Patents Examined by Simon Kanaan
-
Patent number: 8769647Abstract: A method for accessing a 3G network includes: a terminal accessing a wireless local area network by adopting a WAPI protocol, and notifying an AAA server of a 3G network through an AP of the wireless local area network that the terminal intends to access the 3G network; the AAA server obtaining identity information of the terminal through the AP, and performing an EAP-TLS negotiation process with the terminal through the AP after determining that the terminal is a subscription terminal of the 3G network according to the identity information; and the terminal accessing the 3G network after finishing the EAP-TLS negotiation process. A system for accessing a 3G network includes an AP of a wireless local area network and an AAA server of a 3G network. The present invention reduces unnecessary processes the message interacting, the certificate verification, the signature verification, and so on and improves the system efficiency.Type: GrantFiled: September 23, 2009Date of Patent: July 1, 2014Assignee: ZTE CorporationInventors: Jiehui Liang, Yuanqing Shi, Jiabing Liu
-
Patent number: 8745735Abstract: To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules included in an apparatus each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server. The monitoring patterns are restructured by the update server such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.Type: GrantFiled: November 20, 2009Date of Patent: June 3, 2014Assignee: Panasonic CorporationInventors: Manabu Maeda, Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
-
Patent number: 8745412Abstract: A semiconductor memory device includes a controller module as well as a universal interface module and a semiconductor memory medium module, which are connected electrically with the controller module respectively. The device also includes a one-time programmable memory, which stores a unique serial number. This one-time programmable memory is provided within the controller module or the semiconductor memory medium module. The number sequence of the unique serial number contained in each of the semiconductor memory device is different from that of another semiconductor memory device. While providing a mobile data storage function, this invention adopts a security technology to prevent from illegal data reading/writing. This increases significantly the difficulty in decrypting the data of a legal user, subsequently improving the security of the stored data of the user greatly. This invention also provides a method for realizing secure data storage with this semiconductor memory device.Type: GrantFiled: October 16, 2009Date of Patent: June 3, 2014Assignee: Nationz Technologies, Inc.Inventors: Yingtong Sun, Hao Zou
-
Patent number: 8739254Abstract: Methods, systems, and products verify identity of a person identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified.Type: GrantFiled: December 6, 2011Date of Patent: May 27, 2014Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey A. Aaron
-
Patent number: 8732452Abstract: An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When a sender in one organization sends a message to a recipient in another organization, the federation server provides the sender's email server with a secure token for encrypting the message to provide secure delivery over the unsecured network.Type: GrantFiled: June 23, 2008Date of Patent: May 20, 2014Assignee: Microsoft CorporationInventors: Frank Byrum, Mayank Mehta, Chandresh Jain, Ladislau Conceicao, Brian Kress, Greg Gourevitch, Michael Nelte, Chris Barnes
-
Patent number: 8726025Abstract: An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted datum; decrypt the encrypted data based on the private key to generate a first string of digits, each digit including N bits, wherein N is a positive integer; shuffle the N bits of the each digit according a pre-determined pattern of bit positions to generate a second string of digits; and substitute a subset of the N bits of the each digit with pre-determined bits to generate a third string of digits.Type: GrantFiled: July 19, 2012Date of Patent: May 13, 2014Assignee: SAP AGInventor: Wolfgang Dittrich
-
Patent number: 8726368Abstract: A security management system, comprising: an authentication unit for authenticating an operator of an operating terminal in order to determine whether the operator is permitted to log in or release a lock; a current operator information inquiry unit for inquiring for login status information and current operator information; an authority information inquiry unit for inquiring for authority information regarding the operator and that regarding the current operator; a lock unit for detecting an event, where a predetermined lock condition is satisfied, in the login status to allow the operating terminal to change to a lock status, and for allowing the operating terminal to change to an operable status in response to a login instruction or an instruction for a release; and a lock control unit for transmitting the instruction for a release to the lock unit when a predetermined condition is satisfied.Type: GrantFiled: October 3, 2011Date of Patent: May 13, 2014Assignees: Kabushiki Kaisha Toshiba, Toshiba Medical Systems CorporationInventors: Naoki Oowaki, Fumiaki Teshima
-
Patent number: 8713660Abstract: An authentication platform comprises an authentication unit configured to authenticate the user based on received input data, and a control unit configured to enable communication between a client device and an authentication host as a consequence of successful authentication of the user by the authentication unit.Type: GrantFiled: May 16, 2011Date of Patent: April 29, 2014Assignee: TEC Solutions, Inc.Inventor: Todd Alan Carper
-
Patent number: 8712051Abstract: A system and method for detecting spoofing of signals by processing intermittent bursts of encrypted Global Navigation Satellite System (GNSS) signals in order to determine whether unencrypted signals are being spoofed. The system and method can allow a specially equipped GNSS receiver to detect sophisticated spoofing that cannot he detected using receiver antonomous integrity monitoring techniques. The system and method do not require changes to the signal structure of encrypted civilian GNSS signals, but instead use a short segment of an encrypted signal that is broadcast by the same GNSS spacecraft which broadcast the unencrypted signal of interest.Type: GrantFiled: March 12, 2010Date of Patent: April 29, 2014Assignee: Cornell UniversityInventor: Mark L. Psiaki
-
Patent number: 8705731Abstract: Processing of masked data using multiple lookup tables (LUTs), or sub-tables, is described. For each input value, an appropriate sub-table provides an output value that is the result of a non-linear transformation (e.g., byte substitution) applied to the input value. An additive mask can be applied to the input data. A transformation can be applied to the masked input data to transform the additive mask into a multiplicative-additive mask. Selected bits of the masked input data and the bits in the additive component of the multiplicative-additive mask can be used in combination to select one of the sub-tables. An entry in the selected sub-table, corresponding to a transformed version of the input data, can then be identified.Type: GrantFiled: May 19, 2011Date of Patent: April 22, 2014Assignee: Spansion LLCInventor: Elena Vasilievna Trichina
-
Patent number: 8683214Abstract: The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.Type: GrantFiled: September 16, 2010Date of Patent: March 25, 2014Assignee: Panasonic CorporationInventors: Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Junya Iwazaki
-
Patent number: 8671455Abstract: A method for detecting unintentional information disclosure. The method may include: 1) identifying at least one data access Application Programming Interface (API) programmed to provide access to sensitive information located on a computing device, 2) monitoring attempts to use the data access API, 3) while monitoring attempts to use the data access API, detecting an attempt by an application to access the sensitive information through the data access API, 4) in response to detecting the attempt to access the sensitive information, tracking the sensitive information accessed by the application, 5) detecting an attempt to leak the sensitive information outside of the computing device, and 6) in response to detecting the attempt to leak the sensitive information outside of the computing device, performing a security action.Type: GrantFiled: September 22, 2011Date of Patent: March 11, 2014Assignee: Symantec CorporationInventors: Xiaole Zhu, Jokul Tian
-
Patent number: 8661552Abstract: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for tamper-resistant storage.Type: GrantFiled: June 28, 2007Date of Patent: February 25, 2014Assignee: Microsoft CorporationInventors: James M. Alkove, Alexandre V. Grigorovitch, Sumedh N. Barde, Patrik Schnell
-
Patent number: 8649510Abstract: A device for confirming compliance with usage of a breathing gas delivery system that includes at least one sensor for monitoring operating data disposed within the breathing gas delivery system and a device for encoding the monitored operating data and displaying the encoded operating data for reporting to another location.Type: GrantFiled: August 19, 2009Date of Patent: February 11, 2014Assignee: DeVilbiss Healthcare, LLCInventors: Michael B. Knepper, Stephen F. Krepelka
-
Patent number: 8645708Abstract: An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a challenge and a response. The challenge and response is sent to a decryption node. In response, the decryption node computes a presumed response and compares the presumed response to the response of the portable device, in order to authenticate the individual associated with the portable device.Type: GrantFiled: November 30, 2007Date of Patent: February 4, 2014Assignee: Cidway Technologies, Ltd.Inventor: Isaac J. Labaton
-
Patent number: 8640250Abstract: A system and method for automating the creation, optimization and deployment of multimedia, interactive, mentoring communication modules (“MIPs”) is provided. Simplified interfaces allow superiors to generate MIPs and asynchronously deploy them to subordinates' mobile devices or personal computers. The completed MIP are automatically coded for optimal performance on specific mobile operating systems to which they are deployed. Automatic notifications are sent to registered subordinates upon deployment of a completed MIP. User configurable and system updatable management portals and subordinate portals are automatically generated to provide a user interface to enable mentoring interactions between the superior and subordinates. The MIPs allow custom tailoring of educational and developmental exercises. Performance of the exercises can be monitored by a superior for each of a plurality of subordinates.Type: GrantFiled: July 31, 2009Date of Patent: January 28, 2014Assignee: CSMentor, Inc.Inventors: Joy R. Hughes, Steven Wattenmaker
-
Patent number: 8621206Abstract: A method for facilitating electronic certification, and systems for use therewith, are presented in the context of public key encryption infrastructures. Some aspects of the invention provide methods for facilitating electronic certification using authority-neutral service requests sent by an application, which are then formatted by a server comprising a middleware that can convert the authority-neutral request into certification authority specific objects. The server and middleware then return a response from a selected certification authority back to the service requesting application. Thus, the server and/or middleware act as intermediaries that facilitate user transactions in an environment having multiple certification authorities without undue burden on the applications or the expense and reliability problems associated therewith.Type: GrantFiled: August 2, 2011Date of Patent: December 31, 2013Assignee: Zoralco Fund Limited Liability CompanyInventor: Kae-por F. Chang
-
Patent number: 8601261Abstract: Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associate with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity check may uncover an issue that exists with sending a secure message to the recipient. A reason is determined for the validity check issue and is provided to the mobile device's user.Type: GrantFiled: August 15, 2012Date of Patent: December 3, 2013Assignee: BlackBerry LimitedInventors: Michael K. Brown, Michael S. Brown, Herbert A. Little, Neil P. Adams
-
Patent number: 8565430Abstract: A method, system, and medium are provided for validating the identity or authority of a user of a wireless device to consent to providing geographic locations of their respective wireless device to a third-party application. Upon receiving a request to validate the authority of a user to consent to providing of geographic locations, the user is automatically redirected to a validation service portal. The validation service portal verifies the identity or authority of the user to consent by requiring the user to provide identification information. The identification information is compared to identification information in one or more databases to determine if the user has the authority to consent. An indication is provided by the validation service portal to the third-party application of whether the user has the authority to consent. The third-party application then initiates location-based services based on the indication.Type: GrantFiled: June 19, 2008Date of Patent: October 22, 2013Assignee: Sprint Communications Company L.P.Inventors: John R. Schuler, Rodney D. Nelson, Michael P. McMullen, Geetha R. Thati
-
Patent number: 8555068Abstract: An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality.Type: GrantFiled: December 5, 2007Date of Patent: October 8, 2013Assignee: Koolspan, Inc.Inventors: Anthony C. Fascenda, Emil Sturniolo, Paul Benware, Robert Cichielo