Patents Examined by Thomas R. Peeso
-
Patent number: 7565531Abstract: A locking programming interface (LPI) which prevents piracy of device-related user software. An LPI Code is generated from a variety of different parameters, including a software product ID, a Production Key, and a number of device-specific parameters for the device that the user software supports. The LPI Code is burned into a memory of the device using a Production Utility process which utilizes the Production Key supplied by the software manufacturer. When the user software is installed in a host machine such as a user's computer system, the software performs basic device validation and then validates the LPI Code burned into the device against codes embedded into the user software.Type: GrantFiled: May 13, 2004Date of Patent: July 21, 2009Inventors: Chi-Chian Yu, Tseng Jan Hsu
-
Patent number: 7549054Abstract: A system, method, service method, and program product for defining and/or managing entitlements and/or authentication entitlements to resources in a computer networking environment is disclosed. Upon receiving one or more dynamic events, the invention verifies one or more users (a selected user) has (entitlement) attributes that satisfy one or more access criteria to access one or more resources. The invention then permits and/or provides access to one or more resources for the selected user over one or more networks without revealing the identity of the selected user to the resource provider.Type: GrantFiled: August 17, 2004Date of Patent: June 16, 2009Assignee: International Business Machines CorporationInventors: Carolyn Ann Brodie, Maroun Touma, Charles Philippe Tresser, Joel Wolf, legal representative, Catherine Gody Wolf
-
Patent number: 7529930Abstract: A method and system for tracking electronic information includes the steps of: encrypting an electronic file stored on a hardware storage device; attaching or incorporating with the file a standalone executable program that implements a request for a decryption key accompanied by tracking information when an attempt is made to access the file; verifying the tracking information by a central processing unit; if the tracking information is verified as acceptable, providing the decryption key; and if the tracking information is not verified as acceptable, modifying the file to include a record of the failed attempt to access the file and the tracking information, and storing said modified file on the hardware storage device.Type: GrantFiled: July 14, 2006Date of Patent: May 5, 2009Assignee: Resource Consortium LimitedInventor: George J. Morgan, III
-
Patent number: 7526643Abstract: A system for transmitting encrypted data. A plurality of nested communication links are communicably connected to a network. Each communication link includes an originating node and a terminating node which are adapted to route a transmission therebetween. Transmissions between the originating node and the corresponding terminating node of the outermost communication link is routed through at least one inner communication link. The originating node of the outermost communication link generates a transmission having a data part and a first header part, both in an encrypted format, and routes the transmission to the corresponding terminating node. The originating node of an inner communication link modifies the transmission by removing unencrypted references to other communication links; adding a second header part in an encrypted format, and routing the transmission to the corresponding terminating node, where the second header part is decrypted and the transmission is rerouted to an outer communication link.Type: GrantFiled: January 8, 2004Date of Patent: April 28, 2009Assignee: Encryption Solutions, Inc.Inventors: Robert Allen Stedron, John L. Chmielewski
-
Patent number: 7523308Abstract: A method and system for dynamically protecting against exploitation of a vulnerability is provided. The dynamic protection system identifies the security level of an instance of an application that is to execute on a computer system. If the security level of the instance of the application is not appropriate, the dynamic protection system places a limitation on the execution of the instance of that application.Type: GrantFiled: August 13, 2004Date of Patent: April 21, 2009Assignee: Microsoft CorporationInventors: Rajesh Dadhia, Sukvinder S. Gill, Anders Samuelsson
-
Patent number: 7512797Abstract: An interface for facilitating facsimile transmission via a wireless communications device operatively connected to a wireless communications network, including: a modem suitable for being communicatively coupled to a facsimile machine; a controller coupled to the modem; and, a memory operatively coupled to the controller. The interface includes code to cause the modem to transmit a retrain request to the facsimile machine upon expiration of a given temporal period. The interface includes a circuit for selectively generating a ring signal corresponding to a plain old telephone service ring signal. The interface includes a circuit for selectively generating a hold signal corresponding to a plain old telephone service hold signal. And, the circuit includes code to cause the modem to transmit data indicative of white lines to the facsimile machine upon expiration of a given temporal period.Type: GrantFiled: May 22, 2007Date of Patent: March 31, 2009Assignee: CopyTele, Inc.Inventors: Frank J. DiSanto, Denis A. Krusos, Kao-Yih Lee, Roland H. Feibert
-
Patent number: 7512809Abstract: A method and apparatus optimizes the protection of computing networks. This protection utilizes attenuated (weakened) strains of live, replicating, malicious code such as viruses and worms, analogous to the development of live, attenuated, human vaccines in the medical field. In a preferred embodiment, this is achieved by (1) attenuating a malicious program, e.g. a virus or worm, or software vulnerability by limiting its virulence, i.e., limiting its damage and resource usage, (2) modifying the virus to confer immunity on the network that it infects, e.g., automatically patching a vulnerability, or marking the infected host as immune to further infection, (3) releasing the newly attenuated virus into the network, (4) tracking the attenuated virus and its success rate (e.g., rate and ratio of successfully patched to un-patched vulnerable hosts), and (5) limiting the spread of the virus vaccine, e.g.Type: GrantFiled: August 21, 2004Date of Patent: March 31, 2009Inventor: Cyrus Peikari
-
Patent number: 7506163Abstract: Methods and apparatuses for preconscious security feedback. In one aspect, a method for secure communication includes: displaying a first visual cue to indicate presence of security measure for communication while an operation for a secure communication transaction is in progress; and playing a first audio cue to indicate the presence of security measure for communication while the operation for the secure communication transaction is in progress. In one embodiment, the visual and/or audio cues used provide preconscious feeling of security based on familiarity and/or historical associations to security in particular cultures.Type: GrantFiled: April 1, 2005Date of Patent: March 17, 2009Assignee: VE NetworksInventors: Robert Paul Mansz, Ryan Groom
-
Patent number: 7496754Abstract: An improved system, apparatus, and method for securing a network using MAC address filtering is provided. Advantageously, the present invention does not require that a client computer be powered on, and instead provides an efficient user interface for displaying a requestor's MAC address and for allowing or denying the device with an associated MAC address access to the network. Parameters per allowed MAC address may also be provided.Type: GrantFiled: April 1, 2005Date of Patent: February 24, 2009Assignee: Cisco Technology, Inc.Inventors: Calvin Y. Liu, Sheng-Chiao Chang
-
Patent number: 7496753Abstract: Methods and apparatus that may be utilized in systems to reduce the impact of latency associated with encrypting data on non-encrypted data are provided. Secure and non-secure data may be routed independently. Thus, non-secure data may be forwarded on (e.g., to targeted write buffers), without waiting for previously sent secure data to be encrypted. As a result, non-secure data may be made available for subsequent processing much earlier than in conventional systems utilizing a common data path for both secure and non-secure data.Type: GrantFiled: September 2, 2004Date of Patent: February 24, 2009Assignee: International Business Machines CorporationInventors: Bruce L. Beukema, Jamie R. Kuesel, Robert A. Shearer
-
Patent number: 7493496Abstract: A biometric system (10) for assisting a user in providing a biometric reading is described. The system (10) comprises: a biometric capture unit (12) for capturing biometric data from a user; and feedback means (30) for providing the user with an indication of the extent to which a measurement has been captured. The feedback means (30) may be implemented by a display, a loudspeaker (508), or both. The system may also include anonymizing means (66) for providing the feedback means (30) with an anonymized version of the data measured from the biometric capture unit (12).Type: GrantFiled: August 30, 2004Date of Patent: February 17, 2009Assignee: NCR CorporationInventors: Martin R. Smith, Michael Coutts, Gary A. Ross
-
Patent number: 7490236Abstract: A conditional access overlay system utilizing partial encryption without requiring additional program identifiers. The conditional access overlay system generates duplicate critical packets for separate encryption that are sent using the same packet identifier. The rest of the content stream is sent in the clear. However, these duplicated packets are sent without incrementing a continuity counter relative to one another. The overlay packets with non-incremented continuity counter are sent as the second packet immediately following the original critical packet. At the receivers, the incumbent set-top will use the first of the two encrypted packets while the overlay set-top is programmed to use the second of the two encrypted packets. Therefore, methods for verifying alignment of associated packets may be used to distinguish between multiple encryption methods in conditional access overlay systems.Type: GrantFiled: January 14, 2004Date of Patent: February 10, 2009Assignee: Cisco Technology, Inc.Inventor: Anthony J. Wasilewski
-
Patent number: 7490239Abstract: Facilitating communication using a digital signature includes: receiving user input data (UID); generating a first key as a deterministic function of the UID; clearing the UID; generating a second key as a deterministic function of the first key; clearing the first key following generation of the second key; and exporting the second key. Neither the UID nor the first key is exported. Thereafter, a digital signature is generated by again receiving the UID; regenerating the first key using the deterministic function and the UID; clearing the UID; generating a digital signature as a function of the regenerated first key; clearing the regenerated first key following generation of the digital signature; and exporting the generated digital signature.Type: GrantFiled: August 8, 2005Date of Patent: February 10, 2009Assignee: First Data CorporationInventor: Curtis Linn Beeson
