Patents Examined by Syed Zia
  • Patent number: 8381291
    Abstract: A method of detecting and responding to an email address harvest attack at an Internet Service Provider (ISP) email system includes counting a number of failed email address look-ups during a single Simple Mail Transfer Protocol (SMTP) session associated with an originating Internet Protocol (IP) address and responding to the originating IP address with a positive acknowledgement that an otherwise invalid email address exists when the count of the number of failed email address look-ups exceeds a threshold.
    Type: Grant
    Filed: December 10, 2009
    Date of Patent: February 19, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Stephen K. Wood
  • Patent number: 8374234
    Abstract: Computer program products and arrangements to process digital data are contemplated. The digital data may contain values, representing quantities of a wave form over regions. Embodiments include transformations, code, state machines or other logic to process digital data by dividing one of the regions, where one of the values represents a quantity of a wave form over the region. The embodiments may include assigning a value to each of the subregions. The average of the values of the subregions, weighted by the measures of the subregions, may approximately equal the value of the region. The regions may comprise pixels and the values of the pixels may represent the intensity of light waves over the pixels. The embodiments may include the processing of digital data in cameras, televisions, audio players, seismic devices, and medical imaging devices. The subdivision of regions and the assignment of value to the subregions may utilize derivative migration.
    Type: Grant
    Filed: July 9, 2007
    Date of Patent: February 12, 2013
    Inventors: Francis S. J. Munoz, Vadym P. Babich, Stephen R. Campbell
  • Patent number: 8365284
    Abstract: The invention relates to a security border node (2a) for protecting a packet-based network from attacks, comprising: an anomaly detection unit (10) for performing an anomaly detection, in particular a statistical analysis, on session control messages (11), in particular on SIP messages contained in a packet stream (5) received in the security border node (2a). The security border node further comprises a message context provisioning unit (13) for providing at least one session control message (11) to the anomaly detection unit (10) together with message context information (12, 17, 24) related to a client (22) and/or to a session (23) to which the session control message (11, 11a to 11f) is attributed. The invention also relates to a method for protecting a packet-based network from attacks, to a computer program product, and to a packet-based network.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: January 29, 2013
    Assignee: Alcatel Lucent
    Inventor: Stefan Wahl
  • Patent number: 8345876
    Abstract: A method of encrypting a plain text message that is m characters in length is described. A one off random key having a length of m characters is generated. The random key uses a character set and modulus that is compatible with the plain text message. A first substitution encryption of the plain text message is performed using the generated random key. A string of random fill characters that is f characters in length, f being a number between zero and infinity is generated. The generated random key and the string of random fill characters is concatenated to the encrypted plain text message to generate an encrypted message string. The encrypted message string has a length 2m+f. The encrypted message string is transmitted to a receiver.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: January 1, 2013
    Inventors: Robert Samuel Sinn, Charles Gordon Sinn, Robert Mannerstedt Sinn
  • Patent number: 8347085
    Abstract: At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, “program”) running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, “integrity label”) based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: January 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Thekkthalackal Varugis Kurien, Jeffrey B Hamblin, Narasimha Rao Nagampalli, Peter T Brundrett, Scott Field
  • Patent number: 8341737
    Abstract: A callback component embedded on a web site determines a current location of the web site. The current location is compared to a known legitimate location of the web site to determine if the web site has been copied to a different host location. Responsive to determining that the web site has been copied to a different location, the callback component alerts a central authority that the web site may be a fraudulent web site set up to launch phishing attacks. If the central authority determines that the web site is fraudulent, the central authority alerts appropriate entities to take down the fraudulent web site. The callback component generates a visual component viewable on the web site to deter phishing attackers from removing the callback component when the web site is copied.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: December 25, 2012
    Assignee: Symantec Corporation
    Inventors: Zulfikar Ramzan, Oliver Friedrichs, Andrea Del Miglio, Candid Wüest, Sourabh Satish
  • Patent number: 8335255
    Abstract: A motion estimation method, medium, and system with fast motion estimation. The motion estimation method includes comparing a cost indicating a difference between a current block of a current image and a block of a reference image specified by a starting point with a predetermined threshold and selectively searching for the best matching block of the current block from the starting point according to the comparison result.
    Type: Grant
    Filed: April 10, 2007
    Date of Patent: December 18, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Ho-Jin Lee, Sang-Jo Lee, Si-hwa Lee, Do-hyung Kim
  • Patent number: 8332912
    Abstract: A server in a home domain for managing the authentication of clients that are subscribers of the home domain, but are attached to a visited domain. Based on knowledge of the type of security being used in an access network of the visited domain, the server determines whether a given client is to be authenticated by the visited domain or the home domain. The server then signals the result to the visited domain.
    Type: Grant
    Filed: January 4, 2007
    Date of Patent: December 11, 2012
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Mats Näslund, John Michael Walker
  • Patent number: 8332656
    Abstract: Systems for encoding and reading RFID tags on a collection of items are shown. One embodiment of the invention includes a plurality of items, where each item possesses an item identifier string, and a plurality of RFID tags, where an RFID tag is affixed to each of the items and each RFID tag is encoded with a code word element generated using at least all of the item identifier strings. In many embodiments, the collection is a plurality of goods contained within a case, pallet, container or storage area.
    Type: Grant
    Filed: January 9, 2008
    Date of Patent: December 11, 2012
    Assignee: Mojix, Inc.
    Inventors: Christopher Richard Jones, Ramin Sadr
  • Patent number: 8327146
    Abstract: A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a digital signature and only a portion of the data used in generating the signature. The remaining certificate data is pre-stored on one or more wireless devices for which secure communication is desired. Upon receiving a compact certificate, the wireless device authenticates the certificate using its digital signature along with both the data contained in the certificate and the data pre-stored on the wireless device. This approach permits secure connections to be established between wireless devices using relatively small digital certificates.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: December 4, 2012
    Assignee: General Motors LLC
    Inventors: Sethu K. Madhavan, Kenneth L. Peirce, Ki Hak Yi, Elizabeth Chesnutt, Ansaf I. Alrabady
  • Patent number: 8321948
    Abstract: Operating parameters of one or more software appliances may be set at a configuration manager. Compliance of the one or more software appliances with license terms may be maintained at a license manager. Communications may be executed between the license manager and the configuration manager to maintain compliance of the operating parameters with the license terms. A user interface may be provided for administration of the one or more software appliances therewith, the administration including deployment of the one or more software appliances, the license manager, the configuration manager, and a deployment manager within a system landscape. Communication may be executed between the license manager and the deployment manager to maintain compliance of the administration of the one or more software appliances with the license terms. Communication may be executed between the deployment manager and the configuration manager to manage the deployment relative to the operating parameters.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: November 27, 2012
    Assignee: SAP AG
    Inventors: Philip Robinson, Benoit Hudzia
  • Patent number: 8321542
    Abstract: A system and method are provided for allocating wireless channels in a base station processor to messages sent between a subscriber and the base station processor in a wireless network. A latency period is determined corresponding to a return message to be received from a responsive node in response to an outgoing message sent from a sender via the base station processor. A latency manager in the base station processor computes the latency period and stores the latency period in an allocation table. A scheduler schedules a channel to be available at the end of the latency period indicated in the allocation table. At the end of the latency period, the return message is received and the scheduler allocates a channel as defined in the allocation table. The scheduled channel is used to transmit the message to or from the corresponding subscriber.
    Type: Grant
    Filed: May 5, 2000
    Date of Patent: November 27, 2012
    Assignee: IPR Licensing, Inc.
    Inventors: Kevin L. Farley, James A. Proctor, Jr.
  • Patent number: 8321915
    Abstract: Disclosed are various systems, methods, and other embodiments for the control of access to a mass storage system. In one example, a plurality of buckets are maintained in mass storage system, each of the buckets being employed to store at least one data file. In a server, a use of the buckets by a plurality of entities that use a plurality of clients is facilitated for the storage of a plurality of files over a public network. The use of one of the buckets by the one of the entities is restricted to a namespace.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: November 27, 2012
    Assignee: Amazon Technologies, Inc.
    Inventors: Guido Enrico Bartolucci, Manikandan Thangarathnam, Ryan J. Snodgrass, Sriram Narasimhan
  • Patent number: 8315393
    Abstract: A secure communication system wherein message decryption may be performed while off-line, or optionally while on-line. A sender encrypts a message based on the message key and sends it to the recipient. An envelope containing a message key is created by encrypting the message key based on a verifier, where the verifier is based on a secret of the recipient. The recipient is provided the envelope, along with the message or separately, from the sender or from another party, contemporaneous with receipt of the message or otherwise. The recipient can then open the envelope while off-line, based on their secret, and retrieve the message key from the envelope to decrypt the message. In the event the recipient cannot open the envelope, optional on-line access permits obtaining assistance that may include obtaining an alternate envelope that the recipient can open.
