Patents Examined by Ronald Baum
  • Patent number: 8826023
    Abstract: Various methods and systems for securing access to hash-based storage systems are disclosed. One method involves receiving information to be stored in a storage system from a storage system client and then generating a key. The key identifies the information to be stored. The value of the key is dependent upon a secret value, which is associated with the storage system. The key is generated, at least in part, by applying a hash algorithm to the information to be stored. The key can then be returned the key to the storage system client. The storage system client can then use the key to retrieve the stored information.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: September 2, 2014
    Assignee: Symantec Operating Corporation
    Inventor: Craig K. Harmer
  • Patent number: 8819773
    Abstract: A system for security self-assessment for a computer platform. The system comprises a memory, a processor, and an application stored in the memory. When executed by the processor, the application in association with a call to action transmits security self-assessment logic and at least one security self-assessment policy to a computer platform, wherein the security self-assessment policy defines at least one scan tool to be used by the security self-assessment logic when executed on the computer platform to perform a security self-assessment of the computer platform. The system further comprises a plurality of scan tools stored in the memory and accessible for downloading by the computer platform. The security self-assessment logic is configured to cause a processor of the computer platform to download at least one scan tool defined by the security self-assessment policy and to perform a security self-assessment.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: August 26, 2014
    Assignee: Iscan Online, Inc.
    Inventor: Carl Banzhof
  • Patent number: 8819405
    Abstract: The invention relates to a system for remotely accessing a mass storage unit and a security storage unit in a portable communicating object. According to the invention, a terminal, such as a mobile device, which is associated with a portable communicating object, such as a multimedia smart card, includes an agent for facilitating access from a server to a mass storage unit capable of storing multimedia data and a security storage unit in the portable communicating object via a communication network. The agent establishes a single communication channel between the remote server and the terminal and processes data transmitted from one of the two elements including the server and one of the storage units of the portable communicating object to the agent so that the agent can transmit the data to the other of the two elements.
    Type: Grant
    Filed: February 2, 2007
    Date of Patent: August 26, 2014
    Assignee: Gemalto SA
    Inventors: Frëdëric Martinent, Anthony Bord, Franck Mosse
  • Patent number: 8819815
    Abstract: Aspects of the present invention are directed to a method and system for distributing information from an information distributor in a banking environment. The method may include composing an electronic notification instrument by providing a notification component and providing a payload component, the payload component including a selectable link. The method may additionally include pushing the electronic notification instrument to an information client and allowing a pull from the information distributor through the electronic notification instrument such that the payload component including the selectable link is activated by an authorized information recipient, the authorized information recipient determined by the information client. The method may additionally include determining through a tracer whether the electronic notification instrument has an acceptable disposition and rendering the electronic notification instrument inaccessible if the disposition is not acceptable.
    Type: Grant
    Filed: October 16, 2007
    Date of Patent: August 26, 2014
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: Sih Lee, Adrian Kunzle
  • Patent number: 8811620
    Abstract: Implementations of the present disclosure are directed to sharing data in a supply chain, the data corresponding to an item having a tag associated therewith. Methods include determining a random number from the tag, the random number being unique to the item, selecting a first integer and a second integer, generating a first public key based on the first integer and a semi-public key based on the second integer, generating an identifier based on the first public key and the random number, generating a key based on the semi-public key and the random number, encrypting the data using the key to provide encrypted data, defining a tuple comprising the identifier and the encrypted data, and transmitting the tuple over a network for storage in a persistent storage device.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: August 19, 2014
    Assignee: SAP AG
    Inventors: Leonardo Weiss F. Chaves, Florian Kerschbaum
  • Patent number: 8806590
    Abstract: Architecture for generating a temporary account (e.g., an email address) with a user-supplied friendly name and a secret used to the sign the temporary account. For example, when a user wishes to create a temporary email address to use with an online organization, a friendly name is provided and the system generates a temporary email address including the friendly name. A signing component signs the temporary email address with a secret. One or more of these secrets can be provisioned prior to the user's creation of a friendly name, which eliminates propagation delay. During use, only incoming email messages having the temporary email address signed with the secret are validated. When the user revokes the temporary email address, the secret is revoked and the revocation is propagated to network gateways, rejecting any email sent to that address.
