Patents Examined by Randal Moran
-
Patent number: 8423786Abstract: A biometrics authentication device which detects body characteristics, performs verification against registered biometrics data, and performs individual authentication, by which confidentiality is improved even when biometrics data is separated, distributed and stored. A biometrics information key is created from biometrics data detected by a detection device, the biometrics data is divided into a plurality of portions, and the portions are stored on different media. The biometrics information key is stored on one media, and at the time of authentication, the separated biometrics data portions are combined and a biometrics information key is created and is compared with the biometrics information key, to judge the linked relationship. Hence confidentiality of the association of the individual separated data portions can be improved even when the biometrics data is separated, distributed and stored, contributing to prevent illicit use resulting from leakage or theft of biometrics data.Type: GrantFiled: September 11, 2007Date of Patent: April 16, 2013Assignees: Fujitsu Limited, Fujitsu Frontech LimitedInventors: Kazuo Takaku, Yasuhiko Mita, Naoko Suzuki, Shinya Iwasaki, Masayuki Yano, Ikuo Mutou
-
Patent number: 8407766Abstract: A method and apparatus for monitoring sensitive data on a computer network is described. In one embodiment, a method for protecting sensitive data from being leaked to a computer network comprises monitoring data related to a user that is presented on one or more web pages through a common interface, which enables a search for sensitive data on the one or more web pages of the one or more web sites and determining a disclosure of the sensitive data on a web page of one or more web pages.Type: GrantFiled: March 24, 2008Date of Patent: March 26, 2013Assignee: Symantec CorporationInventors: Keith Newstadt, Adam P. Schepis, Shaun Cooley
-
Patent number: 8379858Abstract: A method for generating key information for mutual access among multiple computers, the method including configuring each of a plurality of computers to access common seed data, where the common seed data is the same for each of the computers, and configuring each of the computers to intercept a key generator request for computer-specific seed data and, in response to the request, provide the common seed data to the key generator in place of the computer-specific seed data, thereby enabling any of the computers to generate the same key information.Type: GrantFiled: September 16, 2005Date of Patent: February 19, 2013Assignee: International Business Machines CorporationInventor: Shmuel Ben-Yehuda
-
Patent number: 8375211Abstract: An XML digital signature mechanism for providing message integrity. A sending party serializes a source XML document into a serialized byte array, calculates the source offset and length of the array of the signed part in the serialized byte array, and calculates a source hash value using the serialized array and the source offset and length. The serialized byte array is a non-canonicalized array. The array and source hash value used to sign a part or the whole of the serialized byte array is sent to a receiving party. The receiving party calculates the target offset and length of the signed part in the serialized byte array and calculates a target hash value of the signed part by using the array and the target offset and length. The receiving party compares the target hash value and the source hash value to verify the integrity of the target XML document.Type: GrantFiled: April 21, 2009Date of Patent: February 12, 2013Assignee: International Business Machines CorporationInventors: Hyen Vui Chung, Takahide Nogayama, Gregory Louis Truty, Kenichiro Ueno
-
Patent number: 8340283Abstract: A client generates a session key and a delegation ticket containing information for a requested delegation operation. The client generates a first copy of the session key and encrypts it using a public key of a proxy. The client generates a second copy of the session key and encrypts it using a public key of a server. The client then puts the encrypted session keys and delegation ticket into a first message that is sent to the proxy. The proxy extracts and decrypts its copy of the session key from the first message. The proxy then encrypts a proof-of-delegation data item with the session key and places it and the delegation ticket along with the encrypted copy of the session key for the server into a second message, which is sent to the server. The server extracts and decrypts its copy of the session key from the second message and uses the session key to obtain the proof-of-delegation data. Authority is successfully delegated to the proxy only if the server can verify the proof-of-delegation data.Type: GrantFiled: June 30, 2004Date of Patent: December 25, 2012Assignee: International Business Machines CorporationInventors: Anthony Joseph Nadalin, Bruce Arland Rich, Xiaoyan Zhang
-
Patent number: 8332658Abstract: A computer system in which an encryption-decryption process performed by one encryption-decryption module can be moved to another without stopping the process for a read/write request from a host computer. The computer system has a host computer, and a storage system for storing encrypted data. The storage system provides a storage area for accepting access from the host computer. In performing a process for changing the data encrypted and stored by the destination source, the move destination encrypts the data decrypted by the move source which further encrypts and stores the data encrypted by the move destination, and after all data is stored, the move source decrypts and stores the further encrypted data.Type: GrantFiled: January 3, 2008Date of Patent: December 11, 2012Assignee: Hitachi, Ltd.Inventors: Kyoko Mikami, Nobuyuki Osaki, Yuri Hiraiwa
-
Patent number: 8312513Abstract: After checking a receiving message appearing on an output device, a network administrator inputs an authentication result to a setting terminal using an input device, such as a keyboard. Upon receiving the authentication result from the network administrator, the setting terminal registers, if the received authentication result is permission to access a network device, a MAC address of a traveling employee's terminal that is the sender of the authentication request in the network device as an access permitted terminal. After the registering in the network device is completed, the setting terminal sends the authentication result indicative of permission to access the network device to the employee's terminal, i.e., the sender of the authentication request.Type: GrantFiled: December 31, 2009Date of Patent: November 13, 2012Assignee: Fujitsu LimitedInventors: Makoto Kubota, Kenichi Abiru
-
Patent number: 8301893Abstract: The present invention relates generally to digital watermarking and steganographic encoding. One claim recites a method including: receiving data corresponding to at least a portion of digital data; separating the data into a plurality of portions; determining a measure relative to a predetermined measure for each of the portions, wherein the measure comprises a measure related to a predetermined digital watermark signal; based at least in part on the measure, identifying which out of the plurality of portions are likely to host digital watermarking therein. Of course, other combinations are provided as well.Type: GrantFiled: October 23, 2007Date of Patent: October 30, 2012Assignee: Digimarc CorporationInventor: Trent J. Brundage
-
Patent number: 8302202Abstract: An apparatus, system, and method are disclosed that provides a user-specific transportable computing environment. The apparatus, system, and method facilitate users configuring their own personal computing environment on a properly configured computing host. Users can insert a personal environment key into the computing host and automatically activate and configure any software they are licensed to use. The personal environment key may include all the data, licenses, and keys necessary to activate software that the user has rights to use.Type: GrantFiled: August 3, 2005Date of Patent: October 30, 2012Assignee: International Business Machines CorporationInventor: Colin Scott Dawson
-
Patent number: 8296821Abstract: Each domain is provided with an access right management device which creates a resource-sharing policy and performs processing for resource-sharing policy negotiation between a plurality of domain administrators. An access right management device that has created a resource-sharing policy identifies, for each policy unit included in the resource-sharing policy, an access right management device that is a negotiating partner to negotiate with about the policy unit in question. The access right management device generates negotiation information including an identification name of the identified negotiating-partner access right management device and the policy unit in question and sends the negotiation information to the negotiating-partner access right management device. Only when all policy units are agreed on by respective identified negotiating-partner access right management devices, the resource-sharing policy is set on shared resources.Type: GrantFiled: February 8, 2008Date of Patent: October 23, 2012Assignee: NEC CorporationInventor: Masayuki Nakae
-
Patent number: 8290148Abstract: An encryption processing apparatus for performing common-key blockcipher processing, the encryption processing apparatus includes an encryption processing part that performs data transformation in which a round function is iterated for a plurality of rounds; and a key scheduling part that generates round keys used to execute the round function. The key scheduling part is configured to repeatedly apply an xs times multiplication over an extension field GF(2m), generated by an m-th order irreducible polynomial f(x) defined over GF(2), to an m-bit intermediate key generated by transformation of a secret key to generate a plurality of different round intermediate keys serving as data for generating a plurality of different round keys.Type: GrantFiled: August 29, 2007Date of Patent: October 16, 2012Assignee: Sony CorporationInventors: Toru Akishita, Taizo Shirai, Kyoji Shibutani, Shiho Moriai
-
Patent number: 8285996Abstract: A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system manages medical records in a secure manner. Each user has a private key issued by a KGC (5). A database controller (3) updates a secure database (3) with data and associated signatures generated by the user workstations (2). Thus every record of the secure database (3) has a signature to provide full traceability and non-repudiation of data edits/updates. It is important for the system (1) that the signatures are verified on a regular basis, say every hour. Such a task would be extremely processor-intensive if the database (3) is large. However this is performed by a verification processor (4) of the system (1) in a much shorter time than heretofore, t1+n(&Dgr;), where t1 is the time for one verification, n is the number of signatures, and &Dgr; is a time value which is a very small proportion of t1 (less than 1%).Type: GrantFiled: September 28, 2006Date of Patent: October 9, 2012Assignee: Dublin City UniversityInventors: Noel McCullagh, Michael Scott, Neil Costigan
-
