Patents Examined by Viral Lakhia
  • Patent number: 8966599
    Abstract: Approaches are described for automatically generating new security credentials, such as security tokens, which can involve automatically re-authenticating a user (or client device) using a previous security token issued to that user (or device). The re-authentication can happen without any knowledge and/or action on the part of the user. The re-authentication mechanism can invalidate and/or keep track of the previous security token, such that when a subsequent request is received that includes the previous security token, the new security token can be invalidated, and the user caused to re-authenticate, as receiving more than one request with the previous security token can be indicative that the user's token might have been stolen.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: February 24, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Maximilian Francis Barrows, Paul Francis Dean Ferraro, Jason George Mchugh, Abraham Martin Passaglia, Andrew Jay Roths, Eric Allan Shell
  • Patent number: 8966625
    Abstract: In some embodiments, identification of malware sites using unknown URL sites and newly registered DNS addresses includes performing a heuristic analysis for information associated with a network site; and assigning a score based on the heuristic analysis, in which the score indicates whether the network site is potentially malicious. In some embodiments, the system includes a security appliance that is in communication with the Internet. In some embodiments, the network site is associated with a network domain and/or a network uniform resource locator (URL). In some embodiments, performing a heuristic analysis for information associated with a network site further includes determining if a network site has recently been registered. In some embodiments, performing a heuristic analysis for information associated with a network site further includes determining if a network site is associated with recently changed DNS information.
    Type: Grant
    Filed: May 24, 2011
    Date of Patent: February 24, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Nir Zuk, Renzo Lazzarato, Huagang Xie
  • Patent number: 8964829
    Abstract: Techniques to perform fast motion estimation are described. An apparatus may comprise a motion estimator operative to receive as input a current frame and a reference frame from a digital video sequence. The motion estimator may generate and output a motion vector. The motion vector may represent a change in position between a current block of the current frame and a matching reference block of the reference frame. The motion estimator may utilize an enhanced block matching technique to perform block matching based on stationary and spatially proximate blocks. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: February 24, 2015
    Assignee: Microsoft Corporation
    Inventors: Ce Wang, Walid Ali
  • Patent number: 8954747
    Abstract: Systems and methods of managing keystroke data in embedded keyboard environments may involve transferring a mode request from a management controller to an embedded controller of a keyboard via a dedicated communication channel. Keystroke activity can be detected at the keyboard, and keystroke data may be transferred from the embedded controller to the management controller via the dedicated communication channel in response to the keystroke activity and the mode request. In addition, the management controller may be used to encrypt the keystroke data, wherein the encrypted keystroke data can be transmitted from the management controller to an off-platform service via a network controller.
    Type: Grant
    Filed: July 1, 2011
    Date of Patent: February 10, 2015
    Assignee: Intel Corporation
    Inventors: Nitin V. Sarangdhar, Jasmeet Chhabra
  • Patent number: 8955086
    Abstract: A computer system determines whether the computer system is able to access an authentication server. If the computer system is able to access the authentication server, the computer system requesting a first set of credentials from a user. If the first set of credentials is valid, the computer system assigns the user a first role for performing operations on the computer system based on the first set of credentials. If the computer system is unable to access the authentication server, the computer system requests another set of credentials from the user. If the other set of credentials is valid, the computer system assigns the user another role for performing operations on the computer system based on the other set of credentials.
    Type: Grant
    Filed: March 16, 2012
    Date of Patent: February 10, 2015
    Assignee: Red Hat, Inc.
    Inventor: Dmitri V. Pal
  • Patent number: 8953801
    Abstract: A system and method is provided which allows multicast communications encrypted using IPSec protocol to be received by receivers in a network. In order to allow the receivers to receive the encrypted multicast communication, the address information of the received multicast communication is modified to appear as a unicast communication being transmitted directly to the address of the receiver, such that the receiver may then decrypt the received multicast communication using IPSec decryption capabilities or may, alternatively, forward the received multicast communication in its encrypted state to other devices. The system and method further provide IPSec encryption key delivery to the receiver using an encrypted markup language file. Multiple keys may also be generated for a given IP address of a receiver with each key being generated for a particular multicasting hierarchical classification.
    Type: Grant
    Filed: April 18, 2012
    Date of Patent: February 10, 2015
    Assignee: Hughes Networks Systems, LLC
    Inventors: John K. Thomasson, Neil R. Terry, Matthew M. Davis, Myron L. Mosbarger
  • Patent number: 8950000
    Abstract: A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a computer software on a mobile device with different computing devices. A mobile device is used to authenticate a user's access to computer software. The computer software may reside on the mobile device, the user's computing device, or another computing device. A unique identifier is stored in the mobile device associated with the computer software to enable the authentication.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: February 3, 2015
    Assignee: Sprint Communications Company L.P.
    Inventors: Shane R. Werner, Warren B. Cope, Von McConnell
  • Patent number: 8948388
    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: February 3, 2015
    Assignee: Certicom Corp.
    Inventors: Daniel Richard L. Brown, Scott Alexander Vanstone
  • Patent number: 8949880
    Abstract: Various embodiments of the present invention relate to systems, methods, and computer-readable medium providing licensing rights for media content that follows a subscriber so that the subscriber may experience the media content on various content distribution platforms. In particular embodiments, the systems, methods, and computer-readable medium transfer licensing rights for a user for particular media content that is associated with a first device on a first distribution platform so that the rights are associated with a second device on a second distribution platform. As a result, in various embodiments, the user is able to experience the particular media content with the use of the second device on the second distribution platform.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: February 3, 2015
    Assignee: Ericsson Television Inc.
