Patents Examined by Sayed Beheshti Shirazi
-
Patent number: 8396125Abstract: A picture coding apparatus includes a picture feature amount extracting unit which extracts respective feature amounts of the current picture and a picture having a specific relationship with the current picture; a correlation degree calculating unit which calculates, based on the feature amount extracted by the feature amount extracting unit, a correlation degree indicating a degree of image similarity between the current picture and the picture having a specific relationship with the current picture; a picture type determining unit which determines, depending on the calculated correlation degree, a picture type for the current picture, from two picture types on which different inter-picture prediction is performed; and a coding unit which codes the current picture according to the determined picture type.Type: GrantFiled: October 16, 2008Date of Patent: March 12, 2013Assignee: Panasonic CorporationInventors: Koji Arimura, Yuki Maruyama, Hideyuki Ohgose
-
Patent number: 8381292Abstract: A system and method for enhancing spam avoidance efficiency and brand protection by automatically identifying a phishing website without human intervention. The system receives a stream of suspect Internet urls for potential phishing websites and uses a comparison strategy to determine whether the potential phishing website has already be labeled as a bonefid phishing website. A comparison system is utilized in which similarity data is calculated on various elements of the potential phishing website and then compared to similarity data of known phishing websites and known brands to determine whether the site needs human intervention. Various types of categorization structures and notification strategies are utilized in the system, including the adjustment of threshold comparison values in response to the identification of a potential phishing site displaying a brand of interest.Type: GrantFiled: December 29, 2009Date of Patent: February 19, 2013Assignee: The UAB Research FoundationInventors: Gary Warner, Bradley Wardman
-
Patent number: 8364967Abstract: A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device possesses a share of the signature key and affixes a partial signature in response to authorization from a plurality of authorizing agents. In a serial embodiment, after a first partial signature has been affixed, a second signing device exponentiates the first partial signature. In a parallel embodiment, each signing device affixes a partial signature, and the plurality of partial signatures are multiplied together to form the final signature. Security of the system is enhanced by distributing capability to affix signatures among a plurality of signing devices and by distributing authority us affix a partial signature among a plurality of authorizing agents.Type: GrantFiled: March 23, 2009Date of Patent: January 29, 2013Assignee: CQRCert, LLCInventors: Frank W. Sudia, Peter C. Freund, Stuart T. F. Huang
-
Patent number: 8356361Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.Type: GrantFiled: December 21, 2006Date of Patent: January 15, 2013Assignee: Spansion LLCInventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
-
Patent number: 8356333Abstract: A system and method for indicating to a user that a networked site is authentic includes a verification application configured to send a request to verify the authenticity of the networked site together with identity information about the site to a verification server. The verification application has access to encrypted user-customized information that was previously selected by a user and is encrypted and stored focally on the end-user device. The verification server verifies whether the networked site is authentic and is further configured to enable decryption of the encrypted user-customized information when a networked site is verified as authentic, so that the user-customized information can be presented to the user.Type: GrantFiled: September 6, 2007Date of Patent: January 15, 2013Assignee: Bespoke Innovations SarlInventor: Glenn A Kramer
-
Patent number: 8347399Abstract: A computationally implemented method includes, but is not limited to: determining that a computing device associated with a first user and that was in possession of a second user has been transferred from the second user to the first user; and providing at least greater access via the computing device to one or more items in response to determining that the computing device has been transferred from the second user to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: April 26, 2011Date of Patent: January 1, 2013Assignee: Elwha LLCInventors: Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Patent number: 8345769Abstract: One embodiment of the present invention sets forth a technique that enables a user to reverse through video content based on scene transitions. By employing a graphics processing unit to compute one or more frame-to-frame correlation coefficients that measure the consistency of sequential images and a central processing unit to analyze the one or more correlation coefficients, a list of scene transitions may be generated in real-time. The list of scene transitions forms the basis for a content-based reverse user control within the playback application. The content-based reverse user control enables a more natural mechanism for reversing through video content, providing the user with a superior overall viewing experience.Type: GrantFiled: April 10, 2007Date of Patent: January 1, 2013Assignee: NVIDIA CorporationInventor: Franck R. Diard
-
Patent number: 8341397Abstract: In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as PDA, smartphone, cellular telephone or the like, characterized by a relatively robust data processing capability and a body mounted key generating component which is adapted to be mounted on an individual's body, in a permanent or semi-permanent manner, for wirelessly broadcasting, within the immediate proximity of the individual, a secret or private key identifying signal corresponding to a time variable secure key information under the control of the certification authority.Type: GrantFiled: June 26, 2006Date of Patent: December 25, 2012Assignee: MLR, LLCInventor: Charles M. Leedom, Jr.
-
Patent number: 8336108Abstract: A method and system for a communication network containing both trusted peers and untrusted hosts within the network. Trusted peers can collaborate with each other to observe and monitor the activity of the untrusted hosts. In addition, a trusted peer instantiated with a virtual machine can have an operating system kernel collaborate with a hypervisor to determine whether threats are present. A trusted peer that needs particular functionality installed can collaborate with other trusted peers and with an administrative console to have that functionality installed. An untrusted host can have a driver directly inserted into it by an administration console, which will facilitate in the collaboration process.Type: GrantFiled: October 4, 2007Date of Patent: December 18, 2012Assignee: Red Hat, Inc.Inventors: John M. Suit, Daniel Lee Becker, Vip Sharma, Mark James Yourcheck
-
Patent number: 8291227Abstract: In a device, method and/or computer-readable medium for secure communication between a client device and a server, the client device includes a browser for accessing a website provided by the server, the client device generates a key according to a key generating cryptographic routine; tags the key with a marker associating the key with the website; and stores the tagged key in a memory associated with the browser.Type: GrantFiled: February 2, 2007Date of Patent: October 16, 2012Assignee: Red Hat, Inc.Inventor: Steven William Parkinson
-
Patent number: 8286235Abstract: An apparatus and method for managing a rights object by backing up and restoring the rights object between a host device and a multimedia card are provided. The apparatus includes an input unit that receives an order signal from a user, a rights-object-managing unit that determines whether the rights object can be backed up and restored based on rights object information when the order signal is input, and backs up and restores the rights object according to a result of the determination, and an information-managing unit that manages information related to movement and removal of the rights object and information on the backed up and restored rights object.Type: GrantFiled: August 2, 2007Date of Patent: October 9, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Yeo-jin Kim, Yun-sang Oh, Kyung-im Jung
-
Patent number: 8284935Abstract: The invention relates to methods for encoding and decoding media data (MD, CMD). One of the methods comprises the following steps: A request is transmitted by a subscriber terminal (1) over a control network (2) to a control server (3) to establish a set of encoding parameters (K) for control data. The request includes identification data (ID) of the subscriber terminal (1). The control server (3) thereupon specifies the set of encoding parameters (K) for control data, comprising a random number (R), a control data key (CK) and an integrity key (IK), wherein the control data key (CK) and the integrity key (IK) are dependent on the random number (R) and the identification data (ID). A media key (MK) dependent on the control data key (CK) and on the integrity key (IK) is then generated by the control server (3) and transmitted over a core network (4) to a media server (5). The media key (MK) is used to encode and decode the media data (MD, CMD) subsequently transmitted over a media network (6).Type: GrantFiled: March 21, 2007Date of Patent: October 9, 2012Assignee: Nokia Siemens Networks GmbH & Co. KGInventor: Srinath Thiruvengadam
-
Patent number: 8280044Abstract: A stream encryption method encodes plaintext of N number of 1-bit input signal sequences into L (L is N or more) bits of encrypted text using N number of pseudo random sequences and uses only one pseudo random sequence used for the encryption to decode the single corresponding plaintext. This stream encryption method comprises using the N number of pseudo random sequences to divide a L-bit encryption symbol set averagely into two equal parts; selecting either of the two partial sets by a corresponding 1-bit plaintext sequence; and when there are one or more elements of the selected N number of partial sets forming common parts in the sets, using one of those as an encryption symbol.Type: GrantFiled: June 26, 2009Date of Patent: October 2, 2012Assignee: Fujitsu LimitedInventor: Motomu Takatsu
-
Patent number: 8265144Abstract: Video decoding innovations for multithreading implementations and graphics processor unit (“GPU”) implementations are described. For example, for multithreaded decoding, a decoder uses innovations in the areas of layered data structures, picture extent discovery, a picture command queue, and/or task scheduling for multithreading. Or, for a GPU implementation, a decoder uses innovations in the areas of inverse transforms, inverse quantization, fractional interpolation, intra prediction using waves, loop filtering using waves, memory usage and/or performance-adaptive loop filtering. Innovations are also described in the areas of error handling and recovery, determination of neighbor availability for operations such as context modeling and intra prediction, CABAC decoding, computation of collocated information for direct mode macroblocks in B slices, reduction of memory consumption, implementation of trick play modes, and picture dropping for quality adjustment.Type: GrantFiled: June 30, 2007Date of Patent: September 11, 2012Assignee: Microsoft CorporationInventors: Eric S. Christoffersen, Yongjun Wu, Weidong Zhao
-
Patent number: 8261091Abstract: An architecture is presented that facilitates secure token generation and transmission capabilities in a mobile device. The system comprises at least one software application that includes a secure token assigned to a specific user and a memory module that communicates with an external processor. A security processor, non-volatile memory component and volatile memory component are integrated to form the memory module that communicates with the external processor. The memory module creates a secure execution environment for the execution of application agents associated with the software application and the secure token. The security processor of the system communicates with the software application and external processor to manage generation, authentication, confidentiality, and transmission of the secure token. And, the non-volatile memory allows the introduction of new tokens and the removal of old tokens.Type: GrantFiled: December 21, 2006Date of Patent: September 4, 2012Assignee: Spansion LLCInventors: Russell Barck, Jeremy Werner
-
Patent number: 8261362Abstract: A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon for display on webpages being monitored/controlled in realtime by the PMS.Type: GrantFiled: December 29, 2011Date of Patent: September 4, 2012Assignee: Ensighten, Inc.Inventors: Joshua C. Goodwin, Joshua R. Manion
-
Patent number: 8256005Abstract: Method and apparatus to prevent hacking of encrypted audio or video content during playback. Hackers, using a debugging attachment or other tools, can illicitly access encrypted data in memory in a playback device when the data is decrypted during playback and momentarily stored in digital form. This hacking is defeated here by methodically “poisoning” the encrypted data so that it is no longer playable by a standard decoder. The poisoning involves deliberate alteration of certain bit values. On playback, the player invokes a special secure routine that provides correction of the poisoned bit values, for successful playback.Type: GrantFiled: January 8, 2007Date of Patent: August 28, 2012Assignee: Apple Inc.Inventors: Julien Lerouge, Gianpaolo Fasoli, Augustin J. Farrugia
-
Patent number: 8230510Abstract: Scanning of files for malicious codes may be performed by calculating a first hash value of a file in a client computer and providing the first hash value of the file to a remotely located server computer. The server computer may compare the first hash value of the file to first hash values of malicious code patterns to determine if the file is possibly infected with malicious code. A malicious code pattern having a first hash value that matches that of the file may be forwarded from the server computer to the client computer. In the client computer, a second hash value of the file may be calculated and compared against a second hash value of the malicious code pattern to determine if the file is infected with the malicious code.Type: GrantFiled: October 2, 2008Date of Patent: July 24, 2012Assignee: Trend Micro IncorporatedInventors: Shun-Fa Yang, Hung-Hao Cheng, Yi-Song Siao, Shih-Chien Kuo, Jia-Sin Huang
-
Patent number: 8230516Abstract: An apparatus, system, and method are disclosed for network authentication and content distribution. The apparatus includes an authentication module configured to receive redirected network requests over a communications network from a firewall module and configured to present a user license agreement and not require user-identifiable information, and a content distribution module configured to synchronize over the communications network with a client module and transmit content to the client module. The system includes a firewall module connected with a global communications network, a network connected with the firewall module, a computing device configured to couple with the network, and the apparatus.Type: GrantFiled: January 19, 2006Date of Patent: July 24, 2012Assignee: International Business Machines CorporationInventors: James Mathew Davison, Christopher Michael Sansone
-
Patent number: 8223962Abstract: First and second nodes generate numeric string elements from time interval by their physical changes. The first node generates a basic numeric string from the numeric string elements and similar numeric strings, encrypts the generated basic numeric string and the similar numeric strings, and generates a cipher value list that stores the numeric strings with corresponding cipher values. The second node generates a basic numeric string based on the numeric string elements generated by the second node, encrypts the generated basic numeric string in accordance with the same encryption rule as that for the first node, and transmits the generated cipher value to the first node. The first node receives a cipher value from the second node, and compares the received cipher value with the cipher values in the cipher value list to find a match, and transmits a match signal if a match is found.Type: GrantFiled: October 29, 2008Date of Patent: July 17, 2012Assignee: Oki Electric Industry Co., Ltd.Inventor: Ryouhei Konuma