Patents Examined by Nadia Khoshnoodi
-
Patent number: 9350715Abstract: A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a communications session between two endpoints by emulating one of the endpoints at an intermediate node such that the communication session appears as an atomic, secure connection to the endpoints yet provides appropriate security over the end-to-end connection. A sender node sends a connection request to establish a secure communication session with an intended receiver node. A transparent proxy on an intermediate node receives the request and establishes the link employing an encryption mechanism. The transparent proxy establishes a second link with the intended receiver, and applies a second, less expensive encryption mechanism. The transparent proxy combines the two links to form the trusted, secure connection but incurring only the mitigated expense over the second link.Type: GrantFiled: March 15, 2013Date of Patent: May 24, 2016Assignee: CISCO TECHNOLOGY, INC.Inventors: Edward C. Kersey, James W. O'Toole, Jr., Bradley Dale Dike, Patrick Darrell Tate, Eric A. Fritzges, Andre Justin Pecqueur, Bruce F. Wong, Hema M. Prasad, Shaheed Bacchus, Larry David Bisel
-
Patent number: 9350706Abstract: Novel tools and techniques for filtering network traffic in an anycasting environment includes receiving network traffic addressed to a plurality of anycasted servers at an edge router, the plurality of anycasted servers comprising one or more anycasted servers. The network traffic is received from the edge server at least one data scrubbing appliance. The at least one data scrubbing appliance filters out undesirable traffic from the network traffic. The at least one data scrubbing appliance “on-ramps” the filtered network traffic to the plurality of anycasted servers. The filtered network traffic is transmitted to the plurality of anycasted servers in a load balanced manner.Type: GrantFiled: March 13, 2014Date of Patent: May 24, 2016Assignee: CenturyLink Intellectual Property LLCInventors: Donald J. Smith, Michael Glenn, John A. Schiel, Christopher L. Garner
-
Patent number: 9304944Abstract: A memory access circuit and a corresponding method are provided. The memory access circuit includes a crypto block in communication with a memory that encrypts data of a data block on a block basis. The memory access circuit also includes a fault injection block configured to inject faults to the data in the data block. The memory access circuit further includes a data scrambler and an address scrambler. The data scrambler is configured to scramble data in the memory by shuffling data bits within the data block in a plurality of rounds and mash the shuffled data bits with random data. The address scrambler is configured to distribute the scrambled data across the memory. A memory system including the memory access circuit is also disclosed to implement the corresponding method.Type: GrantFiled: March 29, 2012Date of Patent: April 5, 2016Assignee: Broadcom CorporationInventors: Fong Pong, Eric Spada, Karen Schramm
-
Patent number: 9288183Abstract: A method for balancing load among firewall security devices in a network is disclosed. According to one embodiment, a switch causes firewall security devices (FSDs) of a cluster to enter into a load balancing mode. Responsive to receiving a heartbeat signal from an FSD, information regarding the FSD and the port on which the heartbeat signal was received are added to a table maintained by the switch that maps outputs of a load balancing function to ports of the switch. A received packet is forwarded to an FSD of the cluster by: (i) extracting a configurable number of bit values from a configurable set of bit positions within the packet; (ii) determining the output of the load balancing function; (iii) identifying the port to which the FSD is coupled based on the output and the table; and (iv) transmitting the packet to the FSD via the identified port.Type: GrantFiled: July 20, 2015Date of Patent: March 15, 2016Assignee: Fortinet, Inc.Inventors: Edward Lopez, Joe Mihelich, Matthew F. Hepburn
-
Patent number: 9276907Abstract: Methods and systems for balancing load among firewall security devices (FSDs) are provided. According to one embodiment, session data, including session entries representing previously established traffic sessions from a particular source to a particular destination and forming an association between the previously established session and a particular FSD, is maintained for each port of a session-aware switching device. When a TCP SYN packet is received, the switching device: (i) reduces its vulnerability to a DoS attack by foregoing installation of a forward session entry for the forward traffic session within the session data until a processed TCP SYN/ACK packet associated with the corresponding reverse traffic session is received; (ii) selects an FSD to associate with the forward traffic session and a corresponding reverse traffic session by performing a load balancing function on the TCP SYN packet; and (iii) causes the TCP SYN packet to be processed by the selected FSD.Type: GrantFiled: November 20, 2015Date of Patent: March 1, 2016Assignee: Fortinet, Inc.Inventors: Joe Mihelich, Son Pham, Jun Li
-
Patent number: 9256737Abstract: A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and inventories wherein the scans may be triggered by an avatar moving or teleporting from one region to another, or by an avatar picking up, dropping off, or accepting or purchasing an item. The degree of scanning may depend upon factors such as location where these scan triggers occur. The signature of the item may be identified by the scan process. The item signature may be compared against signatures of known malicious items stored in an inventory item signatures database and a summary of the signature comparison may be sent to a resident and stored in the resident's inventory.Type: GrantFiled: August 26, 2008Date of Patent: February 9, 2016Assignee: International Business Machines CorporationInventors: Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker
-
Patent number: 9189637Abstract: Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are provided to transfer contents of transactional data between two or more networks configured to have different levels of network protection. Generated data barcodes can be decoded to produce contents of transactional data to be transmitted between two or more networks configured to have different levels of network security protection, and decoded contents of the transactional data can then be securely communicated back to the sender for comparison by generating validation barcodes to be decoded by the sender. Generated verification barcodes can then be decoded to produce verification data. Verification data can confirm success of the transmission of contents of transactional data encoded in the data barcodes. Decoded contents of transactional data can then be stored responsive to an indication of successful transmission.Type: GrantFiled: July 21, 2014Date of Patent: November 17, 2015Assignee: Saudi Arabian Oil CompanyInventors: Paul Francis Mevec, Ibrahim A. Marhoon
-
Patent number: 9173091Abstract: The present invention relates to methods and arrangements in a telecommunication system to override current access rights. The telecommunication system comprises an Access Point IAP; MSC, SGSN associated with a Configuration Unit ICU. The method comprises receiving to the Access Point IAP; MSC, SGSN from the Configuration Unit ICU, a request to monitor a system member MS, SIM. The method further comprises receiving to the Access Point from the Configuration Unit, a request to override deprived access rights for the system member MS, SIM. The method further comprises overriding in the Access Point IAP; MSC, SGSN, the deprived access rights for the member.Type: GrantFiled: March 18, 2005Date of Patent: October 27, 2015Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Amedeo Imbimbo, Maurizio Iovieno
-
Patent number: 9112701Abstract: A wearable device is provided that is used while being worn on a body of a user. The wearable device includes a biometric-information authentication portion that acquires biometric information from the user for biometric authentication. The wearable device acquires biometric information from a portion in contact with or in the vicinity of the user's body to perform the biometric authentication without requesting the user to operate for the biometric authentication.Type: GrantFiled: February 11, 2008Date of Patent: August 18, 2015Assignee: Sony CorporationInventors: Akane Sano, Masaaki Tsuruta, Nozomu Ozaki, Masamichi Asukai, Taiji Ito, Akinobu Sugino, Hidehiko Sekizawa, Yoichiro Sako
-
Patent number: 9112909Abstract: A network component comprising at least one processor configured to implement a method comprising granting a user restricted access at a reduced rate without authenticating the user, attempting to authenticate the user, and granting the user unrestricted access at a full rate if the user authentication is successful. Included is a method comprising authenticating a user device, a user line, or both using a first communication, and authenticating a user using a second communication separate from the first communication. Also included is an apparatus comprising an access node (AN) configured to couple to an access network and communicate with a user equipment (UE) via the access network, wherein the UE is authenticated using either line authentication or device authentication based on the access network.Type: GrantFiled: August 28, 2008Date of Patent: August 18, 2015Assignee: Futurewei Technologies, Inc.Inventors: John Kaippallimalil, Yangsong Xia
-
Patent number: 9106680Abstract: A method is provided in one example embodiment that includes generating a fingerprint based on properties extracted from data packets received over a network connection and requesting a reputation value based on the fingerprint. A policy action may be taken on the network connection if the reputation value received indicates the fingerprint is associated with malicious activity. The method may additionally include displaying information about protocols based on protocol fingerprints, and more particularly, based on fingerprints of unrecognized protocols. In yet other embodiments, the reputation value may also be based on network addresses associated with the network connection.Type: GrantFiled: June 27, 2011Date of Patent: August 11, 2015Assignee: McAfee, Inc.Inventors: Dmitri Alperovitch, Zheng Bu, David Frederick Diehl, Sven Krasser
-
Patent number: 9092823Abstract: A method of detecting malware on a computer and comprising scanning a system memory of the computer, and/or code being injected into the system memory, for known strings indicative of banking trojans. These strings may be Universal Resource Locators and/or partial Universal Resource Locators.Type: GrantFiled: June 1, 2007Date of Patent: July 28, 2015Assignee: F-SECURE OYJInventor: Mika Ståhlberg
-
Patent number: 9059838Abstract: A system obtains a key and first and second plaintext, where the first plaintext is identical to the second plaintext. The system uses the key to encrypt the first plaintext to a first ciphertext and the second plaintext to a second ciphertext using a same encryption algorithm, where the first ciphertext is different than the second ciphertext.Type: GrantFiled: March 30, 2007Date of Patent: June 16, 2015Assignee: Verizon Patent and Licensing Inc.Inventor: Brad Coomer
-
Patent number: 9027143Abstract: Various embodiments of a system and method for multipronged authentication are described. Embodiments may include a client system that implements a runtime component configured to consume content. The client system may be configured to implement a digital rights management component configured to perform one or more cryptographic operations and also authenticate the runtime component. The client system may receive encrypted content from a remote computer system and receive a given authentication component from a remote computer system; that authentication component may be configured to authenticate the runtime component. The client system may, based on authentication of the runtime component by both the digital rights management component and the given authentication component, decrypt at least a portion of the encrypted content.Type: GrantFiled: August 26, 2009Date of Patent: May 5, 2015Assignee: Adobe Systems IncorporatedInventors: Sunil C. Agrawal, Joseph D. Steele
-
Patent number: 9002003Abstract: A password protocol uses a multiple word password and provides prompts to a user allowing the user to select the next word in the password from a set of words. The selection of a word causes a client to perform a cryptographic operation and generate a new selection of words. After the password is completely entered, a key is generated from the words selected.Type: GrantFiled: November 29, 2007Date of Patent: April 7, 2015Assignee: Certicom Corp.Inventors: Daniel R. L. Brown, Marinus Struik
-
Patent number: 8984265Abstract: In some embodiments, the invention involves a system and method relating to secure booting of a platform. In at least one embodiment, the present invention is intended to securely boot a platform using one or more signature keys stored in a secure location on the platform, where access to the signature is by a microcontroller on the platform and the host processor has no direct access to alter the signature key. Other embodiments are described and claimed.Type: GrantFiled: March 30, 2007Date of Patent: March 17, 2015Assignee: Intel CorporationInventors: Kushagra Vaid, Vincent J. Zimmer, Mrigank Shekhar
-
Patent number: 8973112Abstract: A system and method for providing a normalized security list including a first module configured to generate a first normalized security list of user identifications within a network and a second module configured to generate a second normalized security list of user identifications within the network. The system and method may also include an equalizer module configured to compare the first normalized security list with the second normalized security list, equalize the first normalized security list based on the second normalized security list, and equalize the second normalized security list based on the first security list. The system and method may also include a processing module configured to perform an audit of user identifications within the network by processing the first equalized normalized security list and the second equalized normalized security list and generating audit results based on the processing.Type: GrantFiled: January 9, 2009Date of Patent: March 3, 2015Assignee: Verizon Patent and Licensing Inc.Inventor: Paul Michael Golobay
-
Patent number: 8966270Abstract: Novel, Internet-related architectures, methods and devices are proposed that are based on a fundamentally different philosophy: hosts (e.g., source and destination nodes) are given the ability to specify their access control policies to the network they are a part of, and the network enforces these policies. The architecture proposed is mobility friendly to the ever increasing number of mobile hosts and is scalable as well.Type: GrantFiled: December 29, 2006Date of Patent: February 24, 2015Assignee: Alcatel LucentInventors: Tian Bu, Li Li, Ramachandran Ramjee
-
Patent number: 8949986Abstract: A method and apparatus for network security elements using endpoint resources. An embodiment of a method includes receiving a request for access to a network at an endpoint server. The method further includes detecting that the request for access to the network includes a request that is unauthorized. The request for access to the network is directed to a network security element.Type: GrantFiled: December 29, 2006Date of Patent: February 3, 2015Assignee: Intel CorporationInventors: Omer Ben-Shalom, Uri Blumenthal
-
Patent number: 8949961Abstract: A communication system includes a multifunctional apparatus, an authentication information input device, an I/F converter, and a control server. The control server includes an authentication information input device driver for controlling the operation of the authentication information input device via the I/F converter over a network and a multifunctional apparatus control section for controlling operation of the multifunctional apparatus. The authentication information input device driver causes the authentication information input device to acquire authentication information from a user, and receives, via the network, the authentication information acquired by the authentication information input device. Moreover, in cases where an authenticating section of the control server performs an authentication process with use of the authentication information and authentication is completed successfully, the multifunctional apparatus control section permits the use of the multifunctional apparatus.Type: GrantFiled: January 15, 2008Date of Patent: February 3, 2015Assignee: Sharp Kabushiki KaishaInventor: Fusayuki Fujita