Patents Examined by Viral Lakhia
  • Patent number: 8300958
    Abstract: Various embodiments of a system are provided for detecting scrolling text in a mixed-mode video sequence. The system of certain embodiments includes a motion estimator that generates a plurality of motion vectors between blocks of two or more extracted frames of a mixed-mode video sequence. An extracted frame motion analyzer analyzes the motion vectors to detect substantially constant motion of at least some of the blocks between the two or more extracted frames, wherein the presence of substantially constant motion is indicative of the presence of scrolling text in the mixed-mode video sequence. A consecutive frame motion analyzer calculates differences in pixel values between blocks of two or more consecutive frames in the mixed-mode video sequence, wherein the differences in pixel values are further indicative of the presence of scrolling text in the mixed-mode video sequence.
    Type: Grant
    Filed: July 11, 2007
    Date of Patent: October 30, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Zhi Zhou
  • Patent number: 8296848
    Abstract: A security module detects attempted exploitations of vulnerabilities of applications executing on a computer. The security module hooks an application on the computer. The hook transfers control flow to the security module if execution reaches a hooked location. When a hook is followed, the security module saves the state of the computer and activates an analysis environment. A virtual machine within the analysis environment executes signatures that programmatically analyze the state of the computer to determine whether a vulnerability in the application is being exploited. If a signature detects an exploit, the security module blocks the exploit by skipping over the one or more instructions that constitute the exploit, terminating the application, or performing a different action. The security module reports the detected exploit attempt to the user of the client. The security module returns control flow back to the application if it does not detect an exploit.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: October 23, 2012
    Assignee: Symantec Corporation
    Inventors: Kent E. Griffin, Carey S. Nachenberg, Shane A. Pereira
  • Patent number: 8296825
    Abstract: A system for enabling a user to communicate on a virtual private network through a public communication network, the possibility of communicating on the private network depending on the availability to the user of at least one enabling credential sent to the user in encrypted form. The system includes at least one SIM type module available to the user and bearing an encryption mechanism and it is configured to decrypt the enabling credential at the user exploiting the encryption mechanism home by the SIM type module, the SIM type module being able to interact with at least one additional communication network to activate the encryption mechanism.
    Type: Grant
    Filed: May 31, 2004
    Date of Patent: October 23, 2012
    Assignee: Telecom Italia S.p.A.
    Inventors: Manuel Leone, Ettore Elio Caprella
  • Patent number: 8290164
    Abstract: A trusted platform module (TPM) is a silicon chip that constitutes a secure encryption key-pair generator and key management device. A TPM provides a hardware-based root-of-trust contingent on the generation of the first key-pair that the device creates: the SRK (storage root key). Each SRK is unique, making each TPM unique, and an SRK is never exported from a TPM. Broadly contemplated herein is an arrangement for determining automatically whether a TPM has been replaced or cleared via loading a TPM blob into the TPM prior to the first time it is to be used (e.g. when a security-related software application runs). If the TPM blob loads successfully, then it can be concluded that the TPM is the same TPM that was used previously. If the TPM blob cannot be loaded, then corrective action will preferably take place automatically to configure the new TPM.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: October 16, 2012
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Matthew P. Lietzke, James P. Hoff, David Rivera
  • Patent number: 8291495
    Abstract: An intrusion detection system (“IDS”) device is described that includes a flow analysis module to receive a first packet flow from a client and to receive a second packet flow from a server. The IDS includes a forwarding component to send the first packet flow to the server and the second packet flow to the client and a stateful inspection engine to apply one or more sets of patterns to the first packet flow to determine whether the first packet flow represents a network attack. The IDS also includes an application identification module to perform an initial identification of a type of software application and communication protocol associated with the first packet flow and to reevaluate the identification of the type of software application and protocol according to the second packet flow. The IDS may help eliminate false positive and false negative attack identifications.
    Type: Grant
    Filed: August 8, 2007
    Date of Patent: October 16, 2012
    Assignee: Juniper Networks, Inc.
    Inventors: Bryan Burns, Siying Yang, Julien Sobrier
  • Patent number: 8280057
    Abstract: A method includes receiving data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system. The method also includes decrypting the received data using a first encryption key to produce decrypted data and encrypting the decrypted data using a second encryption key to produce encrypted data. The method further includes communicating the encrypted data to at least a second wireless node in the wireless network. Another method includes generating first data at a first wireless node in a wireless network, where the data is associated with an industrial control and automation system. The other method also includes encrypting the first data using an encryption key and transmitting the first data to multiple second wireless nodes in the wireless network, where the second wireless nodes are capable of using the same encryption key to decrypt the first data.
    Type: Grant
    Filed: January 25, 2008
    Date of Patent: October 2, 2012
    Assignee: Honeywell International Inc.
    Inventors: Ramakrishna S. Budampati, Soumitri N. Kolavennu, Denis Foo Kune
  • Patent number: 8281147
    Abstract: The claimed subject matter provides systems and/or methods that facilitate utilizing a shared secret to obscure a password within a sequence of characters. The sequence of characters can include the password as well as noise. The shared secret can leverage utilizing a set of known images that a user can uniquely distinguish from random images. By employing the imaged based shared secret, the user can login to a server from an untrusted machine suspected to be infected with spyware such as a keylogger that tracks user input.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: October 2, 2012
    Assignee: Microsoft Corporation
    Inventors: Dinei A. Florencio, Cormac E. Herley
  • Patent number: 8271424
    Abstract: A method of preserving privacy and confidentiality in a system where information is associated with an existing web page having an address. The method includes receiving a store command from a first user system, the store command including at least a database key and information to be associated with the web page, wherein the database key was created by performing a cryptographic hash function on the address of the web page; storing the information at a location in a storage database; associating the location with the database key; receiving a retrieve command from a second user system, the retrieve command including the database key calculated by the second user system; retrieving stored information from one or more locations in the database associated with the database key; and transmitting the stored information to the second user system.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: September 18, 2012
    Assignee: International Business Machines Corporation
    Inventors: Daniela Bourges-Waldegg, Christian Hoertnagl, James F. Riordan
  • Patent number: 8259940
    Abstract: This invention relates to a method for broadcasting digital data to a targeted set of reception terminals in which said data are previously scrambled by a series of control words transmitted in a conditional access control message. This method comprises the following steps: on transmission, particularise said access control message using a reversible function F for which the inverse function F?1 is executable only in terminals in the targeted set, and on reception, redetermine the original access control message in each terminal in the targeted set using said inverse function.
    Type: Grant
    Filed: May 24, 2005
    Date of Patent: September 4, 2012
    Assignee: Viaccess
    Inventors: Frédéric Beun, Laurence Boudier, Pierre Roque, Bruno Tronel
  • Patent number: 8255999
    Abstract: A client device transmits requests via a gateway to a server in a network environment. The requests indicate specific portions of a file on a server to be transmitted as part of the download process. The gateway receives into its memory the requested portions of the file and assembles the received portions into an assembly file. The gateway continuously scans the largest contiguous sequence of the portions in the assembly file for viruses while the requested portions of the file are being received and become available before feeding the received portions to the client computer. By scanning the largest consecutive sequence while new portions become available, the time to complete the scan is reduced thereby increasing the throughput of the gateway.
    Type: Grant
    Filed: May 24, 2007
    Date of Patent: August 28, 2012
    Assignee: Microsoft Corporation
    Inventors: Vladimir Holostov, Yigal Edery
  • Patent number: 8256009
    Abstract: Disclosed is a method and apparatus for managing rights object of SRM in a digital rights management system. The method for managing rights object bound to the SRM, comprises: transmitting ROAP trigger from a rights issuer to a terminal; transmitting an RO request message from the terminal to the rights issuer and transmitting a response message to the RO request message from the rights issuer to the terminal; and transmitting the rights object included in the response message from a DRM agent of the terminal to a DRM agent of the SRM and installing the rights object in the SRM. Accordingly, the SRM can receive its own rights object from the rights issuer through the terminal.
    Type: Grant
    Filed: November 13, 2006
    Date of Patent: August 28, 2012
    Assignee: LG Electronics Inc.
    Inventors: Te-Hyun Kim, Seung-Jae Lee, Youn-Sung Chu
  • Patent number: 8239939
    Abstract: An exemplary computer-implementable method (300) transforms information to reduce or eliminate risk of exploitation of a software service and includes receiving information (304) in response to a request, transforming the information (308) to produce transformed information and sending the transformed information (312). An exemplary firewall server (112) includes server software (144, 148) that allows the firewall server (112) to receive information from a resource (104, 108) via a network and to send information to a client computer (114) and a browser protection component (264, 268) for transforming the information to prevent exploitation of a vulnerability of browser software (154) on the client computer (114). Various other exemplary methods, devices, systems, etc., are also disclosed.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: August 7, 2012
    Assignee: Microsoft Corporation
    Inventors: John Dunagan, Opher Dubrovsky, Saher Esmeir, Charles S Reis, Jiahe Helen Wang
  • Patent number: 8225087
    Abstract: Systems and methods are disclosed for using cryptographic techniques to configure data processing systems. A configuration manager cryptographically controls the configuration of a system by ensuring that only authorized users or applications can change the configuration. For example, requests to change configuration information may include authenticated and/or encrypted data. These cryptographic techniques are employed to enable and/or disable functions, features and capabilities of a system. For example, a system may be reconfigured to provide strong or weak encryption based on parameters in the configuration information.
    Type: Grant
    Filed: November 21, 2008
    Date of Patent: July 17, 2012
    Assignee: Broadcom Corporation
    Inventor: Mark L. Buer
  • Patent number: 8223831
    Abstract: A method for detecting a pattern in an image includes defining a set of pixel values in an image using a window and calculating a Fourier transform of the pixel values. In one embodiment, the Fourier transform of the pixel values forms a spectrum. The method further comprises analyzing the spectrum of the Fourier transform to find a peak and analyzing the peak to determine whether the peak is indicative of the presence of a pattern in the image.
    Type: Grant
    Filed: June 22, 2007
    Date of Patent: July 17, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Surapong Lertrattanapanich, Yeong Taeg Kim
  • Patent number: 8218769
    Abstract: An encrypted communication system is provided, in which an encryption key for use in encrypted communication and settings information for the encrypted communication are distributed to each of a plurality of communication devices performing encrypted communication within a group, and in which traffic generated by distributing the encryption key and the like can be reduced. In the encrypted communication system according to the present invention, information including a key for use in the intra-group encrypted communication or a seed which generates the key is distributed to the communication devices belonging to the group that are participating (e.g., logged in) in the intra-group encrypted communication.
    Type: Grant
    Filed: February 28, 2007
    Date of Patent: July 10, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Osamu Takata, Tadashi Kaji, Takahiro Fujishiro, Kazuyoshi Hoshino, Keisuke Takeuchi
  • Patent number: 8204105
    Abstract: A quantization step determination part inputs an evaluation value (ACT_MB) indicating the dispersion in a macroblock and its average value (ACT_PIC). A subtracter obtains the difference between these values, and a multiplier multiplies the difference by raq (<1) to obtain a weighting value. Next, an adder adds the weighting value to an average quantization step value of source data, and finally a multiplier multiplies the sum by a step value adjustment factor ? (>1) to obtain a converted quantization step value (Qstep_AVC). This optimizes a bit allocation in accordance with an Activity value of the macroblock, to thereby improve the quality of image.
    Type: Grant
    Filed: July 6, 2007
    Date of Patent: June 19, 2012
    Assignees: MegaChips Corporation, NTT Electronics Corporation
    Inventors: Hiromu Hasegawa, Nobuyuki Takasu, Mayumi Okumura, Akira Okamoto, Takashi Matsumoto, Norihiko Nagai
  • Patent number: 8191131
    Abstract: A system and method in which authentication data, such as a password, which is sent to a server/firewall as part of an authentication request, for example a logon request, is received at the server/firewall in a plurality of messages at a plurality of logical ports from the user, thus improving protection against replay attacks. In one embodiment, a plurality of user authentication data parts is obtained from a remote user device as part of an authentication request, the plurality of user authentication data parts is assembled into user authentication data; the authenticity of the authentication request is checked using the user authentication data; and communication with the remote user device is enabled if the authentication request data is determined to be authentic.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: May 29, 2012
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Bart Jennings, Kofi Kekessie
  • Patent number: 8184810
    Abstract: An IC card includes a tamper resistant module which has one or more applications and a card control unit for controlling an operation of the IC card, a secure memory area which is accessible from only the tamper resistant module, and a contactless interface which serves to communicate with a service terminal. The card control unit generates storage instruction information, and the contactless interface transmits the storage instruction information to the service terminal. The storage instruction information contains an address of the secure memory area as a write area of data, an address of a normal memory area that indicates a save area for temporarily saving the data, an identifier of the application which executes a data movement from the normal memory area to the secure memory area, and an address of a relay terminal which relays the data.
    Type: Grant
    Filed: November 2, 2005
    Date of Patent: May 22, 2012
    Assignee: Panasonic Corporation
    Inventor: Junko Furuyama
  • Patent number: 8185751
    Abstract: A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical volumes, and an encryption device in communication with both the file server and the physical storage. The encryption device is operable in response to signaling from the file server, including an indication of a range of blocks of data, to cause encryption of the range of blocks with an encryption key that is unique within the physical storage. The encryption device includes nested tables mapping block ranges to encryption keys. Consequently, undesirable key sharing across files, file systems, and other units can be avoided down to the block level.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: May 22, 2012
    Assignee: EMC Corporation
    Inventors: Roger F. Osmond, Gil Goren
  • Patent number: 8181020
    Abstract: A mechanism for creating and accessing a secure storage area for firmware that stores a “Virtual ROM” module reference or pointer in the actual ROM that includes a unique identifier for the virtual ROM module to be retrieved is discussed. The actual ROM image also contains a generated unique identifier for the whole machine. In retrieving a Virtual ROM module, both the module identifier and the machine identifier are used. Once retrieved, the module is validated using a message digest stored in the Virtual ROM module reference. If required, the Virtual ROM module is then decrypted using a secret key that is stored elsewhere in the actual ROM. Updates to the Virtual ROM module are made in memory by pre-boot code. At a point in time when these updates are complete, the Virtual ROM module is written back out to the location from which it was retrieved.
    Type: Grant
    Filed: February 1, 2006
    Date of Patent: May 15, 2012
    Assignee: Insyde Software Corp.
    Inventor: Rex A. Flynn