Patents Examined by Robert Leung
  • Patent number: 8578473
    Abstract: A method of verifying a password and methods of encryption and decryption using a key generated from a one-time pad. In one embodiment, the method of verifying includes: (1) receiving a password attempt, (2) retrieving a pointer from memory, (3) searching a one-time pad based on the pointer to retrieve a password, (4) comparing the password attempt with the password and (5) generating a new pointer if the password attempt matches the password.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: November 5, 2013
    Assignee: LSI Corporation
    Inventor: Lloyd W. Sadler
  • Patent number: 8577023
    Abstract: A common-key blockcipher processing configuration with enhanced immunity against attacks such as saturation attacks and algebraic attacks (XSL attacks) is realized. In an encryption processing apparatus that performs common-key blockcipher processing, S-boxes serving as non-linear transformation processing parts set in round-function executing parts are configured using at least two different types of S-boxes. With this configuration, the immunity against saturation attacks can be enhanced. Also, types of S-boxes present a mixture of different types. With this configuration, the immunity against algebraic attacks (XSL attacks) can be enhanced, thereby realizing a highly secure encryption processing apparatus.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: November 5, 2013
    Assignee: Sony Corporation
    Inventors: Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai
  • Patent number: 8537893
    Abstract: A method for encoding high dynamic ränge (HDR) images involves providing a lower dynamic ränge (LDR) image, generating a prediction function for estimating the values for pixels in the HDR image based on the values of corresponding pixels in the LDR image, and obtaining a residual frame based on differences between the pixel values of the HDR image and estimated pixel values. The LDR image, prediction function and residual frame can all be encoded in data from which either the LDR image of HDR image can be recreated.
    Type: Grant
    Filed: September 7, 2006
    Date of Patent: September 17, 2013
    Assignee: Max-Planck-Gesellschaft zur Forderung der Wissenschaften E.V.
    Inventors: Alexander Efremov, Rafal Mantiuk, Grzegorz Krawczyk, Karol Myszkowski, Hans-Peter Seidel
  • Patent number: 8495710
    Abstract: Secure access in a computing environment is provided. One implementation involves a client generating a sequence for tapping server ports, and the client identifying itself to the server by tapping the server ports based on the sequence. The server verifies if the tapping sequence is correct. If the tapping sequence is correct, access is provided from the client to the server.
    Type: Grant
    Filed: December 11, 2009
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: David A. Barnes, Andrew J. Parker, Inga J. Chapman
  • Patent number: 8488783
    Abstract: An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient criteria for data, and encrypts the data using the selected one or more recipient criteria as a public key of identity-based encryption.
    Type: Grant
    Filed: February 19, 2010
    Date of Patent: July 16, 2013
    Assignee: Nokia
    Inventors: Sampo Sovio, Vesa-Veikko Luukkala
  • Patent number: 8468347
    Abstract: Apparatus, systems, and methods may operate to establish a secure communications tunnel between a server node and a client node, and to receive user requests from the client node at the server node via the secure communications tunnel. The user requests may be received in conjunction with a device verification token derived from nonces generated by the server node and transmitted to the client node as part of keep-alive response messages. The nonces may change according to a period of time established by the server node. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: February 19, 2009
    Date of Patent: June 18, 2013
    Assignee: EMC Corporation
    Inventors: Prakash Umasankar Mukkara, Ajith Kumar, Subbaraju Uppalapati, Vishnu Vardhan, Sureshkumar Thangavel
  • Patent number: 8452975
    Abstract: The present invention provides a signature generation device and a signature verification device capable of countering a transcript attack that seeks a private key by analyzing a plurality of signed documents (pairs of a message and a signature) signed using the NTRUSign signature scheme. The signature generation device calculates a hash value vector H of message data, adds a vector based on a private distribution to the hash value vector H to calculate a converted hash value vector H?, and seeks, as a signature vector S, the closest lattice point to the converted hash value vector H? in a lattice defined by private key basis vectors. The signature verification device determines whether the distance between the hash value vector H of the message data and the signature vector S is equal to or less than L? and, if so, recognizes the message data as valid.
    Type: Grant
    Filed: March 2, 2009
    Date of Patent: May 28, 2013
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Hiroki Shizuya, Shuji Isobe, Shingo Hasegawa
  • Patent number: 8434153
    Abstract: A user request to display an application while the device is locked is received. In response to this user request, one or more images generated by the application are obtained and displayed while the device is locked. Additionally, an indication of an application to be displayed upon resuming operation from a power-saving mode can be received, and an image generated by the application is displayed in response to resuming operation from the power-saving mode.
    Type: Grant
    Filed: August 24, 2009
    Date of Patent: April 30, 2013
    Assignee: Microsoft Corporation
    Inventors: Palani Sundaramurthy, Igor B. Peev, Robert Charles Johnstone Pengelly
  • Patent number: 8418251
    Abstract: A security module determines cost characteristics reflecting costs incurred in developing and/or deploying a software application, and determines whether the software application is malicious based at least in part on the cost characteristics. The security module determines (1) cost characteristics reflecting costs associated with an installer tool used to generate an installation package of the software application, (2) cost characteristics reflecting costs associated with a development tool used to develop the software application, and (3) cost characteristics reflecting costs incurred in deploying the software application. If the cost characteristics indicate that substantial cost was incurred in developing and/or deploying the application, the security module determines that the application is legitimate. Otherwise the security module considers other traits of the application to determine whether it is malicious.
    Type: Grant
    Filed: April 27, 2009
    Date of Patent: April 9, 2013
    Assignee: Symantec Corporation
    Inventor: Sourabh Satish
  • Patent number: 8395703
    Abstract: A display controller 102 sequentially outputs at least two image signals, thereby allowing an image to be displayed on a liquid crystal display section 105 in accordance with the image signals, wherein among the image signals to be outputted, an image signal of a first output image and an image signal of a second output image have a relationship that provides an image having no correlation to the first output image when image brightness values of the respective signals are added for each pixel, and wherein a frame frequency when the image signal is outputted is an integral multiple of a frame frequency for an image signal of an input image, the integral multiple being two or more.
    Type: Grant
    Filed: February 6, 2008
    Date of Patent: March 12, 2013
    Assignee: NEC Corporation
    Inventors: Daigo Miyasaka, Masao Imai
  • Patent number: 8392988
    Abstract: A terminal device according to the present invention includes: a first domain configured to execute multiple software programs; and a second domain configured to operate independently of the first domain and to check whether or not the software programs are safe. The second domain includes: an execution sequence storage unit configured to store execution priority of the multiple software programs to be executed by the first domain; a software program checking unit configured to check whether or not the multiple software programs are safe, according to the execution sequence storage unit; and an execution restricting unit configured to restrict the first domain from executing a software program included in the multiple software programs and having a check result indicating that the software program is unsafe, before checking of all the multiple, software programs is completed.
    Type: Grant
    Filed: February 12, 2008
    Date of Patent: March 5, 2013
    Assignee: NTT DoCoMo, Inc.
    Inventors: Ken Ohta, Hisashi Oguma
  • Patent number: 8321950
    Abstract: To prevent theft of protected content when IPTV services are provided, a conditional access device (CAD) is connected to a personal computer (PC). An application is launched on the PC from the CAD over universal serial bus (USB) interface. The application configures the PC to allow a user to receive secure internet protocol television (IPTV) services. The conditional access device and an IPTV service provider determine user access to the IPTV services via a network by using a trusted computing base (TCB) on the CAD and keys stored on the CAD. The application decrypts and decodes the IPTV services using the processing and storage capability of the PC. The CAD also receives and processes remote control signals received from a remote control interface. The remote control signals are requests or responses from the user interacting with the application. The application displays content requested by the user or indications of responses by the user via a user interface on the PC.
    Type: Grant
    Filed: March 20, 2009
    Date of Patent: November 27, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: David R. Oran
  • Patent number: 8306221
    Abstract: In an image encryption apparatus for visually encrypting an input image, an encryption area selector selects an encryption area within an input image including an area to be encrypted. An image converter divides the encryption area into a plurality of blocks. The image converter divides each block of the encryption area into a plurality of sub-blocks. An image converter performs an image conversion including rotation and mirror-reverse in accordance with an encryption key on the image in each sub-block. The image converter scrambles the image on a block-by-block basis in accordance with the encryption key. A pixel value converter converts a pixel value of a minimal area in a block so that a position of the block may be detected.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: November 6, 2012
    Assignee: Fujitsu Limited
    Inventors: Jun Takahashi, Taizo Anan, Kensuke Kuraki, Shohei Nakagata
  • Patent number: 8302210
    Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.
    Type: Grant
    Filed: August 24, 2009
    Date of Patent: October 30, 2012
    Assignee: Apple Inc.
    Inventors: Ginger M. Myles, Srinivas Vedula, Gianpaolo Fasoli, Julien Lerouge, Tanya Michelle Lattner, Augustin J. Farrugia
  • Patent number: 8272065
    Abstract: A web browser client includes an aggregated web application runtime environment that controls access by a program fragment of an aggregated web application to a resource therein based upon the originating domain of the program fragment. To do so, the aggregated web application runtime environment appends an access attribute to the Document Object Model (DOM) node associated with the resource. This access attribute is associated with a plurality of access rights definitions where each access rights definition defines a set of access rights to the resource for program fragments originating from a domain with a specific access rights status. Accordingly, the aggregated web application runtime environment sets one or more access rights statuses of the originating domain of the program fragment, and thereafter, grants or denies the program fragment access to the resource based upon one or more sets of access rights defined for that program fragment.
    Type: Grant
    Filed: March 11, 2009
    Date of Patent: September 18, 2012
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Jan Patrik Persson, Björn Johansson, Song Yuan
  • Patent number: 8266709
    Abstract: A play limit is set for a media file. The play limit can be, for example a date, or a number of times that the file has been played. When the file exceeds the play limit, the quality of the file playing is degraded.
    Type: Grant
    Filed: February 4, 2009
    Date of Patent: September 11, 2012
    Assignee: Harris Technology, LLC
    Inventor: Scott C. Harris
  • Patent number: 8266673
    Abstract: System(s) and method(s) that employ deep packet inspection (DPI) of data flow relating to a requested service associated with a communication device to facilitate customizing the service or results provided by the service are presented. A service request can be received by a gateway identification of the service is attempted. If the service is identified, a privacy rule(s), which is contained in a user privacy profile of a user associated with the communication device, is analyzed to determine whether the privacy rule(s) applies to the service. If the privacy rule(s) is applicable, a DPI engine performs DPI on the data flow, in accordance with the privacy rule(s), to obtain information that can be used to customize the service or results provided by the service. The user can specify the level of DPI to be applied. A default rule can specify that no DPI is performed on the data flow.
    Type: Grant
    Filed: March 12, 2009
    Date of Patent: September 11, 2012
    Assignee: AT&T Mobility II LLC
    Inventors: Qingmin James Hu, Farooq Bari
  • Patent number: 8266698
    Abstract: One or more behavior-based features describing an execution of an application on a client are generated. One or more client-specific features are generated, wherein the client-specific features describe aspects of the client. A malware score is generated based on the behavior-based features and the client-specific features. Whether the application is a malware threat is determined based on the malware score and a result of the determination is stored.
    Type: Grant
    Filed: March 9, 2009
    Date of Patent: September 11, 2012
    Assignee: Symantec Corporation
    Inventors: Vijay Seshardi, Zulfikar Ramzan, Sourabh Satish, Chandrasekhar Kalle
  • Patent number: 8261361
    Abstract: Various exemplary user interfaces, methods and computer program products describe enabling sharing of mobile communication devices. This process utilizes a shared mode for an owner of the mobile communication device to create a virtual environment for a borrower of the mobile communication device, which allows content information (e.g., certain applications and files) to be accessible and visual to the borrower. The process allows an owner of the mobile communication device to track and to manage data created or changed by the borrower. The owner may accept or reject the changes made in the content information. Furthermore, the process conceals non-shared resources to the borrower.
    Type: Grant
    Filed: March 11, 2009
    Date of Patent: September 4, 2012
    Assignee: Microsoft Corporation
    Inventors: Yunxin Liu, Yongguang Zhang, Lin Zhong
  • Patent number: 8229122
    Abstract: Provided are a shared key transmission apparatus, an automatic teller machine (ATM), and a controlling method thereof. The shared key transmission apparatus may include: a reception unit receiving, from the ATM, a first cryptogram where a random number is encrypted; a decryption unit restoring the random number from the first cryptogram; an encryption unit encrypting the shared key using the restored random number; and a transmission unit transmitting the encrypted shared key to the ATM. The ATM may include: an encryption unit generating a random number and encrypting the random number to generate a first cryptogram; a transmission unit transmitting the first cryptogram to the shared key transmission apparatus; a reception unit receiving, from the shared key transmission apparatus, a shared key that is encrypted using the restored random number; and a decryption unit restoring the shared key from the encrypted shared key using the generated random number.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: July 24, 2012
    Assignee: Nautilus Hyosung Inc.
    Inventors: Boick Chang, Seungtaek Lim, Sungsuk Hong