-
Patent number: 7487368Abstract: An illegal communication detector that is mounted in a communication path between external devices and a protection-targeted device to monitor contents of communications delivered to the protection-targeted device, the illegal communication detector including: a recording unit that records at least part of information transmitted from the external devices to the protection-targeted device; a determination unit that regards one of the external devices as a device of interest; and a communication control unit that detects, if the determination means conclude that at least part of the recorded information complies with the predetermined illegal communication standard rule, that the contents of communication are derived from an illegal communication, and performing a predetermined process concerning the communication with the device of interest.Type: GrantFiled: April 7, 2004Date of Patent: February 3, 2009Assignee: Fuji Xerox Co., Ltd.Inventors: Kohshiro Inomata, Katsuya Mitsutake
-
Patent number: 7478238Abstract: A data encryption apparatus operable to apply encryption to input data having at least a format identifying portion and a payload portion comprises means for discriminating between the format identifying portion of the input data and the payload portion of the input data; and means for selectively applying encryption to the input data in dependence upon an output of the discriminating means so as to encrypt at least a part of the payload portion of the input data but not to encrypt the format identifying portion. A corresponding decryption apparatus is also provided.Type: GrantFiled: July 30, 2004Date of Patent: January 13, 2009Assignee: Sony United Kingdom LimitedInventors: Daniel Luke Hooper, Andrew Robert Taylor
-
Patent number: 7475253Abstract: A system to monitor, detect and analyze chemical, radiation and/or biological threats. The system includes a plurality of sensors, wherein each sensor gathers data on chemical, radiation or biological agents. A central processing unit is in communication with sensors analyzes sensor collected data. A transmission system transmits data in the form of alerts from each central processing unit by secure, encrypted packets over a network.Type: GrantFiled: June 23, 2006Date of Patent: January 6, 2009Inventor: R. Brent Johnson
-
Patent number: 7475251Abstract: A multimedia output device having embedded encryption functionality enables the outputting of content in an encrypted form. The multimedia output device receives the content to be encrypted, encrypts the content, and generates an electronic output of the encrypted content. The multimedia output device also generates an associated paper output that provides information about the decryption, such as a key, an identification of the electronic output of the encrypted content, and optionally a description of the contents of the content encrypted.Type: GrantFiled: September 4, 2007Date of Patent: January 6, 2009Assignee: Ricoh Co., Ltd.Inventors: Jonathan J. Hull, Michael J. Gormish, Kurt W. Piersol
-
Patent number: 7472288Abstract: In one embodiment, a protected process is monitored by one or more watchdog processes. Upon detection that the protected process has been abnormally terminated, the watchdog processes may initiate actions to identify and/or terminate one or more malicious processes terminating the protected process. For example, the watchdog processes may inject a detector in processes running in the computer. The detector may listen for an activity that would terminate the protected process, and report such activity to the watchdog processes. The watchdog processes may be configured to terminate malicious processes identified as abnormally terminating the protected process. Thereafter, the watchdog processes may restart the protected process.Type: GrantFiled: May 14, 2004Date of Patent: December 30, 2008Assignee: Trend Micro IncorporatedInventors: Tsun-Sheng Chou, Sung-Ching Lin, Chin-Ju Lin
-
Patent number: 7472271Abstract: The suitability of a service provider for performing a task having a sensitivity level is gauged by using a trust level associated with the provider, in conjunction with the sensitivity level, to gauge whether or not to allocate the task to the service provider.Type: GrantFiled: March 5, 2004Date of Patent: December 30, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Gavin Brebner, Mihaela Gittler, Dominique Vicard
-
Patent number: 7469344Abstract: A CPU is provided with an ability to modify its operation in accordance with an encryption key. When a program is compiled, the program is modified in order that execution may be performed with the CPU with its operation modified. In order to execute program instructions, the buffer interdependencies must match that expected by the compiler. This makes analysis of the program operation extremely difficult. The instruction buffer on a keyed microprocessor contains logic which is able to route a subset of the instruction bits on the microprocessor. This selects destination logic gates in the microprocessor which eventually reach a programmable instruction decoder and an instruction buffer interdependency checking logic block.Type: GrantFiled: May 21, 2004Date of Patent: December 23, 2008Assignee: Sun Microsystems, Inc.Inventor: Alan Folmsbee