    Inventors: Alan Rouse, Charles Hammett Dasher
  • Patent number: 8938789
    Abstract: An information processing system stores key information for determining an authentication device and information about the authentication device by associating these information pieces with each other and extract the key information from access of an unauthenticated user. Based on the information about the authentication device associated with the key information, the access of the unauthenticated user is redirected.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: January 20, 2015
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yu Tamura
  • Patent number: 8938777
    Abstract: Using geographical information in policy enforcement is disclosed. A request for a resource is received from a device. A policy to be applied to the request is determined based at least in part on geographical information associated with an IP address. The policy is enforced. The IP address may be either a source IP address or a destination IP address.
    Type: Grant
    Filed: September 23, 2013
    Date of Patent: January 20, 2015
    Assignee: Palo Alto Networks, Inc.
    Inventors: Anupam Bharali, Ravi Ithal, Yueh-Zen Chen
  • Patent number: 8935758
    Abstract: A data processing system (100) comprises: a database (4); a host computer (3) and a user computer (1) capable of communicating with each other over a network (2); wherein the user computer sends a data request message (RQ) to the host computer (3), the request message containing Data information (RD), Identity information (RI), and Authenticity information (A; VI), wherein the host computer (3) checks the authentication information and only sends the required data if the Identity information (RI) defines an authorized user and the authentication information (A; VI) authenticates the user identification information. The request message further contains secondary information (RT) and the host computer (3) calculates, from the secondary-information, a reliability value (R), compares the calculated reliability value with a predefined reliability threshold, and sends the required data only if the reliability value is at least as high as the reliability threshold.
    Type: Grant
    Filed: March 18, 2011
    Date of Patent: January 13, 2015
    Assignee: Authasas BV
    Inventors: Rik Peters, Reinier Maria Van Der Drift, Menno Stijl
  • Patent number: 8925044
    Abstract: A system and method for recognizing traffic generated from an authenticated a device roaming in a wireless local area network and related aspects are provided. An authentication server is arranged to authorize communications traffic originating from a wireless access point to use a roaming service, the traffic comprising an NAT translated IP address. The server first authorizes a WLAN roaming device, and then processes a meta-data message received from a WLAN access point in which the source address of the message comprises the source address of the roaming device at the WLAN access point. The server then determines, from the information provided in the meta-data message when it is received by the authentication server, which includes at this point a NAT translated source address in the meta-data message what the NAT translated source address of traffic from said NAT translated source address.
    Type: Grant
    Filed: March 30, 2011
    Date of Patent: December 30, 2014
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Paul Thomas Woodward, Shahzad Subedar
  • Patent number: 8893293
    Abstract: Credentials sent over a back channel during the authentication of a user to a RESTful service can elevate the trust the recipient system can place in the user's identity. The addition of an identity credential of higher strength can increase confidence in user identities electronically presented with a lower strength credential.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: November 18, 2014
    Assignee: Jericho Systems Corporation
    Inventors: Timothy Schmoyer, Michael Dufel, David Staggs, Vijayababu Subramanium
  • Patent number: 8886947
    Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: November 11, 2014
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Melanie Riendeau
  • Patent number: 8881310
    Abstract: Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic.
    Type: Grant
    Filed: September 9, 2012
    Date of Patent: November 4, 2014
    Assignee: Apple Inc.
    Inventors: Usama Mikael Hajj, Megan M. Frost
  • Patent number: 8881295
    Abstract: Methods and apparatus are provided for generating a garbled circuit for a client in a leakage-resilient manner, for use in secure function evaluation between the client and a server. The garbled circuit is generated by obtaining a token from the server, wherein said token comprises a leakage-protected area; querying the token gate-by-gate, wherein for each gate of said garbled circuit, the token interacts with the leakage-protected area to generate a garbled table for the gate; and receiving the garbled circuit from the token. The client can interact with the server to obtain garbled inputs; and then evaluate the garbled circuit on the garbled inputs to obtain a garbled output. A final output can be obtained by matching the garbled output with an output table in the garbled circuit.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: November 4, 2014
    Assignee: Alcatel Lucent
    Inventors: Vladimir Kolesnikov, Virendra Kumar
  • Patent number: 8874891
    Abstract: Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location on a virtual disk server, activation credentials generated in response to successful activation of the application during a previous boot Example embodiments then reinstall the application activation credentials to verify activation of the application for the particular client computing device.
    Type: Grant
    Filed: May 20, 2010
    Date of Patent: October 28, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Yves Gattegno
  • Patent number: 8863229
    Abstract: The disclosure provides a method for resource and admission control of a home network, the RACF of an NGN retail service provider formulates an initial policy rule according to a resource request after receiving the resource request sent by an SCF; a CPN performs authorization check on one or more resource requests after receiving them, each of which includes the initial policy rule and is sent by an RACF of a respective NGN retail service provider, formulates a final policy rule after the authorization check is passed, and executes the final policy rule. The disclosure further provides a system for resource and admission control of a home network correspondingly, since a CGPE-FE executes corresponding operation according to the decision result of an HPD-FE, the disclosure can avoid resource control errors such as resource desynchrony or resource inconsistence, and can improve system stability.
    Type: Grant
    Filed: June 11, 2010
    Date of Patent: October 14, 2014
    Assignee: ZTE Corporation
    Inventor: Jianjie You
  • Patent number: 8843744
    Abstract: A method of distributing media content over networks where content is shared includes coupling downloading metadata, which is accessed to start downloading media contents from the network, with semantic metadata representative of the semantic information associated with at least one of the content, and with source metadata indicative of the source of the media content. At least one of the semantic and the source metadata may be made accessible without downloading, even partially, the media content. A digital signature may also be applied to the metadata to enable the verification that, at reception, the metadata is intact and has not been subjected to malicious tampering.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: September 23, 2014
    Assignee: STMicroelectronics S.R.L.
    Inventors: Alexandro Sentinelli, Nicola Capovilla, Luca Celetto