Patents Examined by Shaqueal Wade
  • Patent number: 9503267
    Abstract: Methods, systems, and computer programs for generating a digital signature are disclosed. In some aspects, a symmetric key is accessed. The symmetric key is based on an ephemeral public key. The ephemeral public key is associated with an ephemeral private key. A ciphertext is generated based on the symmetric key and a message. An input value is obtained based on the ciphertext independent of a hash function. A digital signature is generated from the ephemeral private key, the input value, and a long term private key.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: November 22, 2016
    Assignee: Certicom Corp.
    Inventors: Daniel Richard L. Brown, Adrian Antipa
  • Patent number: 9503439
    Abstract: A communication system includes a transmission terminal and a management device, and when having received contact list information about a second user from the management device while displaying a contact list about a first user or the transmission terminal, the transmission terminal creates the contact list about the second user based on the contact list information about the second user, and displays the contact list of the second user.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: November 22, 2016
    Assignee: RICOH COMPANY, LTD.
    Inventors: Taro Okuyama, Takahiro Asai
  • Patent number: 9473478
    Abstract: Various exemplary embodiments relate to a method performed by a policy server in a communication network. The method includes receiving an access request message including a residential gateway identifier and a subscriber identifier; evaluating a policy rule based on the residential gateway identifier, the policy rule including a condition referencing the residential gateway identifier; and responding to the access request message based on evaluation of the policy rule and the subscriber identifier. The method may further include: receiving an IP address of the residential gateway; storing the IP address in association with the residential gateway identifier; receiving, from a service portal, a request for identification of a residential gateway associated with an IP address; sending the stored residential gateway identifier to the portal; receiving new subscriber information; and changing the authorization of the residential gateway based on the new subscriber information.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: October 18, 2016
    Assignee: Alcatel Lucent
    Inventors: Ramaswamy Subramanian, Tiru K Sheth
  • Patent number: 9467859
    Abstract: A virtual key ring is disclosed. A graphical representation of a key ring or keychain having a plurality of keys is displayed on a computing device, and a pre-determined gesture input from a user indicative of an interaction with the key ring or chain, or one of the keys is received. The wireless operation of a lock can be managed by then accessing stored information associated with a virtual key or the lock in accordance with the pre-determined gesture. Pre-determined gestures can include, for example, movement along a predefined path on a touch screen in order to select a virtual key from among the plurality of virtual keys. The computing device can be a wireless mobile computing device such as a smartphone. The computing device can use any wireless communication technology, NFC and Wi-Fi being examples.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: October 11, 2016
    Assignee: YALE SECURITY INC.
    Inventors: Mary Moss, Kevin Kraus, Mark A. Caterino, Alicia Waters, Logan Serman, James McCracken, Ronald Unger, Christi Johnson
  • Patent number: 9413739
    Abstract: A cloud computing system identifies opportunities for users to collaborate on a file. Collaboration opportunities are identified based on similarity of separate files that different users are associated with, and on relationships or similarities between the different users. If users associated with the separate files agree to collaborate, the users may be placed in a single editing session regarding a file having content from at least one of the separate files.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: August 9, 2016
    Assignee: Google Inc.
    Inventors: Robert Brett Rose, Michael Jeffrey Procopio
  • Patent number: 9391968
    Abstract: Concepts and technologies are disclosed herein for scored factor-based authentication. A verification service can receive an authentication request from a requestor, wherein the authentication request identifies a transaction. The verification service can determine a risk associated with the transaction, an authentication score based upon the risk, and a plurality of groups of authentication factors, each of which can satisfy the authentication score. The verification service can provide factor group data identifying the plurality of groups of authentication factors to the requestor.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: July 12, 2016
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Brian M. Novack
  • Patent number: 9325726
    Abstract: An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data is generated. The analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel.
    Type: Grant
    Filed: February 3, 2014
    Date of Patent: April 26, 2016
    Assignee: Intuit Inc.
    Inventors: M. Shannon Lietz, Luis Felipe Cabrera
  • Patent number: 9275203
    Abstract: The subject matter described herein includes methods, systems, and computer readable media for preventing software piracy. One method includes specifying at least one codemark that is intrinsic to a computing system. The method further includes inserting guard code in an application. The guard code including a first code portion that uses a codemark and produces an output that depends on a value of the codemark and a second code portion that uses the output of the first code portion. The method further includes executing the first and second code portions and selectively triggering a protective action based on the output of the second code portion. Multiple types, styles, and frequencies of guard codes can be used to provide in-depth, long lasting, and strong protection.
    Type: Grant
    Filed: February 3, 2014
    Date of Patent: March 1, 2016
    Assignee: Purdue Research Foundation
    Inventor: John R. Rice
  • Patent number: 9203904
    Abstract: A method includes (1) receiving a request to share a file stored on a secure network with a target, the request identifying the file and the target, (2) performing a location operation to determine whether the target belongs to the secure network, (3) when a result of the location evaluation operation indicates that the target does not belong to the secure network, performing a sensitivity evaluation operation to determine whether the file identified by the request includes sensitive information, and (4) performing an access control operation, the access control operation (i) rejecting the request when both (a) the result of the location evaluation operation indicates that the target does not belong to the secure network, and (b) a result of the sensitivity evaluation operation indicates that the file includes sensitive information, and (ii) otherwise causing a link to access the file to be provided to the target.
    Type: Grant
    Filed: June 30, 2013
    Date of Patent: December 1, 2015
    Assignee: Citrix Systems, Inc.
    Inventor: Juliano Maldaner
  • Patent number: 9038174
    Abstract: A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed purpose or active content data having an associated function. If a portion is passive content data, then a determination is made as to whether the portion of passive content data is to be re-generated. If a portion is active content data, then the portion is analyzed to determine whether the portion of active content data is to be re-generated. A re-generated electronic file is then created from the portions of content data which are determined to be re-generated.
    Type: Grant
    Filed: May 21, 2013
    Date of Patent: May 19, 2015
    Assignee: Glasswall IP Limited
    Inventors: Samuel Harrison Hutton, Trevor Goddard
  • Patent number: 8996869
    Abstract: A system and method for converting a device between an authorized device and an unauthorized device may include a crypto ignition key (CIK) and a mission module. The CIK may store an original device number corresponding to a device. The mission module typically loads a local mission and a key, decrypts the local mission with the key to produce a decrypted local mission, and generates an internal file encryption key (IFEK) and an internal split. The mission module may then encrypt the decrypted local mission to produce an encrypted local mission and then erase the IFEK. The mission module, when attached to the device, may read an additional device number from the device and recreate the IFEK based on the additional device number and the internal split. The mission module may decrypt the encrypted local mission and install the results in the device to convert the device into an authorized device.
    Type: Grant
    Filed: July 1, 2013
    Date of Patent: March 31, 2015
    Assignee: BAE Systems Information and Electronic Systems Integration Inc.
    Inventors: Jeffrey B. Canter, Mark J. Badcock