Patents Examined by Sayed Beheshti Shirazi
  • Patent number: 8549643
    Abstract: A computing device executing a data loss prevention (DLP) system tracks bait data on at least one of the computing device or a network. The DLP system identifies a potential security threat in response to detecting unscripted activity associated with the bait data. The DLP system performs an action in response to identifying the potential security threat.
    Type: Grant
    Filed: April 4, 2011
    Date of Patent: October 1, 2013
    Assignee: Symantec Corporation
    Inventor: Darren Shou
  • Patent number: 8533778
    Abstract: A security system, method and computer program product are provided. In use, a request destined to a target computer is received, utilizing a virtual machine. The request is processed to identify an unwanted effect associated therewith, utilizing the virtual machine. In addition, the target computer is allowed access to the request, based on the processing.
    Type: Grant
    Filed: June 23, 2006
    Date of Patent: September 10, 2013
    Assignee: McAfee, Inc.
    Inventor: Gregory William Dalcher
  • Patent number: 8526609
    Abstract: A system, method and device for real-time compositing of encrypted video streams without having to decrypt each video stream is disclosed herein. A shared encryption key is derived to encrypt multiple incoming video streams to an encrypted master video stream, while retaining full interoperability with popular incumbent video encryption standards. Compositing video is then possible without having to decrypt the master video stream, thereby preserving the security of the copyrighted material. The invention preferably genlocks a digital video source to a master video stream.
    Type: Grant
    Filed: June 22, 2012
    Date of Patent: September 3, 2013
    Assignee: BBY Solutions, Inc.
    Inventor: Andrew Shane Huang
  • Patent number: 8522355
    Abstract: Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination of a triggering event. Once it is determined that a triggering event has occurred, each application operating on the mobile device is caused to immediately unreference sensitive objects and a secure garbage collection operation is performed upon the unreferenced sensitive objects to render data associated therewith unreadable. The mobile device is then caused to enter a secure state, in which the mobile device cannot be accessed without authorization. A microprocessor within the mobile device is configured to determine the existence of the triggering event according to a configuration data structure and to perform the secure garbage collection.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: August 27, 2013
    Assignee: Research In Motion Limited
    Inventors: Herbert Anthony Little, Neil Patrick Adams, Michael Kenneth Brown, Michael Stephen Brown
  • Patent number: 8522323
    Abstract: A system and method identifies one of several security token services that can be used to convert an identity token into one containing content, a format and having a signature corresponding to a signing key name that a software service can use. The identification of the security token service that may be used to perform the conversion is made using machine readable information about the signing key name that the software service can use.
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: August 27, 2013
    Assignee: Charles Schwab & Co., Inc.
    Inventor: Valery Zubovsky
  • Patent number: 8522011
    Abstract: The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a public key and a private key, wherein the method comprises selecting the user to be authenticated using a pseudonym of said user, wherein said pseudonym comprises the public key of the user, the method further comprising performing a cryptographic authentication of the user using the asymmetric cryptographic key pair.
    Type: Grant
    Filed: November 3, 2010
    Date of Patent: August 27, 2013
    Assignee: Compugroup Holding AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Patent number: 8495371
    Abstract: In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network aggregation device includes one or more optical Ethernet switches that can be adaptively configured to support authentication of one or more ONTs. For example, the optical network aggregation device may include a controller with an authentication unit for managing ONT authentication and an optical Ethernet interface for transmitting and receiving data over the optical network. The authentication unit may exchange authentication request messages via the optical Ethernet interface with an ONT and grant the ONT access to the provider network based on the exchange, thereby preventing rogue devices from gaining access to the provider network.
    Type: Grant
    Filed: January 6, 2010
    Date of Patent: July 23, 2013
    Assignee: Calix, Inc.
    Inventors: Berkay Baykal, Shaun Noel Missett
  • Patent number: 8477852
    Abstract: Described herein are embodiments for decoding and displaying video data. Several of these embodiments utilize a unified frame buffer management system, to facilitate better memory management in decoding and displaying compressed video. One approach describes a method of decoding and displaying compressed video data. The method involves receiving a compressed video frame, and allocating a frame buffer for use in decoding the compressed video frame. A frame identifier is assigned to the allocated frame buffer. The compressed video frame is decoded into the frame buffer, and the frame identifier is passed to a display module.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: July 2, 2013
    Assignee: Nvidia Corporation
    Inventor: Wei Jia
  • Patent number: 8479290
    Abstract: A method of remotely treating malicious mobile terminals connected to a mobile communications network. In one embodiment, when a malicious mobile terminal is detected by the intrusion-detection services of the network, the network changes the subscriber profile associated with the mobile terminal to operate the latter in a quarantine mode. The packet-switched subsystem of the network then links the quarantined mobile terminal to a remediation manager. The remediation manager remotely treats the mobile terminal, e.g., to repair or reinstall any corrupted software, terminate any active malicious processes, delete or quarantine any malware, and restore the operating system, configuration, and/or memory of the mobile terminal to a clean operational state. After the treatment, the network reverts the subscriber profile back to the initial state and removes the mobile terminal from the quarantine.
    Type: Grant
    Filed: June 16, 2010
    Date of Patent: July 2, 2013
    Assignee: Alcatel Lucent
    Inventors: Harish Viswanathan, Dimitrios Stiliadis
  • Patent number: 8473753
    Abstract: When software is delivered to a customer, there are often programs or routines of programs that a software distributor intended to run under the credentials of a specific user other than the user who started the program. A secure method is proposed for software running in a process to acquire rights to issue restricted operations. A trusting entity trusts a process based on verifying ownership of code residing in the process. The trusted process is granted rights by the trusting entity to perform any or specific operations under the credentials of a specific user, not necessarily the current process user.
    Type: Grant
    Filed: September 9, 2011
    Date of Patent: June 25, 2013
    Assignee: International Business Machines Corporation
    Inventors: Eric Kass, Joachim Kern
  • Patent number: 8468344
    Abstract: According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that is operable to be executed by the one or more processors. The base operating system may be operable to implement a single security level. The mass storage device may also comprise a virtual operating system that is operable to be executed by the one or more processors. The virtual operating system may be executed using a virtualization tool that is executed by the base operating system. The virtual operating system may be operable to process information according to a plurality of security levels and communicate the information to one or more computing systems. The information may be communicated according to the plurality of security levels of the information.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: June 18, 2013
    Assignee: Raytheon Company
    Inventors: Daniel Teijido, Randall S. Brooks
  • Patent number: 8464065
    Abstract: The object of the present invention is to safeguard the authenticity and integrity of real-time data in a distributed real-time computer system. The present invention considers other requirements of real-time data processing, such as the timeliness of real-time data transmission and limited resource availability. Frequent modification of an asymmetric key pair hinders intruders from cracking a key before its validity has expired. The present method can also be extended to safeguard the confidentiality of real-time data. It can be implemented efficiently on a multiprocessor system-on-chip (MPSoC).
    Type: Grant
    Filed: June 10, 2008
    Date of Patent: June 11, 2013
    Assignee: FTS Computertechnik GmbH
    Inventor: Hermann Kopetz
  • Patent number: 8458457
    Abstract: Embodiments of the present invention provide a pre-compression encoding capability for encoding a CRL, such as an X.509 CRL, stored as a file, data structure or data object in a computer system having a certification authority (CA) and a security client prior to compression. An exemplary method provides for accessing the CRL contents and performing an encoding procedure.
    Type: Grant
    Filed: February 2, 2007
    Date of Patent: June 4, 2013
    Assignee: Red Hat, Inc.
    Inventor: Steven W. Parkinson
  • Patent number: 8438619
    Abstract: An system for controlling access to a network by a user device. The system includes a criteria engine that generates a plurality of criteria to be monitored on the user device and a checker that generates at least one check for each of the plurality of criteria. The system further includes a profiler that retrieves a profile for the user device, the profile including the plurality of criteria and the at least one check for each of the plurality of criteria, a comparator that compares a summary of the retrieved profile to a summary of a profile received from the user device and a communicator that communicates a message to the user device based on the comparison.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: May 7, 2013
    Assignee: NetMotion Wireless Holdings, Inc.
