Patents Examined by Sayed Beheshti Shirazi
  • Patent number: 8396125
    Abstract: A picture coding apparatus includes a picture feature amount extracting unit which extracts respective feature amounts of the current picture and a picture having a specific relationship with the current picture; a correlation degree calculating unit which calculates, based on the feature amount extracted by the feature amount extracting unit, a correlation degree indicating a degree of image similarity between the current picture and the picture having a specific relationship with the current picture; a picture type determining unit which determines, depending on the calculated correlation degree, a picture type for the current picture, from two picture types on which different inter-picture prediction is performed; and a coding unit which codes the current picture according to the determined picture type.
    Type: Grant
    Filed: October 16, 2008
    Date of Patent: March 12, 2013
    Assignee: Panasonic Corporation
    Inventors: Koji Arimura, Yuki Maruyama, Hideyuki Ohgose
  • Patent number: 8381292
    Abstract: A system and method for enhancing spam avoidance efficiency and brand protection by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then compared to similarity data of known phishing websites and known brands to determine whether the site needs human intervention. Various types of categorization structures and notification strategies are utilized in the system, including the adjustment of threshold comparison values in response to the identification of a potential phishing site displaying a brand of interest.
    Type: Grant
    Filed: December 29, 2009
    Date of Patent: February 19, 2013
    Assignee: The UAB Research Foundation
    Inventors: Gary Warner, Bradley Wardman
  • Patent number: 8364967
    Abstract: A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device possesses a share of the signature key and affixes a partial signature in response to authorization from a plurality of authorizing agents. In a serial embodiment, after a first partial signature has been affixed, a second signing device exponentiates the first partial signature. In a parallel embodiment, each signing device affixes a partial signature, and the plurality of partial signatures are multiplied together to form the final signature. Security of the system is enhanced by distributing capability to affix signatures among a plurality of signing devices and by distributing authority us affix a partial signature among a plurality of authorizing agents.
    Type: Grant
    Filed: March 23, 2009
    Date of Patent: January 29, 2013
    Assignee: CQRCert, LLC
    Inventors: Frank W. Sudia, Peter C. Freund, Stuart T. F. Huang
  • Patent number: 8356361
    Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: January 15, 2013
    Assignee: Spansion LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
  • Patent number: 8356333
    Abstract: A system and method for indicating to a user that a networked site is authentic includes a verification application configured to send a request to verify the authenticity of the networked site together with identity information about the site to a verification server. The verification application has access to encrypted user-customized information that was previously selected by a user and is encrypted and stored focally on the end-user device. The verification server verifies whether the networked site is authentic and is further configured to enable decryption of the encrypted user-customized information when a networked site is verified as authentic, so that the user-customized information can be presented to the user.
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: January 15, 2013
    Assignee: Bespoke Innovations Sarl
    Inventor: Glenn A Kramer
  • Patent number: 8347399
    Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device associated with a first user and that was in possession of a second user has been transferred from the second user to the first user; and providing at least greater access via the computing device to one or more items in response to determining that the computing device has been transferred from the second user to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
    Type: Grant
    Filed: April 26, 2011
    Date of Patent: January 1, 2013
    Assignee: Elwha LLC
    Inventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
  • Patent number: 8345769
    Abstract: One embodiment of the present invention sets forth a technique that enables a user to reverse through video content based on scene transitions. By employing a graphics processing unit to compute one or more frame-to-frame correlation coefficients that measure the consistency of sequential images and a central processing unit to analyze the one or more correlation coefficients, a list of scene transitions may be generated in real-time. The list of scene transitions forms the basis for a content-based reverse user control within the playback application. The content-based reverse user control enables a more natural mechanism for reversing through video content, providing the user with a superior overall viewing experience.
    Type: Grant
    Filed: April 10, 2007
    Date of Patent: January 1, 2013
    Assignee: NVIDIA Corporation
    Inventor: Franck R. Diard
  • Patent number: 8341397
    Abstract: In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as PDA, smartphone, cellular telephone or the like, characterized by a relatively robust data processing capability and a body mounted key generating component which is adapted to be mounted on an individual's body, in a permanent or semi-permanent manner, for wirelessly broadcasting, within the immediate proximity of the individual, a secret or private key identifying signal corresponding to a time variable secure key information under the control of the certification authority.
    Type: Grant
    Filed: June 26, 2006
    Date of Patent: December 25, 2012
    Assignee: MLR, LLC
    Inventor: Charles M. Leedom, Jr.
  • Patent number: 8336108
    Abstract: A method and system for a communication network containing both trusted peers and untrusted hosts within the network. Trusted peers can collaborate with each other to observe and monitor the activity of the untrusted hosts. In addition, a trusted peer instantiated with a virtual machine can have an operating system kernel collaborate with a hypervisor to determine whether threats are present. A trusted peer that needs particular functionality installed can collaborate with other trusted peers and with an administrative console to have that functionality installed. An untrusted host can have a driver directly inserted into it by an administration console, which will facilitate in the collaboration process.
    Type: Grant
    Filed: October 4, 2007
    Date of Patent: December 18, 2012
    Assignee: Red Hat, Inc.
    Inventors: John M. Suit, Daniel Lee Becker, Vip Sharma, Mark James Yourcheck
  • Patent number: 8291227
    Abstract: In a device, method and/or computer-readable medium for secure communication between a client device and a server, the client device includes a browser for accessing a website provided by the server, the client device generates a key according to a key generating cryptographic routine; tags the key with a marker associating the key with the website; and stores the tagged key in a memory associated with the browser.
    Type: Grant
    Filed: February 2, 2007
    Date of Patent: October 16, 2012
    Assignee: Red Hat, Inc.
    Inventor: Steven William Parkinson
  • Patent number: 8286235
    Abstract: An apparatus and method for managing a rights object by backing up and restoring the rights object between a host device and a multimedia card are provided. The apparatus includes an input unit that receives an order signal from a user, a rights-object-managing unit that determines whether the rights object can be backed up and restored based on rights object information when the order signal is input, and backs up and restores the rights object according to a result of the determination, and an information-managing unit that manages information related to movement and removal of the rights object and information on the backed up and restored rights object.
    Type: Grant
    Filed: August 2, 2007
    Date of Patent: October 9, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Yeo-jin Kim, Yun-sang Oh, Kyung-im Jung
  • Patent number: 8284935
    Abstract: The invention relates to methods for encoding and decoding media data (MD, CMD). One of the methods comprises the following steps: A request is transmitted by a subscriber terminal (1) over a control network (2) to a control server (3) to establish a set of encoding parameters (K) for control data. The request includes identification data (ID) of the subscriber terminal (1). The control server (3) thereupon specifies the set of encoding parameters (K) for control data, comprising a random number (R), a control data key (CK) and an integrity key (IK), wherein the control data key (CK) and the integrity key (IK) are dependent on the random number (R) and the identification data (ID). A media key (MK) dependent on the control data key (CK) and on the integrity key (IK) is then generated by the control server (3) and transmitted over a core network (4) to a media server (5). The media key (MK) is used to encode and decode the media data (MD, CMD) subsequently transmitted over a media network (6).
    Type: Grant
    Filed: March 21, 2007
    Date of Patent: October 9, 2012
    Assignee: Nokia Siemens Networks GmbH & Co. KG
    Inventor: Srinath Thiruvengadam
  • Patent number: 8280044
    Abstract: A stream encryption method encodes plaintext of N number of 1-bit input signal sequences into L (L is N or more) bits of encrypted text using N number of pseudo random sequences and uses only one pseudo random sequence used for the encryption to decode the single corresponding plaintext. This stream encryption method comprises using the N number of pseudo random sequences to divide a L-bit encryption symbol set averagely into two equal parts; selecting either of the two partial sets by a corresponding 1-bit plaintext sequence; and when there are one or more elements of the selected N number of partial sets forming common parts in the sets, using one of those as an encryption symbol.
    Type: Grant
    Filed: June 26, 2009
    Date of Patent: October 2, 2012
    Assignee: Fujitsu Limited
    Inventor: Motomu Takatsu
  • Patent number: 8265144
    Abstract: Video decoding innovations for multithreading implementations and graphics processor unit (“GPU”) implementations are described. For example, for multithreaded decoding, a decoder uses innovations in the areas of layered data structures, picture extent discovery, a picture command queue, and/or task scheduling for multithreading. Or, for a GPU implementation, a decoder uses innovations in the areas of inverse transforms, inverse quantization, fractional interpolation, intra prediction using waves, loop filtering using waves, memory usage and/or performance-adaptive loop filtering. Innovations are also described in the areas of error handling and recovery, determination of neighbor availability for operations such as context modeling and intra prediction, CABAC decoding, computation of collocated information for direct mode macroblocks in B slices, reduction of memory consumption, implementation of trick play modes, and picture dropping for quality adjustment.
    Type: Grant
    Filed: June 30, 2007
    Date of Patent: September 11, 2012
    Assignee: Microsoft Corporation
    Inventors: Eric S. Christoffersen, Yongjun Wu, Weidong Zhao
  • Patent number: 8261091
    Abstract: An architecture is presented that facilitates secure token generation and transmission capabilities in a mobile device. The system comprises at least one software application that includes a secure token assigned to a specific user and a memory module that communicates with an external processor. A security processor, non-volatile memory component and volatile memory component are integrated to form the memory module that communicates with the external processor. The memory module creates a secure execution environment for the execution of application agents associated with the software application and the secure token. The security processor of the system communicates with the software application and external processor to manage generation, authentication, confidentiality, and transmission of the secure token. And, the non-volatile memory allows the introduction of new tokens and the removal of old tokens.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: September 4, 2012
    Assignee: Spansion LLC
    Inventors: Russell Barck, Jeremy Werner
  • Patent number: 8261362
    Abstract: A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon for display on webpages being monitored/controlled in realtime by the PMS.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: September 4, 2012
    Assignee: Ensighten, Inc.
    Inventors: Joshua C. Goodwin, Joshua R. Manion
  • Patent number: 8256005
    Abstract: Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly access encrypted data in memory in a playback device when the data is decrypted during playback and momentarily stored in digital form. This hacking is defeated here by methodically “poisoning” the encrypted data so that it is no longer playable by a standard decoder. The poisoning involves deliberate alteration of certain bit values. On playback, the player invokes a special secure routine that provides correction of the poisoned bit values, for successful playback.
    Type: Grant
    Filed: January 8, 2007
    Date of Patent: August 28, 2012
    Assignee: Apple Inc.
    Inventors: Julien Lerouge, Gianpaolo Fasoli, Augustin J. Farrugia
  • Patent number: 8230510
    Abstract: Scanning of files for malicious codes may be performed by calculating a first hash value of a file in a client computer and providing the first hash value of the file to a remotely located server computer. The server computer may compare the first hash value of the file to first hash values of malicious code patterns to determine if the file is possibly infected with malicious code. A malicious code pattern having a first hash value that matches that of the file may be forwarded from the server computer to the client computer. In the client computer, a second hash value of the file may be calculated and compared against a second hash value of the malicious code pattern to determine if the file is infected with the malicious code.
    Type: Grant
    Filed: October 2, 2008
    Date of Patent: July 24, 2012
    Assignee: Trend Micro Incorporated
    Inventors: Shun-Fa Yang, Hung-Hao Cheng, Yi-Song Siao, Shih-Chien Kuo, Jia-Sin Huang
  • Patent number: 8230516
    Abstract: An apparatus, system, and method are disclosed for network authentication and content distribution. The apparatus includes an authentication module configured to receive redirected network requests over a communications network from a firewall module and configured to present a user license agreement and not require user-identifiable information, and a content distribution module configured to synchronize over the communications network with a client module and transmit content to the client module. The system includes a firewall module connected with a global communications network, a network connected with the firewall module, a computing device configured to couple with the network, and the apparatus.
    Type: Grant
    Filed: January 19, 2006
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: James Mathew Davison, Christopher Michael Sansone
  • Patent number: 8223962
    Abstract: First and second nodes generate numeric string elements from time interval by their physical changes. The first node generates a basic numeric string from the numeric string elements and similar numeric strings, encrypts the generated basic numeric string and the similar numeric strings, and generates a cipher value list that stores the numeric strings with corresponding cipher values. The second node generates a basic numeric string based on the numeric string elements generated by the second node, encrypts the generated basic numeric string in accordance with the same encryption rule as that for the first node, and transmits the generated cipher value to the first node. The first node receives a cipher value from the second node, and compares the received cipher value with the cipher values in the cipher value list to find a match, and transmits a match signal if a match is found.
    Type: Grant
    Filed: October 29, 2008
    Date of Patent: July 17, 2012
    Assignee: Oki Electric Industry Co., Ltd.
    Inventor: Ryouhei Konuma