Patents Examined by Nadia Khoshnoodi
  • Patent number: 8689295
    Abstract: Systems and methods provide security to HTTP applications. Responses sent from a server, such as a web server, are analyzed and a signature is generated for each HTML object in that page. The signature is encrypted and sent to a client along with the contents of the page. When a client later sends a request, the system checks the signature associated with that request with the contents of the request itself. If the values, variables, lengths, and cardinality of the request are validated, then the request is forwarded to the web server. If, on the other hand, the request is invalidated, the request is blocked from reaching the web server, thereby protecting the web server from malicious attacks. The systems and methods offer security without being limited to a session or user.
    Type: Grant
    Filed: March 13, 2012
    Date of Patent: April 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Llius Mora Hidalgo, Xabier Panadero Lleonart
  • Patent number: 8688985
    Abstract: Provided is a data security method and apparatus using a characteristic preserving encryption. The data security apparatus includes an interface communicating with a user terminal or a database server, an input unit receiving information, an output unit outputting information, an encryption unit encrypting data in the data security method, a storage unit storing information, and a control unit controlling functions of the interface, the input unit, the output unit, the encryption unit or the storing unit.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: April 1, 2014
    Assignee: Penta Security Systems Inc.
    Inventors: Duk-Soo Kim, Seok-Woo Lee, Eui-Seok Kim, Tae-Joon Jung
  • Patent number: 8677116
    Abstract: Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes receiving a first signal from the computer providing the secured capability. The first signal includes a reusable identifier corresponding to the secured capability. The method further includes receiving a second signal from an electronic device being used by the user. The second signal includes a copy of the reusable identifier and user verification information. The method further includes using a processor to evaluate, based at least on the first signal and the second signal, whether the user is authorized to conduct the at least one interaction with the secured capability.
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: March 18, 2014
    Inventor: Jack Bicer
  • Patent number: 8677464
    Abstract: According to various embodiments, a session manager generates, stores, and periodically updates the login credentials for each of a plurality of connected IEDs. An operator, possibly via an access device, may provide unique login credentials to the session manager. The session manager may determine the authorization level of the operator based on the operator's login credentials, defining with which IEDs the operator may communicate. According to various embodiments, the session manager does not facilitate a communication session between the operator and a target IED. Rather, the session manager maintains a first communication session with the operator and initiates a second communication session with the target IED. Accordingly, the session manager may forward commands transmitted by the operator to the target IED. Based on the authorization level of the operator, a session filter may restrict what may be communicated between an operator and an IED.
    Type: Grant
    Filed: June 22, 2011
    Date of Patent: March 18, 2014
    Assignee: Schweitzer Engineering Laboratories Inc.
    Inventors: Rhett Smith, Ryan Bradetich, Christopher Ewing, Nathan Paul Kipp, Kimberly Ann Yauchzee
  • Patent number: 8661513
    Abstract: In one embodiment a computing system comprises one or more processors, a display device coupled to the computing system, and a memory module communicatively connected to the one or more processors. The memory module comprises logic to receive, in a connection server, a service request from a user via a remote connection client, wherein the service request comprises at least one of a user credential, a connection client identifier, and a layout identifier, authenticate, in the connection server, the user credential and the connection client identifier, retrieve, in the connection server, a user profile associated with the user, a connection client layout associated with the layout identifier, connection data for at least one remote system, and a policy associated with the user profile, and transmit the user profile, the connection client layout, a remote system and the connection data for a remote system and a policy associated with the user profile from the connection server to the remote connection client.
    Type: Grant
    Filed: September 12, 2008
    Date of Patent: February 25, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Roland M. Hochmuth, Byron A. Alcorn, Jeffrey Joel Walls, Thomas J. Flynn, Quoc P. Pham, Valentin Popescu
  • Patent number: 8656507
    Abstract: An information management apparatus includes: a registration unit, a condition storage, a determination unit, a transmission unit and a deletion unit. The registration unit registers electronic information in association with access right information representing whether a user has an access right. The condition storage stores a condition for prohibiting an access to the electronic information registered by the registration unit on the basis of an administrator's right for the apparatus. The determination unit determines whether the changed access right information satisfies the condition stored in the condition storage. The transmission unit transmits the electronic information to a transmission destination in a case where the determination unit determines that the access right information of the electronic information satisfies the condition. The deletion unit deletes the electronic information stored in a transmission source after the electronic information is transmitted by the transmission unit.