Patent number: 8261063Abstract: Processing apparatus, such as a trusted platform, is provided with an access-control arrangement for handling a tree-structured hierarchy such as a key hierarchy. The access-control arrangement only permits access to a particular node of the hierarchy upon receiving a reliable indication that a mechanism expected to resist subversion will attempt to enforce appropriate access restrictions on that node. Such a mechanism is, for example, a protected process executing in a benign environment in the apparatus. The indication that the mechanism is in place is provided by a trusted source, such as a hardware root of trust responsible for initiating the mechanism. Access to the particular node opens the way to revealing that node, and any descendants, to the protected process.Type: GrantFiled: October 16, 2003Date of Patent: September 4, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventor: Graeme John Proudler
-
Patent number: 8245293Abstract: The present invention provides methods and apparatuses that utilize a plurality of portable apparatuses to securely operate a plurality of host computers. Each portable apparatus including an operating system and a list of software applications is installed in a removable data storage medium. An authorization procedure is implemented before establishing a connected-state operation between a portable apparatus and a host computer. The host computer loads the operating system in the portable apparatus into its random access semiconductor memory (RAM) through the established connected-state operation.Type: GrantFiled: March 30, 2007Date of Patent: August 14, 2012Inventor: Evan S. Huang
-
Patent number: 8220055Abstract: A method includes decreasing a suspicion of a negative action by an application if the application has previously performed a positive action. The positive action is an action that is never or rarely taken by malicious code. In one example, the positive action is use of a user interface element by the application to have a user interaction with a user of the computer system. By taking into consideration the positive action by the application, the occurrence of false positives is minimized.Type: GrantFiled: February 6, 2004Date of Patent: July 10, 2012Assignee: Symantec CorporationInventor: Mark K. Kennedy
-
Patent number: 8191139Abstract: A computer/computer network security alert management system aggregates information from multiple intrusion detectors. Utilizing reports from multiple intrusion detectors reduces the high false alarm rate experienced by individual detectors while also improving detection of coordinated attacks involving a series of seemingly harmless operations. An internal representation of a protected enclave is utilized, and intrusion detection system (IDS) information is correlated to accurately prioritize alerts. In one embodiment, the system is capable of utilizing data from most existing IDS products, with flexibility to add further IDS products.Type: GrantFiled: December 20, 2004Date of Patent: May 29, 2012Assignee: Honeywell International Inc.Inventors: Walter L. Heimerdinger, Jon P. Schewe
-
Patent number: 8145907Abstract: The invention concerns secure data transfer from a first radio communication device of a first party to a second radio communication device. A random first symmetric key is generated at the first terminal device. User data of the first terminal device is encrypted with the first symmetric key. The first symmetric key is encrypted with a public key of a third party. The encrypted first symmetric key is sent from the first terminal device to the second terminal device via a transfer device. The encrypted first symmetric key is decrypted at the second terminal device by utilizing a secret key associated with the public key and comprised in a security device of the third party. The encrypted user data is sent from the first terminal device to the second terminal device via the transfer device. The encrypted user data is decrypted at the second terminal device with the first symmetric key.Type: GrantFiled: September 22, 2006Date of Patent: March 27, 2012Assignee: Nokia CorporationInventors: Nadarajah Asokan, Timo Heikkinen
-
Patent number: 8139770Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.Type: GrantFiled: December 21, 2004Date of Patent: March 20, 2012Assignee: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
-
Patent number: 8108937Abstract: A registry access manager (101) regulates access to executable class registry entities (103). A registry access manager (101) intercepts system calls (107) that access a registry (113). The registry access manager (101) detects attempts by processes (115) to access executable path entities (103) in the registry (113). The registry access manager (101) determines whether a robust, multifaceted security policy permits the attempted access, and blocks or permits the access accordingly.Type: GrantFiled: April 26, 2004Date of Patent: January 31, 2012Assignee: Symantec CorporationInventor: Ahmed Sallam
-
Patent number: 8103881Abstract: The present invention provides a system, method and apparatus for securely granting access to an event. For example, in one embodiment of the present invention, an apparatus, such as an electronic card, ticket or information carrier, contains biometric data about a user. When the “ticket” is purchased or authenticated, event access information is stored on the electronic card or ticket by an entity authorized by the event provider. The user is allowed access to the event when the biometric data stored on the electronic card or ticket matches the user's biometric data and the event access information is validated. The user's biometric data is authenticated via a biometric sensor on the electronic card or ticket. The user's biometric data can also be authenticated by the entity granting access to the event.Type: GrantFiled: December 16, 2003Date of Patent: January 24, 2012Assignee: Innovation Connection CorporationInventors: Ralph O. Doughty, Patrick R. Antaki, Glennard D. Palmer, Robert M. Gilliom