    Type: Grant
    Filed: July 20, 2010
    Date of Patent: November 20, 2012
    Assignee: Proofpoint, Inc
    Inventors: Jahanshah Moreh, Logan O'Sullivan Bruns
  • Patent number: 8315385
    Abstract: The present invention provides a system and method for introducing white noises into a digital audio signal so that there is progressive and cumulative degradation in audio quality after each successive reproduction of the audio sound signal in a fashion analogous to analog audio reproduction. The invention provides a white noise generator, and a digital entroping unit. In a preferred embodiment, the white noise generator is implemented by a hardware random number generator. The digital entroping unit controls the magnitude of white noise desired based on a random number generated by the random number generator, and adds the white noise to the input audio sound signal to produce a degraded audio sound signal. The magnitude of white noise can be controlled by using various masking and formatting of random number data.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: November 20, 2012
    Assignee: Nvidia Corporation
    Inventor: Jason Seung-Min Kim
  • Patent number: 8316439
    Abstract: An anti-virus system for enforcing a virus monitoring and scanning process, the anti-virus and firewall system comprises a master CPU card, a plurality of slave CPU cards and a programmable logic. The master CPU card is used for controlling the virus monitoring and scanning process and dividing the virus monitoring and scanning process into a plurality of sub-processes. The plurality of slave CPU cards are controlled by the master CPU card in a software level and a hardware level, each of the plurality of slave CPU cards receives and processes one of the plurality of sub-processes then sends back to the master CPU card. The programmable logic controlled by the master CPU card for monitoring and controlling said plurality of slave CPU cards at a hardware level.
    Type: Grant
    Filed: May 17, 2007
    Date of Patent: November 20, 2012
    Assignee: Iyuko Services L.L.C.
    Inventors: Licai Fang, Jyshyang Chen, Donghui Yang
  • Patent number: 8316418
    Abstract: Computer-implemented system and methods for authenticating the identity of a person, for example a customer (1) of an E-Commerce web site (15). The web site or other verification “client” (110) contacts a verification engine (10, 100) (“Authentex”), which may be implemented as a web server (604). The verification engine (10), in turn, has limited access to a plurality of independent, third-party secure databases (21, 112) which are maintained by Trusted Validators (3, 610, 620, etc), which are entities such as banks that have a pre-existing relationship with customer (FIG. 4), and due to that relationship, acquire and maintain “out-of-wallet” data (4) that may be useful to authenticate the identity of the customer. That confidential customer data—held by the third-party “Trusted Validators”—is not disclosed.
    Type: Grant
    Filed: September 12, 2011
    Date of Patent: November 20, 2012
    Assignee: RAF Technology, Inc.
    Inventor: David Justin Ross
  • Patent number: 8312537
    Abstract: A signature is identified in association with an entity at a client. A reputation score associated with the entity is identified, the reputation score indicating a likelihood that the entity will compromise the client. Whether the signature detection event is a false positive signature detection event is evaluated based on the reputation score and reported.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: November 13, 2012
    Assignee: Symantec Corporation
    Inventors: Carey S. Nachenberg, Kent E. Griffin
  • Patent number: 8312549
    Abstract: The following subject matter provides a computer-implemented method and system for calculation of cost-effectiveness of countermeasures in mitigating the threats on a system through calculating risk of threats. The calculation is run on a model of assets, threats, vulnerabilities and countermeasures and enables the production of easy to understand reports and action item lists showing the financial value of threat risks and countermeasures priorities and cost-effectiveness.
    Type: Grant
    Filed: August 2, 2005
    Date of Patent: November 13, 2012
    Inventors: Ygor Goldberg, Michael Levy
  • Patent number: 8312547
    Abstract: A computer includes a portable environment including a portable file system located on a removable storage device, the portable environment using virtualization in a host operating system. A path translation module translates a virtualized path of a file in the portable file system to an actual path of the file. The virtualized path is the path in the context of a portable user application running in the portable environment, and the actual path is the path in the context of the host operating system. A malware detection module executing directly under the host operating system determines whether the file contains malware using the actual path of the file and takes remedial actions if malware is detected.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: November 13, 2012
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale