Patents Examined by Trong Nguyen
  • Patent number: 8646027
    Abstract: The present invention extends to methods, systems, and computer program products for workflow based authorization for content access. A workflow can be triggered when a protection policy does not fully express an intended recipient's rights in protected content. A workflow processes relevant inputs to more fully express the intended recipient's rights in protected content. Workflows can provide policy item updates and authorizations decisions with respect to protected content. Through the use of workflows to make an authorization decision, access to information can become more flexible, allowing it to follow the desired flow of information throughout its lifecycle. This flexibility allows organizations to protect their information without worrying about the protection stopping the natural flow of business.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: February 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Rushmi U. Malaviarachchi, Kenneth D. Ray, Scott C. Cottrille, Frederic Delombaerde, Conrad G. Bayer
  • Patent number: 8635460
    Abstract: A method and a circuit for masking a digital word by application of a random bijection, including applying at least one first operation including selecting a non-disjoint subset of the word having its position and size depending on a first random quantity, and assigning to each bit of the subset, the state of the bit having a symmetrical position with respect to the middle of the subset, to obtain a masked digital quantity.
    Type: Grant
    Filed: December 14, 2005
    Date of Patent: January 21, 2014
    Assignee: STMicroelectronics S.A.
    Inventors: Pierre-Yvan Liardet, Yannick Teglia
  • Patent number: 8634560
    Abstract: A server device initiates a traffic encapsulation key (TEK) re-key sequence for a group virtual private network (VPN), based on an upcoming expiration time for an existing TEK. The server device sends, via a push message during a first time period immediately after the initiating, a new TEK to members of the group VPN. The server device receives, during a second time period that immediately follows the first time period, a pull request, for the new TEK, from one of the members of the group VPN, and sends, to the one of the members, the new TEK, where the re-key sequence transitions all the members of the group VPN from the existing TEK key to the new TEK key before the expiration time for the existing TEK.
    Type: Grant
    Filed: September 10, 2010
    Date of Patent: January 21, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Anthony Ng, Chih-Wei Chao, Suresh Melam, I-Wen Michelle Hsiung
  • Patent number: 8627454
    Abstract: A system biometrically authenticates a user that intends to use an entertainment device. The system obtains, based on the biometric authentication, one or more quotas associated with an amount of time that the user may use the entertainment device, and controls the user's use of the entertainment device based on the one or more quotas.
    Type: Grant
    Filed: April 1, 2009
    Date of Patent: January 7, 2014
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Yuriy Bolyukh, Aamer Charania, Syed Zafar Beyabani, Olena Bolyukh
  • Patent number: 8601587
    Abstract: According to certain embodiments, a cyber threat analysis system generates a network model of a network infrastructure that is used by an organization, assigns a weighting value to each of a plurality of network elements of the network infrastructure according to a relative importance of the each network element to the organization, and generates an attack vector according to a determined vulnerability of the network infrastructure. The attack vector represents one or more illicit actions that may be performed to compromise the network infrastructure. The system may simulate, using a network modeling tool, the attack vector on the network model to determine one or more resulting ramifications of one or more of the plurality of network elements due to the attack vector, and determine a criticality level of the attack vector according to the weighting value of the one or more network elements.
    Type: Grant
    Filed: September 3, 2010
    Date of Patent: December 3, 2013
    Assignee: Raytheon Company
    Inventors: William S. Powell, Thomas L. Chen
  • Patent number: 8583944
    Abstract: In one embodiment, a circuit arrangement for performing cryptographic operations is provided. The circuit includes a substitution block, a cryptographic circuit coupled to the substitution block, and a balancing circuit coupled to the substitution block. The substitution block includes a memory unit storing substitution values and ones-complement values that are corresponding ones-complements of the substitution values. The substitution block, responsive to a request to read a specified one of the substitution values, concurrently reads and outputs the specified substitution value and the corresponding ones-complement value. A power consumed in reading the specified substitution value is uniform with a power consumed in reading another one of the substitution values. The cryptographic circuit and the balancing circuit are configured to concurrently operate on each substitution value and the corresponding ones-complement value read from the memory, respectively.
    Type: Grant
    Filed: August 4, 2010
    Date of Patent: November 12, 2013
    Assignee: Xilinx, Inc.
    Inventor: Stephen M. Trimberger
  • Patent number: 8582762
    Abstract: This invention relates to security procedures in a communication system, specifically to production of key material. The invention provides a method for producing key material in a highly secure way for use in communication with a local network of a company. The method uses authentication information obtained from the communication system and information exchanged locally between a mobile station and the authentication systems of the company to produce a communication key for use in authentication procedures or e.g. for signing and/or encrypting data.
    Type: Grant
    Filed: September 16, 2005
    Date of Patent: November 12, 2013
    Assignee: Nokia Corporation
    Inventors: Silke Holtmanns, Pekka Laitinen, Philip Ginzboorg, Kari Miettinen, Jaakko Rajaniemi
  • Patent number: 8572703
    Abstract: A system and method for authenticating a user of an image processing system. User credentials are received at an authentication device corresponding to an image processing device, and transmitted to a first server remote from the authentication device. The validity of the user credentials are judged by comparing the received user credentials to authentication information stored at the first server, and a result of the judging is transmitted to the image processing device. The image processing device then requests access to a second server remote from the image processing device, and the second server transmits a request for the user credentials to the first server. After receiving the user credentials from the first server, the second server performs user authentication.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: October 29, 2013
    Assignee: Ricoh Americas Corporation
    Inventors: Hiroshi Kitada, Lana Wong, Helen Wang, Weiyun Tang, Andrew Jennings, Revathi Vellanki
  • Patent number: 8566598
    Abstract: Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a replacement authentication code is generated based on the original authentication code and party-specific code. Documents and currencies can be authenticated independently of any party-specific code by an addition to or alteration of their authentication code with each authentication event.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: October 22, 2013
    Assignee: Goodman Consulting Group
    Inventor: Thomas C. Goodman
  • Patent number: 8544100
    Abstract: Aspects of the present disclosure relate to a computer assisted method for detecting encrypted tunneling or proxy avoidance which may include electronically receiving information from a proxy server, extracting information regarding a CONNECT function of Hyper Text Transport Protocol (HTTP) from the electronically received information, determining at least one destination to which the extracted information regarding the CONNECT function of HTTP corresponds and attempting to negotiate a standard HTTPS session with each of the at least one destination. Further, the computer assisted method may further include, for each of the at least one destination, determining whether the destination is hosting an encrypted tunneling or proxy avoidance application, wherein such a determining may be based on characteristics of an Secure Socket Layer (SSL) certificate associated with the destination or a response received from the destination over a TCP/IP connection.
    Type: Grant
    Filed: July 2, 2010
    Date of Patent: September 24, 2013
    Assignee: Bank of America Corporation
    Inventor: Ronald Ramcharran
  • Patent number: 8538245
    Abstract: A recording control apparatus includes the following elements. A receiving unit is configured to receive, from each of a plurality of recording apparatuses, recording schedule information set on a recording apparatus and available-recording-capacity information of the recording apparatus. A determination unit is configured to determine a program to be recorded. A control unit is configured to perform control to select one of the recording apparatuses on the basis of the recording schedule information and the available-recording-capacity information received from the plurality of recording apparatuses and to transmit, to the selected recording apparatus, information for scheduling the recording of the determined program.
    Type: Grant
    Filed: June 19, 2008
    Date of Patent: September 17, 2013
    Assignee: Sony Corporation
    Inventor: Mikio Yamamoto
  • Patent number: 8533809
    Abstract: Methods for evaluating data packets addressed to a wireless communication device are disclosed herein. When in a dormant state, a wireless communication device receives page messages indicating a source of data packets addressed to the wireless communication device and determines whether the data packets represent unwanted traffic. When in an active state, the wireless communication device examines data packets to determine if the received packets represent unwanted traffic, and in response to determining that the traffic is unwanted, the wireless communication device transitions into a dormant state or enters an idle state from which the wireless communication can transition into the dormant state.
    Type: Grant
    Filed: May 29, 2009
    Date of Patent: September 10, 2013
    Assignee: Sprint Spectrum L.P.
    Inventors: Hui Zang, Tao Ye
  • Patent number: 8526794
    Abstract: Playability of a copy protected video signal is improved by reducing the darkening and or venetian blind effects which tend to cause artifacts in a video signal display. To this end, the copy protection signal includes automatic gain control (AGC) signals or pulses in video lines in a portion of the active or viewable video field or frame, wherein the AGC pulses comprise non similar AGC signals from one video line to another video line. The dis-similar AGC pulses may include pulses which are deleted, blanked, attenuated, pulse width modified, modulated, etc. In addition, selected sync pulses may be pulse width, amplitude and or position modified.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: September 3, 2013
    Assignee: Rovi Solutions Corporation
    Inventor: Ronald Quan
  • Patent number: 8495750
    Abstract: A system to implement user-level filesystem related calls instead of an operating system kernel may include data processing applications executing via a computer processor. The system may also include a plurality of user-level filesystems, each one of which is associated with at least one of the data processing applications. The system may further include a user-level library in communication with the data processing applications, the user-level library configured to implement user-level filesystem related calls instead of an operating system kernel executing via the computer processor.
    Type: Grant
    Filed: August 31, 2010
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventor: Marcel C. Rosu
  • Patent number: 8495390
    Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for obfuscating data based on a discrete logarithm. A system practicing the method identifies a clear value in source code, replaces the clear value in the source code with a transformed value based on the clear value and a discrete logarithm, and updates portions of the source code that refer to the clear value such that interactions with the transformed value provide a same result as interactions with the clear value. This discrete logarithm approach can be implemented in three variations. The first variation obfuscates some or all of the clear values in loops. The second variation obfuscates data in a process. The third variation obfuscates data pointers, including tables and arrays. The third variation also preserves the ability to use pointer arithmetic.
    Type: Grant
    Filed: January 23, 2013
    Date of Patent: July 23, 2013
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Benoit Chevallier-Mames, Mathiew Ciet, Jon McLachlan
  • Patent number: 8473750
    Abstract: A bridge is disclosed having a security engine to protect digital content at insecure interfaces of the bridge. The bridge permits cryptographic services to he offloaded from a central processing unit to the bridge. The bridge receives a clear text input from a central processing unit. The bridge encrypts the clear text input as cipher text for storage in a memory. The bridge provided the cipher text to a graphics processing unit.
    Type: Grant
    Filed: December 14, 2005
    Date of Patent: June 25, 2013
    Assignee: Nvidia Corporation
    Inventors: Michael Brian Cox, Henry Packard Moreton, Brian Keith Langendorf, David G. Reed
  • Patent number: 8464361
    Abstract: An apparatus for right management of digital contents that includes a digital right manager that creates a usage right of digital contents on the basis of received right information; and a contents manager that provides the digital contents in accordance with the created usage right. The contents manager includes a contents packing unit that receives the usage right created from the digital right manager, and extracts and packages components of the digital contents in accordance with the usage right, and a contents providing unit that receives packaged digital contents created from the contents packaging unit and provides the digital contents to a contents using device.
    Type: Grant
    Filed: November 23, 2009
    Date of Patent: June 11, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jaechul Kim, Seongho Lee, Yoonseop Chang, Kyungok Kim, Jonghyun Park
  • Patent number: 8453246
    Abstract: Apparatus and method for managing risk in an environment where information is received regarding a problem in an environment. A security risk is analyzed associated with the problem. Controls associated with the environment containing the problem are analyzed. A framework is generated defining one or more controls for mitigating the security risk responsive to the analyzed security risk and controls.
    Type: Grant
    Filed: December 20, 2007
    Date of Patent: May 28, 2013
    Assignee: Bank of America Corporation
    Inventors: Robert A. Lang, Chad Renfro, Sean Catlett, Matt Hinman, Chris Higgins
  • Patent number: 8443451
    Abstract: Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by adding a device that will enable or disable protection for applications as required. The device supports one or more users, one or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges for processes running in that Application Security Environment while that Application Security Environment is in that state.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: May 14, 2013
    Inventors: George Madathilparambil George, Nikhil George
  • Patent number: 8386803
    Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for obfuscating data based on a discrete logarithm. A system practicing the method identifies a clear value in source code, replaces the clear value in the source code with a transformed value based on the clear value and a discrete logarithm, and updates portions of the source code that refer to the clear value such that interactions with the transformed value provide a same result as interactions with the clear value. This discrete logarithm approach can be implemented in three variations. The first variation obfuscates some or all of the clear values in loops. The second variation obfuscates data in a process. The third variation obfuscates data pointers, including tables and arrays. The third variation also preserves the ability to use pointer arithmetic.
    Type: Grant
    Filed: November 18, 2009
    Date of Patent: February 26, 2013
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Jon McLachlan