Patents Examined by Shaqueal Wade
-
Patent number: 9503267Abstract: Methods, systems, and computer programs for generating a digital signature are disclosed. In some aspects, a symmetric key is accessed. The symmetric key is based on an ephemeral public key. The ephemeral public key is associated with an ephemeral private key. A ciphertext is generated based on the symmetric key and a message. An input value is obtained based on the ciphertext independent of a hash function. A digital signature is generated from the ephemeral private key, the input value, and a long term private key.Type: GrantFiled: December 28, 2011Date of Patent: November 22, 2016Assignee: Certicom Corp.Inventors: Daniel Richard L. Brown, Adrian Antipa
-
Patent number: 9503439Abstract: A communication system includes a transmission terminal and a management device, and when having received contact list information about a second user from the management device while displaying a contact list about a first user or the transmission terminal, the transmission terminal creates the contact list about the second user based on the contact list information about the second user, and displays the contact list of the second user.Type: GrantFiled: September 13, 2013Date of Patent: November 22, 2016Assignee: RICOH COMPANY, LTD.Inventors: Taro Okuyama, Takahiro Asai
-
Patent number: 9473478Abstract: Various exemplary embodiments relate to a method performed by a policy server in a communication network. The method includes receiving an access request message including a residential gateway identifier and a subscriber identifier; evaluating a policy rule based on the residential gateway identifier, the policy rule including a condition referencing the residential gateway identifier; and responding to the access request message based on evaluation of the policy rule and the subscriber identifier. The method may further include: receiving an IP address of the residential gateway; storing the IP address in association with the residential gateway identifier; receiving, from a service portal, a request for identification of a residential gateway associated with an IP address; sending the stored residential gateway identifier to the portal; receiving new subscriber information; and changing the authorization of the residential gateway based on the new subscriber information.Type: GrantFiled: September 24, 2013Date of Patent: October 18, 2016Assignee: Alcatel LucentInventors: Ramaswamy Subramanian, Tiru K Sheth
-
Patent number: 9467859Abstract: A virtual key ring is disclosed. A graphical representation of a key ring or keychain having a plurality of keys is displayed on a computing device, and a pre-determined gesture input from a user indicative of an interaction with the key ring or chain, or one of the keys is received. The wireless operation of a lock can be managed by then accessing stored information associated with a virtual key or the lock in accordance with the pre-determined gesture. Pre-determined gestures can include, for example, movement along a predefined path on a touch screen in order to select a virtual key from among the plurality of virtual keys. The computing device can be a wireless mobile computing device such as a smartphone. The computing device can use any wireless communication technology, NFC and Wi-Fi being examples.Type: GrantFiled: September 13, 2013Date of Patent: October 11, 2016Assignee: YALE SECURITY INC.Inventors: Mary Moss, Kevin Kraus, Mark A. Caterino, Alicia Waters, Logan Serman, James McCracken, Ronald Unger, Christi Johnson
-
Patent number: 9413739Abstract: A cloud computing system identifies opportunities for users to collaborate on a file. Collaboration opportunities are identified based on similarity of separate files that different users are associated with, and on relationships or similarities between the different users. If users associated with the separate files agree to collaborate, the users may be placed in a single editing session regarding a file having content from at least one of the separate files.Type: GrantFiled: June 25, 2014Date of Patent: August 9, 2016Assignee: Google Inc.Inventors: Robert Brett Rose, Michael Jeffrey Procopio
-
Patent number: 9391968Abstract: Concepts and technologies are disclosed herein for scored factor-based authentication. A verification service can receive an authentication request from a requestor, wherein the authentication request identifies a transaction. The verification service can determine a risk associated with the transaction, an authentication score based upon the risk, and a plurality of groups of authentication factors, each of which can satisfy the authentication score. The verification service can provide factor group data identifying the plurality of groups of authentication factors to the requestor.Type: GrantFiled: September 24, 2013Date of Patent: July 12, 2016Assignee: AT&T Intellectual Property I, L.P.Inventor: Brian M. Novack
-
Patent number: 9325726Abstract: An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data is generated. The analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel.Type: GrantFiled: February 3, 2014Date of Patent: April 26, 2016Assignee: Intuit Inc.Inventors: M. Shannon Lietz, Luis Felipe Cabrera
-
Patent number: 9275203Abstract: The subject matter described herein includes methods, systems, and computer readable media for preventing software piracy. One method includes specifying at least one codemark that is intrinsic to a computing system. The method further includes inserting guard code in an application. The guard code including a first code portion that uses a codemark and produces an output that depends on a value of the codemark and a second code portion that uses the output of the first code portion. The method further includes executing the first and second code portions and selectively triggering a protective action based on the output of the second code portion. Multiple types, styles, and frequencies of guard codes can be used to provide in-depth, long lasting, and strong protection.Type: GrantFiled: February 3, 2014Date of Patent: March 1, 2016Assignee: Purdue Research FoundationInventor: John R. Rice
-
Patent number: 9203904Abstract: A method includes (1) receiving a request to share a file stored on a secure network with a target, the request identifying the file and the target, (2) performing a location operation to determine whether the target belongs to the secure network, (3) when a result of the location evaluation operation indicates that the target does not belong to the secure network, performing a sensitivity evaluation operation to determine whether the file identified by the request includes sensitive information, and (4) performing an access control operation, the access control operation (i) rejecting the request when both (a) the result of the location evaluation operation indicates that the target does not belong to the secure network, and (b) a result of the sensitivity evaluation operation indicates that the file includes sensitive information, and (ii) otherwise causing a link to access the file to be provided to the target.Type: GrantFiled: June 30, 2013Date of Patent: December 1, 2015Assignee: Citrix Systems, Inc.Inventor: Juliano Maldaner
-
Patent number: 9038174Abstract: A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed purpose or active content data having an associated function. If a portion is passive content data, then a determination is made as to whether the portion of passive content data is to be re-generated. If a portion is active content data, then the portion is analyzed to determine whether the portion of active content data is to be re-generated. A re-generated electronic file is then created from the portions of content data which are determined to be re-generated.Type: GrantFiled: May 21, 2013Date of Patent: May 19, 2015Assignee: Glasswall IP LimitedInventors: Samuel Harrison Hutton, Trevor Goddard
-
Patent number: 8996869Abstract: A system and method for converting a device between an authorized device and an unauthorized device may include a crypto ignition key (CIK) and a mission module. The CIK may store an original device number corresponding to a device. The mission module typically loads a local mission and a key, decrypts the local mission with the key to produce a decrypted local mission, and generates an internal file encryption key (IFEK) and an internal split. The mission module may then encrypt the decrypted local mission to produce an encrypted local mission and then erase the IFEK. The mission module, when attached to the device, may read an additional device number from the device and recreate the IFEK based on the additional device number and the internal split. The mission module may decrypt the encrypted local mission and install the results in the device to convert the device into an authorized device.Type: GrantFiled: July 1, 2013Date of Patent: March 31, 2015Assignee: BAE Systems Information and Electronic Systems Integration Inc.Inventors: Jeffrey B. Canter, Mark J. Badcock