    Inventor: Erik Olson
  • Patent number: 8429408
    Abstract: To mitigate the effects of a weak random number generator (RNG) in a public key cryptosystem, a public key obtained from the RNG is encrypted using a deterministic cryptographic scheme before being made publicly available. A trusted party receiving the encrypted public key can recover the public key and combine it with other information so it is not subject to direct scrutiny. In one embodiment, the trusted party incorporates the public key in a certificate, such as an implicit certificate, for use by the correspondents in other communications.
    Type: Grant
    Filed: June 11, 2010
    Date of Patent: April 23, 2013
    Assignee: Certicom Corp.
    Inventor: Scott Alexander Vanstone
  • Patent number: 8422549
    Abstract: An apparatus for efficiently transmitting and receiving uncompressed AV data by using UEP during high-frequency wireless communication, as well as a transmission frame structure to which the UEP is applied are provided. A method of transmitting uncompressed AV data includes determining whether a transmission efficiency of uncompressed AV data drops below a threshold while the uncompressed AV data is transmitted; deciding whether to use a UEP mode if it is determined that the transmission efficiency has dropped below the threshold, the UEP mode indicating a manner of dividing bits, the bits constituting the uncompressed AV data, into significant bits and non-significant bits; and retransmitting the uncompressed AV data by using the UEP mode based on decision regarding use of the UEP mode.
    Type: Grant
    Filed: March 9, 2007
    Date of Patent: April 16, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Se-young Shin, Chang-yeul Kwon
  • Patent number: 8424058
    Abstract: Methods and apparatuses enable a service mediator to provide security proxying services to an end-user application requesting a backend service of an enterprise network. The end-user application generates a request for a service of the backend system. The request does not have sufficient security information to enable access to the backend system. The service mediator can detect that one or more items of required security information are not present in the request and injects the necessary security information into the request. The end-user application need not even have access to the security information or even be aware that security information is needed to access the service. The request having the required security information is sent to the backend to enable access to the backend service.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: April 16, 2013
    Assignee: SAP AG
    Inventors: Ilja Vinogradov, Eric R. B. Wood
  • Patent number: 8417949
    Abstract: A protocol for total email and collaborative software (e.g., Exchange-brand server) session security. By way of example, securing the traffic between two servers within the same organization or cross organizations is critical to maintaining privacy of electronic data and communications. For example, securing communications between two Exchange-brand servers is particularly useful for individuals and organizations that routinely send and receive confidential information via electronic mail. It is important for the receiving side (server) to authorize the sending side (client) to send the information; the sending side should authorize the receiving side to receive information to prevent unauthorized information disclosure. The novel system and/or protocol disclosed herein can provide a mutually authenticated, authorized, and encrypted channel between two servers both within the same organization and across disparate organizations.
    Type: Grant
    Filed: January 19, 2006
    Date of Patent: April 9, 2013
    Assignee: Microsoft Corporation
    Inventors: Hao Zhang, Samuel J. Neely, Trevor Freeman
  • Patent number: 8413247
    Abstract: Endpoints in an enterprise security environment are configured to adaptively switch from their normal data collection mode to a long-term, detailed data collection mode where advanced analyses are applied to the collected detailed data. Such adaptive data collection and analysis is triggered upon the receipt of a security assessment of a particular type, where a security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information (i.e., data in some context) that is collected about an object of interest. A specialized endpoint is coupled to the security assessment channel and performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to detected security incidents in the environment. The specialized endpoint is arranged to perform various analyses and processes on historical security assessments.
    Type: Grant
    Filed: March 14, 2007
    Date of Patent: April 2, 2013
    Assignee: Microsoft Corporation
    Inventors: Efim Hudis, Yair Helman, Joseph Malka, Uri Barash
  • Patent number: 8407807
    Abstract: Architecture that employs dynamic assertion providers in logic-based security policy languages. The dynamic assertion providers provide a mechanism by which data can be processed in an efficient, goal-directed manner. The application of dynamic assertion providers enables the inferencing over type hierarchies, including hierarchies of personally identifiable information and also for file systems which are hierarchal in nature. When searching for facts to bind against for a given subgoal, dynamic assertion providers are also queried. These objects follow an interface which can implement an arbitrary method to provide facts to the logic engine in a goal-directed, on-demand manner. Hierarchical types can be implemented using a hierarchy provider.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: March 26, 2013
    Assignee: Microsoft Corporation
    Inventors: Moritz Y. Becker, Jason Forrest Mackay