Patents Examined by Sayed Beheshti Shirazi
-
Patent number: 8549643Abstract: A computing device executing a data loss prevention (DLP) system tracks bait data on at least one of the computing device or a network. The DLP system identifies a potential security threat in response to detecting unscripted activity associated with the bait data. The DLP system performs an action in response to identifying the potential security threat.Type: GrantFiled: April 4, 2011Date of Patent: October 1, 2013Assignee: Symantec CorporationInventor: Darren Shou
-
Patent number: 8533778Abstract: A security system, method and computer program product are provided. In use, a request destined to a target computer is received, utilizing a virtual machine. The request is processed to identify an unwanted effect associated therewith, utilizing the virtual machine. In addition, the target computer is allowed access to the request, based on the processing.Type: GrantFiled: June 23, 2006Date of Patent: September 10, 2013Assignee: McAfee, Inc.Inventor: Gregory William Dalcher
-
Patent number: 8526609Abstract: A system, method and device for real-time compositing of encrypted video streams without having to decrypt each video stream is disclosed herein. A shared encryption key is derived to encrypt multiple incoming video streams to an encrypted master video stream, while retaining full interoperability with popular incumbent video encryption standards. Compositing video is then possible without having to decrypt the master video stream, thereby preserving the security of the copyrighted material. The invention preferably genlocks a digital video source to a master video stream.Type: GrantFiled: June 22, 2012Date of Patent: September 3, 2013Assignee: BBY Solutions, Inc.Inventor: Andrew Shane Huang
-
Patent number: 8522355Abstract: Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination of a triggering event. Once it is determined that a triggering event has occurred, each application operating on the mobile device is caused to immediately unreference sensitive objects and a secure garbage collection operation is performed upon the unreferenced sensitive objects to render data associated therewith unreadable. The mobile device is then caused to enter a secure state, in which the mobile device cannot be accessed without authorization. A microprocessor within the mobile device is configured to determine the existence of the triggering event according to a configuration data structure and to perform the secure garbage collection.Type: GrantFiled: October 17, 2011Date of Patent: August 27, 2013Assignee: Research In Motion LimitedInventors: Herbert Anthony Little, Neil Patrick Adams, Michael Kenneth Brown, Michael Stephen Brown
-
Patent number: 8522323Abstract: A system and method identifies one of several security token services that can be used to convert an identity token into one containing content, a format and having a signature corresponding to a signing key name that a software service can use. The identification of the security token service that may be used to perform the conversion is made using machine readable information about the signing key name that the software service can use.Type: GrantFiled: September 12, 2011Date of Patent: August 27, 2013Assignee: Charles Schwab & Co., Inc.Inventor: Valery Zubovsky
-
Patent number: 8522011Abstract: The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a public key and a private key, wherein the method comprises selecting the user to be authenticated using a pseudonym of said user, wherein said pseudonym comprises the public key of the user, the method further comprising performing a cryptographic authentication of the user using the asymmetric cryptographic key pair.Type: GrantFiled: November 3, 2010Date of Patent: August 27, 2013Assignee: Compugroup Holding AGInventors: Adrian Spalka, Jan Lenhardt
-
Patent number: 8495371Abstract: In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network aggregation device includes one or more optical Ethernet switches that can be adaptively configured to support authentication of one or more ONTs. For example, the optical network aggregation device may include a controller with an authentication unit for managing ONT authentication and an optical Ethernet interface for transmitting and receiving data over the optical network. The authentication unit may exchange authentication request messages via the optical Ethernet interface with an ONT and grant the ONT access to the provider network based on the exchange, thereby preventing rogue devices from gaining access to the provider network.Type: GrantFiled: January 6, 2010Date of Patent: July 23, 2013Assignee: Calix, Inc.Inventors: Berkay Baykal, Shaun Noel Missett
-
Patent number: 8477852Abstract: Described herein are embodiments for decoding and displaying video data. Several of these embodiments utilize a unified frame buffer management system, to facilitate better memory management in decoding and displaying compressed video. One approach describes a method of decoding and displaying compressed video data. The method involves receiving a compressed video frame, and allocating a frame buffer for use in decoding the compressed video frame. A frame identifier is assigned to the allocated frame buffer. The compressed video frame is decoded into the frame buffer, and the frame identifier is passed to a display module.Type: GrantFiled: June 20, 2007Date of Patent: July 2, 2013Assignee: Nvidia CorporationInventor: Wei Jia