    Type: Grant
    Filed: June 22, 2008
    Date of Patent: August 12, 2014
    Assignee: Microsoft Corporation
    Inventors: Charles R. Salada, Mayerber Carvalho Neto, Charlie Chung, Mayank Mehta
  • Patent number: 8800040
    Abstract: A computer-implemented method for prioritizing the monitoring of malicious uniform resource locators for new malware variants may comprise: 1) identifying at least one malicious uniform resource locator, 2) collecting priority information relating to the malicious uniform resource locator, wherein the priority information comprises information relevant to prioritizing monitoring of the malicious uniform resource locator for new malware variants, 3) determining, based on the priority information, a monitoring-priority level for the malicious uniform resource locator, and then 4) allocating, based on the monitoring-priority level, a monitoring resource for monitoring the malicious uniform resource locator. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: August 5, 2014
    Assignee: Symantec Corporation
    Inventors: Xiao Dong Tan, Fan Bai, Yin Ming Mei
  • Patent number: 8781110
    Abstract: A system for performing public key encryption is provided. The system supports mathematical operations for a plurality of public key encryption algorithms such as Rivert, Shamir, Aldeman (RSA) and Diffie-Hellman key exchange (DH) and Elliptic Curve Cryptosystem (ECC). The system supports both prime fields and different composite binary fields.
    Type: Grant
    Filed: June 30, 2007
    Date of Patent: July 15, 2014
    Assignee: Intel Corporation
    Inventors: Vinodh Gopal, Erdinc Ozturk, Gilbert Wolrich, Wajdi K. Feghali
  • Patent number: 8776250
    Abstract: Disclosed in this specification is a method and program storage device for comparing two sets of private data without revealing those private data. If the comparison deems the two data sets sufficiently similar, helper data may be provided to permit reconstruction of one of the private data sets without transmission of that private data set.
    Type: Grant
    Filed: July 9, 2012
    Date of Patent: July 8, 2014
    Assignee: Research Foundation of the City University of New York
    Inventors: Bon K. Sy, Arun Prakash Kumara Krishnan
  • Patent number: 8750509
    Abstract: A wireless surveillance system and methods of operating same, providing at least one data input capture device (ICDs), including cameras which have the ability to capture video, audio, and/or data from sensors such as temperature and humidity data, while being newly or retrofittably releasably mountable to a track lighting system.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: June 10, 2014
    Assignee: Smartvue Corporation
    Inventor: Martin Renkis
  • Patent number: 8712057
    Abstract: A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received information using an internal key or a preprogrammed key to form a descrambled key or descrambled data. A data feedback path stores the descrambled data as internal data and provides the internal data or the external data as data input to the first cryptographic block. A key feedback path stores the descrambled key as an internal key and provides the internal key or the preprogrammed key to a key input of the first cryptographic block. A second cryptographic block descrambles received content using a final descrambling key. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 21, 2008
    Date of Patent: April 29, 2014
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventor: Brant Candelore
  • Patent number: 8656174
    Abstract: The invention provides a method of recovering from de-synchronization attacks includes registering original and altered digital content using nonlinear transformations to iteratively attempt to provide better-approximated registration. Approximation occurs at more than one level of granularity, by selecting among a greater number of possible transformation functions at each step. Transformations and comparisons might be conducted directly on pixel values, on coefficients for a set of basis wavelets, or on some transformation of the original and altered digital content. A human operator might assist this process, such as by suggesting transformations or providing evaluation of the degree of registration. Upon resynchronization, embedded identifying information in the original digital content is recovered.
    Type: Grant
    Filed: February 16, 2007
    Date of Patent: February 18, 2014
    Assignee: Kaleidescape, Inc.
    Inventor: Stephen Watson
  • Patent number: 8634550
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: April 15, 2011
    Date of Patent: January 21, 2014
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 8635688
    Abstract: An image processing apparatus, comprising: an input portion that inputs image data of a plurality of pages of document; a password detector that detects a password given to each of the pages; a password judger that judges from a detecting result drew by the password detector about each of the pages, whether or not a shared password issued for each page in common is detected in addition to an individual password uniquely issued for each page; an entry requester that requests entry of a shared password if it is judged by the password detector that a shared password is detected, and requests entry of an individual password about each of the pages if it is judged by the password detector that a shared password is not detected; and an output permitting portion that permits image data of all the pages each having a shared password, which is the image data inputted by the input portion, if the appropriate shared password is entered in response to the request for entry of a shared password, and permits image data of
    Type: Grant
    Filed: October 22, 2007
    Date of Patent: January 21, 2014
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventors: Kazuhiro Ishiguro, Takayuki Nabeshima, Hideyuki Toriyama, Hiroyuki Suzuki, Masaaki Saka
  • Patent number: 8625801
    Abstract: An authentication associated suite discovery and negotiation method for ultra wide band network. The method includes the following steps of: 1) adding a pairwise temporal key PTK establishment IE and a group temporal key GTK distribution IE in an information element IE list of an initiator and a responder, and setting a corresponding information element identifier ID, and 2) an authentication associated process based on the authentication associated suite discovery and negotiation method. The authentication associated suite discovery and negotiation method for ultra wide band network provided by the present invention can provide the discovery and negotiation functions of a security solution to the network so as to satisfy all kinds of application requirements better when multiple pairwise temporal key PTK establishing plans or multiple group temporal key GTK distributing plans co-exist.
