Patents Examined by Techane J. Gergiso
  • Patent number: 7500269
    Abstract: Methods and devices allowing distribution of content that resides in a source device on a local area network (LAN) are described. A gateway between the LAN and a wide area network (WAN) receives from a sink device a request for an instance of content. The request is sent over the WAN. Distribution of the item of content within the LAN uses a first digital rights management (DRM) protocol that prevents the item of content from being distributed outside the LAN. For the item of content, the gateway converts from the first DRM protocol to a second DRM protocol that can be used for transmitting content over the WAN. The item of content can then be forwarded to the sink device according to the second DRM protocol.
    Type: Grant
    Filed: March 7, 2005
    Date of Patent: March 3, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Allen J. Huotari, Mark John Baugher
  • Patent number: 7487356
    Abstract: An encoding apparatus that embeds a watermark in host data is provided. A multiplexer generates a plurality of bit sequences by adding initial data to the head of the watermark. A scrambler scrambles a plurality of the bit sequences respectively and generates a plurality of scrambled watermarks. An embedder embeds a plurality of the scrambled watermarks in the host data and generates a plurality of candidate watermarked host data. A signal-to-noise ratio calculator evaluates the robustness of the watermarks hidden in the respective candidate watermarked host data. A selector selects one candidate that has the highest level of the robustness as a final watermarked host data.
    Type: Grant
    Filed: February 5, 2003
    Date of Patent: February 3, 2009
    Assignee: Sanyo Electric Co., Ltd.
    Inventor: Akiomi Kunisa
  • Patent number: 7480798
    Abstract: A system and method for representing multiple security groups as a single data object are provided. With the system and method, a complex group object is created that consists of a group set value and a mask value. The complex group object represents a plurality of groups by the group set value. The mask value is used to apply to group identifiers received during an authentication process to generate a value that is compared against the group set value to determine if the group identifiers are part of the complex group. For example, in a first step of authorization processing, the group identifier received in an authorization request is bit-wise AND'd with the mask value for the complex group data object. In a second step, the masked group identifier from the received request is compared to the group set value of the complex group object.
    Type: Grant
    Filed: June 5, 2003
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventor: Julianne Frances Haugh
  • Patent number: 7478233
    Abstract: In a distributed computing architecture, a method and system for authenticating a message as originating from an unaltered or unmodified node is provided. Prior to sending a messages, a black box software module in a node validates the node to determine whether the node has been altered or modified without authorization. Once validated, the black box alters a message, using a black box protection scheme, in such a manner that the message can be subsequently authenticated. The black box module sends the altered message to a peer node, whose own black box authenticates the message using an authentication scheme corresponding to the protection scheme. Because validation is performed, each node may assume that the message originated from an unaltered node. The protection and/or validation scheme can be changed in regular intervals so that attackers do not have time to reverse engineer the black box.
    Type: Grant
    Filed: May 30, 2002
    Date of Patent: January 13, 2009
    Assignee: Microsoft Corporation
    Inventors: Erik B. Olson, Eric K. Zinda
  • Patent number: 7478248
    Abstract: A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device under a user password, the microprocessor also operable to exclude access to the secure user data area unless the user password is provided.
    Type: Grant
    Filed: November 27, 2002
    Date of Patent: January 13, 2009
    Assignee: M-Systems Flash Disk Pioneers, Ltd.
    Inventors: Aran Ziv, Eyal Bychkov
  • Patent number: 7472423
    Abstract: A system provides for tracking the behavior of television viewers and Internet browsers while protecting the privacy of the user. The level of privacy is under control of the user. In one embodiment, an arbitrary anonymous identifier is assigned to the user. The selection of a new arbitrary anonymous identifier is under the control of the user. In a second embodiment, a private anonymous identifier is based on a user entered password. The user history data is stored on a history server using the private anonymous identifier. An authentication server is provided to validate the private anonymous identifier before transferring the user history data to the history server.
    Type: Grant
    Filed: March 27, 2002
    Date of Patent: December 30, 2008
    Assignee: TVWorks, LLC
    Inventors: Christopher J DeCenzo, Sihai Xiao
  • Patent number: 7469417
    Abstract: A method and system for authenticated dynamic extension of security domain boundaries includes high security domain extension instructions for sequentially and dynamically forming an extended high security domain (133) through a protected communication path (128). The protected communication path (128) extends from a first computer (10) associated with a high security domain (80) into a second computer (10) associated with low security domain (120). The method and system establish the extended high security domain (133) within the second computer (10). A protected communication path (128) forms an isolation barrier (131) separating the extended high security domain (133) from other objects (126) within the low security domain (120). Authentication instructions (146) temporarily 20 authenticate at least one object (132) associated with the low security domain (120).
