some examples, a network connection with a third device may be established. The data associated with the firmware update may be received from the third device by utilizing the established network connection. Further, in some examples, the received data may be stored in the first memory only while the first device is interacting with the second device. The portable device may also enable a firmware update of the second device based at least in part on the data stored in the first memory.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: November 3, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Stephen Christopher Trier
  • Patent number: 9166962
    Abstract: A mobile communications device may include a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: October 20, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael Andrew Goldsmith, Aleksandar Papo, Robert Joseph Lombardi, Jasmin Mulaosmanovic, Nazih Almalki, Brian Everett McBride, Peter Mark Rabinovitch
  • Patent number: 9143319
    Abstract: An authentication device is used to authenticate a component to a product using a secret key. The life cycle of the authentication device is controlled by selective deletion of the secret key. An attestation message is sent by the authentication device upon deletion of the secret key. Authentication devices from faulty components or over supply of the authentication devices ma}? be rendered inoperable and audited.
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: September 22, 2015
    Assignee: Certicom Corp.
    Inventor: Robert John Lambert