-
Patent number: 8479290Abstract: A method of remotely treating malicious mobile terminals connected to a mobile communications network. In one embodiment, when a malicious mobile terminal is detected by the intrusion-detection services of the network, the network changes the subscriber profile associated with the mobile terminal to operate the latter in a quarantine mode. The packet-switched subsystem of the network then links the quarantined mobile terminal to a remediation manager. The remediation manager remotely treats the mobile terminal, e.g., to repair or reinstall any corrupted software, terminate any active malicious processes, delete or quarantine any malware, and restore the operating system, configuration, and/or memory of the mobile terminal to a clean operational state. After the treatment, the network reverts the subscriber profile back to the initial state and removes the mobile terminal from the quarantine.Type: GrantFiled: June 16, 2010Date of Patent: July 2, 2013Assignee: Alcatel LucentInventors: Harish Viswanathan, Dimitrios Stiliadis
-
Patent number: 8473753Abstract: When software is delivered to a customer, there are often programs or routines of programs that a software distributor intended to run under the credentials of a specific user other than the user who started the program. A secure method is proposed for software running in a process to acquire rights to issue restricted operations. A trusting entity trusts a process based on verifying ownership of code residing in the process. The trusted process is granted rights by the trusting entity to perform any or specific operations under the credentials of a specific user, not necessarily the current process user.Type: GrantFiled: September 9, 2011Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Eric Kass, Joachim Kern
-
Patent number: 8468344Abstract: According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that is operable to be executed by the one or more processors. The base operating system may be operable to implement a single security level. The mass storage device may also comprise a virtual operating system that is operable to be executed by the one or more processors. The virtual operating system may be executed using a virtualization tool that is executed by the base operating system. The virtual operating system may be operable to process information according to a plurality of security levels and communicate the information to one or more computing systems. The information may be communicated according to the plurality of security levels of the information.Type: GrantFiled: May 25, 2010Date of Patent: June 18, 2013Assignee: Raytheon CompanyInventors: Daniel Teijido, Randall S. Brooks
-
Patent number: 8464065Abstract: The object of the present invention is to safeguard the authenticity and integrity of real-time data in a distributed real-time computer system. The present invention considers other requirements of real-time data processing, such as the timeliness of real-time data transmission and limited resource availability. Frequent modification of an asymmetric key pair hinders intruders from cracking a key before its validity has expired. The present method can also be extended to safeguard the confidentiality of real-time data. It can be implemented efficiently on a multiprocessor system-on-chip (MPSoC).Type: GrantFiled: June 10, 2008Date of Patent: June 11, 2013Assignee: FTS Computertechnik GmbHInventor: Hermann Kopetz
-
Patent number: 8458457Abstract: Embodiments of the present invention provide a pre-compression encoding capability for encoding a CRL, such as an X.509 CRL, stored as a file, data structure or data object in a computer system having a certification authority (CA) and a security client prior to compression. An exemplary method provides for accessing the CRL contents and performing an encoding procedure.Type: GrantFiled: February 2, 2007Date of Patent: June 4, 2013Assignee: Red Hat, Inc.Inventor: Steven W. Parkinson
-
Patent number: 8438619Abstract: An system for controlling access to a network by a user device. The system includes a criteria engine that generates a plurality of criteria to be monitored on the user device and a checker that generates at least one check for each of the plurality of criteria. The system further includes a profiler that retrieves a profile for the user device, the profile including the plurality of criteria and the at least one check for each of the plurality of criteria, a comparator that compares a summary of the retrieved profile to a summary of a profile received from the user device and a communicator that communicates a message to the user device based on the comparison.Type: GrantFiled: September 21, 2007Date of Patent: May 7, 2013Assignee: NetMotion Wireless Holdings, Inc.Inventor: Erik Olson
-
Patent number: 8429408Abstract: To mitigate the effects of a weak random number generator (RNG) in a public key cryptosystem, a public key obtained from the RNG is encrypted using a deterministic cryptographic scheme before being made publicly available. A trusted party receiving the encrypted public key can recover the public key and combine it with other information so it is not subject to direct scrutiny. In one embodiment, the trusted party incorporates the public key in a certificate, such as an implicit certificate, for use by the correspondents in other communications.Type: GrantFiled: June 11, 2010Date of Patent: April 23, 2013Assignee: Certicom Corp.Inventor: Scott Alexander Vanstone
-
Patent number: 8422549Abstract: An apparatus for efficiently transmitting and receiving uncompressed AV data by using UEP during high-frequency wireless communication, as well as a transmission frame structure to which the UEP is applied are provided. A method of transmitting uncompressed AV data includes determining whether a transmission efficiency of uncompressed AV data drops below a threshold while the uncompressed AV data is transmitted; deciding whether to use a UEP mode if it is determined that the transmission efficiency has dropped below the threshold, the UEP mode indicating a manner of dividing bits, the bits constituting the uncompressed AV data, into significant bits and non-significant bits; and retransmitting the uncompressed AV data by using the UEP mode based on decision regarding use of the UEP mode.Type: GrantFiled: March 9, 2007Date of Patent: April 16, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Se-young Shin, Chang-yeul Kwon
-
Patent number: 8424058Abstract: Methods and apparatuses enable a service mediator to provide security proxying services to an end-user application requesting a backend service of an enterprise network. The end-user application generates a request for a service of the backend system. The request does not have sufficient security information to enable access to the backend system. The service mediator can detect that one or more items of required security information are not present in the request and injects the necessary security information into the request. The end-user application need not even have access to the security information or even be aware that security information is needed to access the service. The request having the required security information is sent to the backend to enable access to the backend service.Type: GrantFiled: October 4, 2007Date of Patent: April 16, 2013Assignee: SAP AGInventors: Ilja Vinogradov, Eric R. B. Wood
-
Patent number: 8417949Abstract: A protocol for total email and collaborative software (e.g., Exchange-brand server) session security. By way of example, securing the traffic between two servers within the same organization or cross organizations is critical to maintaining privacy of electronic data and communications. For example, securing communications between two Exchange-brand servers is particularly useful for individuals and organizations that routinely send and receive confidential information via electronic mail. It is important for the receiving side (server) to authorize the sending side (client) to send the information; the sending side should authorize the receiving side to receive information to prevent unauthorized information disclosure. The novel system and/or protocol disclosed herein can provide a mutually authenticated, authorized, and encrypted channel between two servers both within the same organization and across disparate organizations.Type: GrantFiled: January 19, 2006Date of Patent: April 9, 2013Assignee: Microsoft CorporationInventors: Hao Zhang, Samuel J. Neely, Trevor Freeman
-
Patent number: 8413247Abstract: Endpoints in an enterprise security environment are configured to adaptively switch from their normal data collection mode to a long-term, detailed data collection mode where advanced analyses are applied to the collected detailed data. Such adaptive data collection and analysis is triggered upon the receipt of a security assessment of a particular type, where a security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information (i.e., data in some context) that is collected about an object of interest. A specialized endpoint is coupled to the security assessment channel and performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to detected security incidents in the environment. The specialized endpoint is arranged to perform various analyses and processes on historical security assessments.Type: GrantFiled: March 14, 2007Date of Patent: April 2, 2013Assignee: Microsoft CorporationInventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash
-
Patent number: 8407807Abstract: Architecture that employs dynamic assertion providers in logic-based security policy languages. The dynamic assertion providers provide a mechanism by which data can be processed in an efficient, goal-directed manner. The application of dynamic assertion providers enables the inferencing over type hierarchies, including hierarchies of personally identifiable information and also for file systems which are hierarchal in nature. When searching for facts to bind against for a given subgoal, dynamic assertion providers are also queried. These objects follow an interface which can implement an arbitrary method to provide facts to the logic engine in a goal-directed, on-demand manner. Hierarchical types can be implemented using a hierarchy provider.Type: GrantFiled: May 25, 2010Date of Patent: March 26, 2013Assignee: Microsoft CorporationInventors: Moritz Y. Becker, Jason Forrest Mackay