    Type: Grant
    Filed: March 21, 2008
    Date of Patent: February 18, 2014
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Kensaku Honda
  • Patent number: 8656178
    Abstract: The present invention provides a method, system and program product for modifying content usage conditions during broadcast content distribution. Specifically, the present invention allows protected (e.g., encrypted, secured, etc.) content to be received along with content usage conditions, an encrypted combination of the content usage conditions and a title key (e.g., a MAC), and a key management block. Using the key management block, a key encrypting key can be determined for decrypting the combination. Once the combination is decrypted, the content usage conditions can be modified (e.g., edited, added to, etc.).
    Type: Grant
    Filed: April 18, 2002
    Date of Patent: February 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: Eric M. Foster, Jeffrey B. Lotspiech, Dalit Naor, Sigfredo I. Nin, Florian Pestoni, Wilfred E. Plouffe, Jr., Frank A. Schaffa
  • Patent number: 8654981
    Abstract: A system for processing multimedia channels is described comprising: transmitting decryption keys for decrypting the multimedia channels, the keys encrypted in both a first encryption format and a second encryption format; the keys encrypted in the first encryption format being decryptable by a first type of multimedia receiver; and the keys encrypted in the second encryption format being decryptable by a second type of multimedia receiver.
    Type: Grant
    Filed: December 5, 2008
    Date of Patent: February 18, 2014
    Assignee: AARIS Enterprises, Inc.
    Inventors: William M. Gillon, Stephen G. Perlman
  • Patent number: 8656486
    Abstract: An electronic device may include a communications interface, a user prompting device, a biometric sensor, and a controller. The controller may perform biometric spoof detection with the biometric sensor, and receive a request for human presence verification from a remote device via the communications interface. The controller may also prompt the user for a verification action using the sensor based upon receiving the request, and determine that the user has completed the verification action in response to the prompting and based upon the biometric spoof detection. The controller may further send a response to the remote device via the communications interface and based upon determining that the user has completed the verification action. The controller may send a notification to the remote device that there is a biometric sensor.
    Type: Grant
    Filed: February 12, 2010
    Date of Patent: February 18, 2014
    Assignee: Authentec, Inc.
    Inventors: Glenn Hicks, Richard Albury, James W. Neil
  • Patent number: 8656179
    Abstract: A system for encrypting Secure Volumes using an encryption key which is saved in the open after being encoded inside a hardware token device utilizing a secure secret which is stored inside the device, and which never leaves the device. The encrypted volume can be accessed again only after a hardware token has decoded this encryption key. The system also provides means whereby the holder of a Master token and the holder of a Grand Master token may also have access to the volume as long as the user token was previously registered to the Master token, and the Master Token was previously registered to the Grand master token before the secured volume was encrypted. Also, the system allows members of user groups so designated at the time the volume is encrypted, to be able to have access to the volume as long as their token was previously registered with the same Master Token as the user that encrypted the volume and as long as the token encrypting the volume was also a member of the authorized user group.
    Type: Grant
    Filed: March 3, 2009
    Date of Patent: February 18, 2014
    Inventors: Roger E. Billings, John A. Billings
  • Patent number: 8649515
    Abstract: An owner of media data encrypts the media data using a session key. The session key is encrypted using a public key of a designated recipient of the media data. A key manager provides the encrypted session key to the recipient while the owner is sharing the media data with the recipient. The encrypted media data is published and accessed by the recipient over a public computer network. The encrypted session key and the encrypted media data are received in the recipient's computer, where the encrypted session key is decrypted into the session key using the recipient's private key and the encrypted media data is decrypted into the media data using the session key. When the owner is no longer sharing the media data with the recipient, the recipient is prevented from further receiving the encrypted session key from the key manager.
    Type: Grant
    Filed: February 8, 2010
    Date of Patent: February 11, 2014
    Assignee: Trend Micro Incorporated
    Inventors: Xiaoming Zhao, Gang Chen
  • Patent number: 8646070
    Abstract: A storage area network management application operates using agents for management of resources. Authenticity is verified in installing an agent on a host computer system in the storage area network. A file is identified for use in installing the agent. The file is signed to produce a digital signature for the file. A certificate is sent to a recipient for use in verifying authenticity of information. The file and digital signature are sent to the recipient. At the recipient, the certificate and the digital signature are used to verify the file. An agent installation operation is performed, using the file, to install the agent on the host computer system.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: February 4, 2014
    Assignee: EMC Corporation
    Inventors: Svetlana Patsenker, Benjamin Thrift, Boris Farizon, Mordechai Zvi Zur, Sylvia Martin, Jeffrey B. Lee, Nigel B. Hislop, Eric Baize
  • Patent number: 8646051
    Abstract: A method for resetting Internet access account passwords can include the step of connecting a user with an interactive voice response system (IVR). At least one access account associated with the user can be determined. The IVR can validate that the user is authorized to access the access account. The IVR can then cause a password associated with the at least one access account to be reset. The IVR can also present the reset password to the user.
    Type: Grant
    Filed: September 10, 2004
    Date of Patent: February 4, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Jonathan Paden, Bobby Sams, Kurt M. Joseph, Donna McCaffrey, Jon Harris
  • Patent number: 8635702
    Abstract: A machine-actionable memory comprises one or more machine-actionable records arranged according to a data structure. Such a data structure may include links that respectively map between: a RID field, the contents of which denote an identification (ID) of a remediation (RID); at least one TID field, the contents of which denotes an ID of at least two technologies (TIDs), respectively; and at least one ACTID field, the contents of which denotes an ID of an action (ACTID). A method, of selecting a remediation that is appropriate to a technology present on a machine to be remediated, may include: providing such a machine-actionable memory; and indexing into the memory using a given RID value and a given TID value to determine values of the at-least-one ACTID corresponding to the given RID value and appropriate to the given TID value.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: January 21, 2014
    Assignee: Fortinet, inc.
    Inventors: Kurt D'Mello, David Spencer Tyree, Sudhir Gandhe, Eric David O'Brien
  • Patent number: 8625788
    Abstract: A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: January 7, 2014
    Assignee: Intel Corporation
    Inventors: Ramesh Pendakur, Walter C. Gintz, Daniel Nemiroff, Mousumi M. Hazra
  • Patent number: 8612754
    Abstract: A method provides data loss protection of sensitive data using digital fingerprinting. The method includes assigning a security level to each document of a plurality of documents associated with a data loss protection server, and storing the plurality of documents in a digital asset management server, wherein only a single copy of each document of plurality of documents is stored in the digital asset management server. The method also includes sending a query to the digital asset management server from the data loss protection server, and receiving a query response by the data loss protection server from the digital asset management server, the query response including at least one document file. The method further includes creating a digital fingerprint of the at least one document file by the data loss protection server.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: December 17, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Stephen Norton
  • Patent number: 8613085
    Abstract: Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine state information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack.
    Type: Grant
    Filed: November 11, 2009
    Date of Patent: December 17, 2013
    Assignee: Broadcom Corporation
    Inventors: Wael William Diab, Bruce Currivan, Jeyhan Karaoguz, Yongbum Kim, Kenneth Ma, Michael Johas Teener
  • Patent number: 8607329
    Abstract: An information succession system, which operates in accordance with inputted information to provide access to inputted information, including the personality of the original user, to successors of the original user. An encryption processing unit encrypts inputted information and generates keys used in association with access by users. A character/personality data generation unit generates data indicative of a user's character or personality by analyzing user input information. That character data is stored in a character data memory unit and is associated with the user's identification information. A request information analysis unit analyzes and characterizes requests. Request characteristics are stored in the character data memory unit and associated with the user making the request. A transmitting information generation unit generates transmitting (output) information based on the generated personality data of the user and the characteristic of the request.
    Type: Grant
    Filed: December 18, 2008
    Date of Patent: December 10, 2013
    Assignee: Icon Corp.
    Inventor: Toshiko Tsuchiya
  • Patent number: 8607303
    Abstract: Techniques for modification of access expiration conditions are presented. A principal supplies a password associated with establishing access to a target resource. In response to the password, characteristics of the password are examined and a custom expiration condition is generated for the password in response to the characteristics and policy. When the custom expiration condition is satisfied, the password and access to the target resource become invalid for use. Moreover, the principal may interactively change a complexity level of any proposed password for purposes of attempting to enhance the expiration condition or for purposes of attempting to degrade the expiration condition.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: December 10, 2013
    Assignee: Apple Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch
  • Patent number: 8555353
    Abstract: Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge.
    Type: Grant
    Filed: January 23, 2008
    Date of Patent: October 8, 2013
    Assignee: Carnegie Mellon University
    Inventors: Luis Von Ahn, Manuel Blum, Benjamin D. Maurer