    Type: Grant
    Filed: December 8, 2009
    Date of Patent: January 7, 2014
    Assignee: China IWNCOMM Co., Ltd.
    Inventors: Yanan Hu, Jun Cao, Yuelei Xiao, Manxia Tie, Zhenhai Huang, Xiaolong Lai
  • Patent number: 8627492
    Abstract: An image processing apparatus comprising: an input portion that inputs image data of a plurality of pages of document; a password detector that detects a password given to each of the pages; a password judger that judges from the detecting results drew by the password detector whether or not different passwords are detected from each of the pages; a correlation judger that judges about each of the pages if the password judger judges that different passwords are detected from each of the pages, whether or not the passwords are correlated to each other; and an output permitting portion that permits the image data of all the pages, which are the image data inputted by the input portion, to be outputted without requesting entry of all passwords, if it is judged about each of the pages that the passwords are correlated to each other, on the other hand, requests entry of a password about each of the pages if it is judged about at least one of the pages that the passwords are not correlated to each other, then permi
    Type: Grant
    Filed: October 22, 2007
    Date of Patent: January 7, 2014
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventors: Kazuhiro Ishiguro, Takayuki Nabeshima, Hideyuki Toriyama, Hiroyuki Suzuki, Masaaki Saka
  • Patent number: 8619850
    Abstract: An integrated real-time display is provided that includes video images and a graphical representation of the transmission path, where each video image is associated with a point along the graphical representation of the transmission path. A number of monitoring points, which correspond to critical points along the transmission path are identified. The points may be selected for technical reasons or economic reasons. The graphical representation of the transmission path can be a logical representation showing the logic blocks along the transmission path or a physical representation showing the devices along the transmission path.
    Type: Grant
    Filed: March 14, 2007
    Date of Patent: December 31, 2013
    Assignee: The Weather Channel, LLC
    Inventors: Michael W. Smereski, Robert D. Butler
  • Patent number: 8615798
    Abstract: The present invention provides a method and system of receiving data in a data store in a server computer system. In an exemplary embodiment, the method and system include (1) receiving client authentication information of a client computer system, (2) receiving a data signature of the data from the client computer system, and (3) attempting to locate in the data store at least one data chunk with a stored data signature equal to the received data signature.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: December 24, 2013
    Assignee: International Business Machines Corporation
    Inventor: Mark A. Smith
  • Patent number: 8613089
    Abstract: A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud-based proxy service; and responsive to determining that there are a plurality of domains that resolve to that IP address, identifying the one of the plurality of domains that is the target of the DoS attack. The domain that is under attack is identified by scattering the plurality of domains to resolve to different IP addresses, where a result of the scattering is that each of those domains resolves to a different IP address, and identifying one of those plurality of domains as the target of the DoS attack by determining that there is an abnormally high amount of traffic being directed to the IP address in which that domain resolves.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: December 17, 2013
    Assignee: Cloudflare, Inc.
    Inventors: Lee Hahn Holloway, Srikanth N. Rao, Matthew Browning Prince, Matthieu Philippe François Tourne, Ian Gerald Pye, Ray Raymond Bejjani, Terry Paul Rodery, Jr.
  • Patent number: 8613097
    Abstract: Embodiments of the present invention may detect an access attack by analyzing the passwords from successive access requests in an access session or by analyzing successive access attempts to determine patterns in the access information. For example, the analysis may consist of examining the access information to determine cycling in passwords of the access information. Cycling passwords may consist of password that are varied in a predictable or repetitive manner such as “aaaa”, “aaab”, “aaac”, “aaad”, etc. In addition, the usernames and passwords from successive access requests in an access session are analyzed to determine patterns in both the usernames and passwords. The analysis may consist of examining the access information to determine the use of identical passwords for various usernames. The analysis may also detect the cycling of passwords across multiple usernames.
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: December 17, 2013
    Assignee: Red Hat, Inc.
    Inventor: Robert B. Lord