    Type: Grant
    Filed: June 17, 2003
    Date of Patent: December 23, 2008
    Assignee: Electronic Data Systems Corporation
    Inventors: Jolyon A. Fearnley, Beresford Shute, Brian Johnson, Diane Furniss, David A. Waters
  • Patent number: 7467399
    Abstract: Techniques are disclosed for achieving context-sensitive confidentiality within a federated environment for which content is aggregated in a distributed Web portal (or similar aggregation framework), ensuring that message portions that should be confidential are confidential to all entities in the federated environment except those entities to which the message portions may properly be divulged. The federation may comprise an arbitrary number of autonomous security domains, and these security domains may have independent trust models and authentication services. Using the disclosed techniques, messages can be routed securely within a cross-domain federation (irrespective of routing paths), thereby ensuring that confidential information is not exposed to unintended third parties and that critical information is not tampered with while in transit between security domains. Preferred embodiments leverage Web services techniques and a number of industry standards.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: December 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Anthony J. Nadalin, Ajamu A. Wesley
  • Patent number: 7464404
    Abstract: A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When a truncated secure session attack is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the attack is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the attack. If the attack is detected, the blocking measure is re-applied, and its duration is adapted. If the attack is no longer detected, the method returns to the state of readiness.
    Type: Grant
    Filed: November 17, 2005
    Date of Patent: December 9, 2008
    Assignee: International Business Machines Corporation
    Inventors: Brian Edward Carpenter, Kevin David Himberger, Clark Debs Jeffries, Mohammad Peyravian
  • Patent number: 7444668
    Abstract: A method and apparatus for determining access protection (96) includes receiving a plurality of access requests (84) corresponding to a plurality of masters (12, 14), determining access permissions (86), providing state information (60), determining access permissions (86) based on the access request (84), and selectively modifying the access permissions based on the state information (90). The state information (60) may relate to debug operation, operation from unsecure or unverified memories, memory programming, direct memory access operation, boot operation, software security verification, security levels, security monitor operation, operating mode, fault monitor, external bus interface, etc (88).
    Type: Grant
    Filed: May 29, 2003
    Date of Patent: October 28, 2008
    Assignee: Freescale Semiconductor, Inc.
    Inventors: William C. Moyer, Afzal M. Malik
  • Patent number: 7441114
    Abstract: An automation control module (ACM) including an ACM central processing unit (CPU) and a web system electrically connected to the ACM CPU. The web system is configured to process security layer encrypted hypertext transfer protocol (HTTP) requests from a network.
    Type: Grant
    Filed: September 10, 2002
    Date of Patent: October 21, 2008
    Assignee: GE FANUC Automation North America, Inc.
    Inventors: David Scott Collier, Ferrell Louis Mercer, Jason Daniel Kadingo, Brad J. Bolfing
  • Patent number: 7437563
    Abstract: Integrity checking of a software module to be used in a mobile communication terminal (101) is illustrated. The terminal (101) is capable of communicating in a mobile communication system (100) and the software module is stored on a removable memory unit (103) connected to the terminal (101). The terminal (101) communicates via the mobile communication system (100) with the software provider (125). During the communication a digitally signed data block comprising a reference value for use during integrity checking of said software module is received.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: October 14, 2008
    Assignee: Nokia Corporation
    Inventor: Antti Vähä-Sipilä
  • Patent number: 7437765
    Abstract: A sensitive display system is described. The sensitive display system allows for mediation of content provided from a source to a recipient, such as from a web server to a web browser. Mediation may involve intercepting and augmenting the content so as to restrict or otherwise control information displayed on a display of the recipient device. In this way, the sensitive display system allows restricted information to be replaced with security status messages, or removed entirely. For example, when a user comes within a specified distance from the sensitive display area, a security classification level of the approaching user is used to determine whether there should be any change in the display. If so, a mediating device causes a browser push to occur, to thereby block or otherwise restrict some or all of the display.
    Type: Grant
    Filed: June 3, 2003
    Date of Patent: October 14, 2008
    Assignee: SAP Aktiengesellschaft
    Inventors: Kim Elms, Rainer Ruggaber, Elmar Dorner
  • Patent number: 7434043
    Abstract: Methods and apparatus are provided for handling data at a cryptography accelerator output interface. A shared resource such as a shared output buffer is provided at the cryptography accelerator output interface having multiple output ports. The output interface shared resource can be allocated amongst the various output ports based on characteristics and requirements of the various input ports. References to data in the shared resource allow processing and ordering of data following processing by cryptographic processing cores.
    Type: Grant
    Filed: January 23, 2003
    Date of Patent: October 7, 2008
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Donald P. Matthews
  • Patent number: 7434063
    Abstract: In an authentication apparatus, at least one authentication program corresponding to an authentication method of the user's choice executes an authentication process based on data received from a sensor unit and personal feature data. An authentication determination program calculates a comprehensive authentication level value of such an authentication method on the basis of authentication evaluation data. When the calculated comprehensive authentication level value has exceeded the predetermined authentication level, the authentication determination program determines that authentication has succeeded; otherwise, the program determines that authentication has failed.
    Type: Grant
    Filed: October 3, 2002
    Date of Patent: October 7, 2008
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Isao Watanabe
  • Patent number: 7424606
    Abstract: A system and method for authenticating an operating system includes, in accordance with one aspect, a method in a computer system having a processor, an operating system (OS), and a software identity register that holds an identity of the operating system, the processor having a private key. The method comprises forming an OS certificate containing the identity from the software identity register and signing the OS certificate using the private key. In accordance with another aspect, the signed identity is submitted to a recipient to prove an identity of the operating system to the recipient.
    Type: Grant
    Filed: May 7, 2003
    Date of Patent: September 9, 2008
    Assignee: Microsoft Corporation
    Inventors: Butler W. Lampson, John D. DeTreville, Paul England
  • Patent number: 7418730
    Abstract: A system in which a networked device automatically evaluates hacker attack notification information and, based thereon, selects and executes responses to the attack. The notification may include information such as the address of the infected system, identification of the specific worm, and a list of vulnerable applications and operating systems. The evaluation is based on factors including criticality and vulnerability of applications running on the system and connectivity of the device. A variety of automatic responses can be selected, including notification of network administration, shutdown of the device or services running on the device, updating and activation of anti-virus software, and selective handling of data sent from the address of the suspect network device. The selection of responses can occur automatically based on rules input during setup or by intervention of network administration.
    Type: Grant
    Filed: December 17, 2002
    Date of Patent: August 26, 2008
    Assignee: International Business Machines Corporation
    Inventors: Simon C. Chu, Steven W. Hunter, William Joseph Piazza, Gregory Brian Pruett
  • Patent number: 7418727
    Abstract: A security authentication for PC client is provided according to the present invention, wherein said method includes: PC client sends a registry request to a server with a user ID and a password; The server makes first authentication based on the user ID and password, if the authentication succeeds, a field used for re-authentication will be created and returned to the PC client through an authentication successful message; When initiating a call, the PC client transmits the user ID and the field used for re-authentication acquired when registered to media gateway controller; The media gateway controller transfers the user ID and field used for re-authentication to the server, which makes second authentication according to the user ID and the field used for the second authentication, if the authentication fails, the call will be rejected, otherwise the call will be accepted and returns information of the called subscriber.
    Type: Grant
    Filed: June 7, 2002
    Date of Patent: August 26, 2008
    Assignee: Huawei Technologies Co., Ltd
    Inventors: Haitao Lin, Quan Gan, Shuiyang Chen, Xiaolan Wang
  • Patent number: 7415619
    Abstract: A recording disc has a lead-in area and a data area. A scrambled version of a SID code word is read out from the lead-in area of the disc. The SID code word represents a producer of the disc. The readout scrambled version is de-scrambled to recover the SID code word. The recovered SID code word is collated with reference SID code words to decide whether or not the disc is legitimate. Main information is read out from the data area of the disc when it is decided that the disc is legitimate. Readout of the main information from the data area of the disc is inhibited when it is decided that the disc is not legitimate.
    Type: Grant
    Filed: August 11, 2003
    Date of Patent: August 19, 2008
    Assignees: Victor Company of Japan, Ltd., Victor Entertainment, Inc.
    Inventors: Yoshiaki Tanaka, Isao Oowaki
  • Patent number: 7409714
    Abstract: A method of forming a virtual intrusion detection system includes the step of positioning a set of sensors in a network environment, each sensor supporting multiple logical traffic paths. The method also includes the step of providing a set of sensor management systems corresponding to the set of sensors. This set of sensor management systems enforces a set of virtual intrusion detection systems, wherein each virtual intrusion detection system corresponds to a predetermined logical traffic path through the set of sensors, each virtual detection system providing sensor traffic information solely to authorized parties.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: August 5, 2008
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman