Patents Examined by Techane J. Gergiso
-
Patent number: 7500269Abstract: Methods and devices allowing distribution of content that resides in a source device on a local area network (LAN) are described. A gateway between the LAN and a wide area network (WAN) receives from a sink device a request for an instance of content. The request is sent over the WAN. Distribution of the item of content within the LAN uses a first digital rights management (DRM) protocol that prevents the item of content from being distributed outside the LAN. For the item of content, the gateway converts from the first DRM protocol to a second DRM protocol that can be used for transmitting content over the WAN. The item of content can then be forwarded to the sink device according to the second DRM protocol.Type: GrantFiled: March 7, 2005Date of Patent: March 3, 2009Assignee: Cisco Technology, Inc.Inventors: Allen J. Huotari, Mark John Baugher
-
Patent number: 7487356Abstract: An encoding apparatus that embeds a watermark in host data is provided. A multiplexer generates a plurality of bit sequences by adding initial data to the head of the watermark. A scrambler scrambles a plurality of the bit sequences respectively and generates a plurality of scrambled watermarks. An embedder embeds a plurality of the scrambled watermarks in the host data and generates a plurality of candidate watermarked host data. A signal-to-noise ratio calculator evaluates the robustness of the watermarks hidden in the respective candidate watermarked host data. A selector selects one candidate that has the highest level of the robustness as a final watermarked host data.Type: GrantFiled: February 5, 2003Date of Patent: February 3, 2009Assignee: Sanyo Electric Co., Ltd.Inventor: Akiomi Kunisa
-
Patent number: 7480798Abstract: A system and method for representing multiple security groups as a single data object are provided. With the system and method, a complex group object is created that consists of a group set value and a mask value. The complex group object represents a plurality of groups by the group set value. The mask value is used to apply to group identifiers received during an authentication process to generate a value that is compared against the group set value to determine if the group identifiers are part of the complex group. For example, in a first step of authorization processing, the group identifier received in an authorization request is bit-wise AND'd with the mask value for the complex group data object. In a second step, the masked group identifier from the received request is compared to the group set value of the complex group object.Type: GrantFiled: June 5, 2003Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventor: Julianne Frances Haugh
-
Patent number: 7478233Abstract: In a distributed computing architecture, a method and system for authenticating a message as originating from an unaltered or unmodified node is provided. Prior to sending a messages, a black box software module in a node validates the node to determine whether the node has been altered or modified without authorization. Once validated, the black box alters a message, using a black box protection scheme, in such a manner that the message can be subsequently authenticated. The black box module sends the altered message to a peer node, whose own black box authenticates the message using an authentication scheme corresponding to the protection scheme. Because validation is performed, each node may assume that the message originated from an unaltered node. The protection and/or validation scheme can be changed in regular intervals so that attackers do not have time to reverse engineer the black box.Type: GrantFiled: May 30, 2002Date of Patent: January 13, 2009Assignee: Microsoft CorporationInventors: Erik B. Olson, Eric K. Zinda
-
Patent number: 7478248Abstract: A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device under a user password, the microprocessor also operable to exclude access to the secure user data area unless the user password is provided.Type: GrantFiled: November 27, 2002Date of Patent: January 13, 2009Assignee: M-Systems Flash Disk Pioneers, Ltd.Inventors: Aran Ziv, Eyal Bychkov
-
Patent number: 7472423Abstract: A system provides for tracking the behavior of television viewers and Internet browsers while protecting the privacy of the user. The level of privacy is under control of the user. In one embodiment, an arbitrary anonymous identifier is assigned to the user. The selection of a new arbitrary anonymous identifier is under the control of the user. In a second embodiment, a private anonymous identifier is based on a user entered password. The user history data is stored on a history server using the private anonymous identifier. An authentication server is provided to validate the private anonymous identifier before transferring the user history data to the history server.Type: GrantFiled: March 27, 2002Date of Patent: December 30, 2008Assignee: TVWorks, LLCInventors: Christopher J DeCenzo, Sihai Xiao
-
Patent number: 7469417Abstract: A method and system for authenticated dynamic extension of security domain boundaries includes high security domain extension instructions for sequentially and dynamically forming an extended high security domain (133) through a protected communication path (128). The protected communication path (128) extends from a first computer (10) associated with a high security domain (80) into a second computer (10) associated with low security domain (120). The method and system establish the extended high security domain (133) within the second computer (10). A protected communication path (128) forms an isolation barrier (131) separating the extended high security domain (133) from other objects (126) within the low security domain (120). Authentication instructions (146) temporarily 20 authenticate at least one object (132) associated with the low security domain (120).Type: GrantFiled: June 17, 2003Date of Patent: December 23, 2008Assignee: Electronic Data Systems CorporationInventors: Jolyon A. Fearnley, Beresford Shute, Brian Johnson, Diane Furniss, David A. Waters
-
Patent number: 7467399Abstract: Techniques are disclosed for achieving context-sensitive confidentiality within a federated environment for which content is aggregated in a distributed Web portal (or similar aggregation framework), ensuring that message portions that should be confidential are confidential to all entities in the federated environment except those entities to which the message portions may properly be divulged. The federation may comprise an arbitrary number of autonomous security domains, and these security domains may have independent trust models and authentication services. Using the disclosed techniques, messages can be routed securely within a cross-domain federation (irrespective of routing paths), thereby ensuring that confidential information is not exposed to unintended third parties and that critical information is not tampered with while in transit between security domains. Preferred embodiments leverage Web services techniques and a number of industry standards.Type: GrantFiled: March 31, 2004Date of Patent: December 16, 2008Assignee: International Business Machines CorporationInventors: Anthony J. Nadalin, Ajamu A. Wesley
-
Patent number: 7464404Abstract: A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When a truncated secure session attack is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the attack is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the attack. If the attack is detected, the blocking measure is re-applied, and its duration is adapted. If the attack is no longer detected, the method returns to the state of readiness.Type: GrantFiled: November 17, 2005Date of Patent: December 9, 2008Assignee: International Business Machines CorporationInventors: Brian Edward Carpenter, Kevin David Himberger, Clark Debs Jeffries, Mohammad Peyravian
-
Patent number: 7444668Abstract: A method and apparatus for determining access protection (96) includes receiving a plurality of access requests (84) corresponding to a plurality of masters (12, 14), determining access permissions (86), providing state information (60), determining access permissions (86) based on the access request (84), and selectively modifying the access permissions based on the state information (90). The state information (60) may relate to debug operation, operation from unsecure or unverified memories, memory programming, direct memory access operation, boot operation, software security verification, security levels, security monitor operation, operating mode, fault monitor, external bus interface, etc (88).Type: GrantFiled: May 29, 2003Date of Patent: October 28, 2008Assignee: Freescale Semiconductor, Inc.Inventors: William C. Moyer, Afzal M. Malik
-
Patent number: 7441114Abstract: An automation control module (ACM) including an ACM central processing unit (CPU) and a web system electrically connected to the ACM CPU. The web system is configured to process security layer encrypted hypertext transfer protocol (HTTP) requests from a network.Type: GrantFiled: September 10, 2002Date of Patent: October 21, 2008Assignee: GE FANUC Automation North America, Inc.Inventors: David Scott Collier, Ferrell Louis Mercer, Jason Daniel Kadingo, Brad J. Bolfing
-
Patent number: 7437563Abstract: Integrity checking of a software module to be used in a mobile communication terminal (101) is illustrated. The terminal (101) is capable of communicating in a mobile communication system (100) and the software module is stored on a removable memory unit (103) connected to the terminal (101). The terminal (101) communicates via the mobile communication system (100) with the software provider (125). During the communication a digitally signed data block comprising a reference value for use during integrity checking of said software module is received.Type: GrantFiled: September 19, 2003Date of Patent: October 14, 2008Assignee: Nokia CorporationInventor: Antti Vähä-Sipilä
-
Patent number: 7437765Abstract: A sensitive display system is described. The sensitive display system allows for mediation of content provided from a source to a recipient, such as from a web server to a web browser. Mediation may involve intercepting and augmenting the content so as to restrict or otherwise control information displayed on a display of the recipient device. In this way, the sensitive display system allows restricted information to be replaced with security status messages, or removed entirely. For example, when a user comes within a specified distance from the sensitive display area, a security classification level of the approaching user is used to determine whether there should be any change in the display. If so, a mediating device causes a browser push to occur, to thereby block or otherwise restrict some or all of the display.Type: GrantFiled: June 3, 2003Date of Patent: October 14, 2008Assignee: SAP AktiengesellschaftInventors: Kim Elms, Rainer Ruggaber, Elmar Dorner
-
Patent number: 7434043Abstract: Methods and apparatus are provided for handling data at a cryptography accelerator output interface. A shared resource such as a shared output buffer is provided at the cryptography accelerator output interface having multiple output ports. The output interface shared resource can be allocated amongst the various output ports based on characteristics and requirements of the various input ports. References to data in the shared resource allow processing and ordering of data following processing by cryptographic processing cores.Type: GrantFiled: January 23, 2003Date of Patent: October 7, 2008Assignee: Broadcom CorporationInventors: Mark Buer, Donald P. Matthews
-
Patent number: 7434063Abstract: In an authentication apparatus, at least one authentication program corresponding to an authentication method of the user's choice executes an authentication process based on data received from a sensor unit and personal feature data. An authentication determination program calculates a comprehensive authentication level value of such an authentication method on the basis of authentication evaluation data. When the calculated comprehensive authentication level value has exceeded the predetermined authentication level, the authentication determination program determines that authentication has succeeded; otherwise, the program determines that authentication has failed.Type: GrantFiled: October 3, 2002Date of Patent: October 7, 2008Assignee: Kabushiki Kaisha ToshibaInventor: Isao Watanabe
-
Patent number: 7424606Abstract: A system and method for authenticating an operating system includes, in accordance with one aspect, a method in a computer system having a processor, an operating system (OS), and a software identity register that holds an identity of the operating system, the processor having a private key. The method comprises forming an OS certificate containing the identity from the software identity register and signing the OS certificate using the private key. In accordance with another aspect, the signed identity is submitted to a recipient to prove an identity of the operating system to the recipient.Type: GrantFiled: May 7, 2003Date of Patent: September 9, 2008Assignee: Microsoft CorporationInventors: Butler W. Lampson, John D. DeTreville, Paul England
-
Patent number: 7418730Abstract: A system in which a networked device automatically evaluates hacker attack notification information and, based thereon, selects and executes responses to the attack. The notification may include information such as the address of the infected system, identification of the specific worm, and a list of vulnerable applications and operating systems. The evaluation is based on factors including criticality and vulnerability of applications running on the system and connectivity of the device. A variety of automatic responses can be selected, including notification of network administration, shutdown of the device or services running on the device, updating and activation of anti-virus software, and selective handling of data sent from the address of the suspect network device. The selection of responses can occur automatically based on rules input during setup or by intervention of network administration.Type: GrantFiled: December 17, 2002Date of Patent: August 26, 2008Assignee: International Business Machines CorporationInventors: Simon C. Chu, Steven W. Hunter, William Joseph Piazza, Gregory Brian Pruett
-
Patent number: 7418727Abstract: A security authentication for PC client is provided according to the present invention, wherein said method includes: PC client sends a registry request to a server with a user ID and a password; The server makes first authentication based on the user ID and password, if the authentication succeeds, a field used for re-authentication will be created and returned to the PC client through an authentication successful message; When initiating a call, the PC client transmits the user ID and the field used for re-authentication acquired when registered to media gateway controller; The media gateway controller transfers the user ID and field used for re-authentication to the server, which makes second authentication according to the user ID and the field used for the second authentication, if the authentication fails, the call will be rejected, otherwise the call will be accepted and returns information of the called subscriber.Type: GrantFiled: June 7, 2002Date of Patent: August 26, 2008Assignee: Huawei Technologies Co., LtdInventors: Haitao Lin, Quan Gan, Shuiyang Chen, Xiaolan Wang
-
Patent number: 7415619Abstract: A recording disc has a lead-in area and a data area. A scrambled version of a SID code word is read out from the lead-in area of the disc. The SID code word represents a producer of the disc. The readout scrambled version is de-scrambled to recover the SID code word. The recovered SID code word is collated with reference SID code words to decide whether or not the disc is legitimate. Main information is read out from the data area of the disc when it is decided that the disc is legitimate. Readout of the main information from the data area of the disc is inhibited when it is decided that the disc is not legitimate.Type: GrantFiled: August 11, 2003Date of Patent: August 19, 2008Assignees: Victor Company of Japan, Ltd., Victor Entertainment, Inc.Inventors: Yoshiaki Tanaka, Isao Oowaki
-
Patent number: 7409714Abstract: A method of forming a virtual intrusion detection system includes the step of positioning a set of sensors in a network environment, each sensor supporting multiple logical traffic paths. The method also includes the step of providing a set of sensor management systems corresponding to the set of sensors. This set of sensor management systems enforces a set of virtual intrusion detection systems, wherein each virtual intrusion detection system corresponds to a predetermined logical traffic path through the set of sensors, each virtual detection system providing sensor traffic information solely to authorized parties.Type: GrantFiled: June 13, 2002Date of Patent: August 5, 2008Assignee: McAfee, Inc.Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman