Patents Examined by Viral Lakhia
-
Patent number: 8966599Abstract: Approaches are described for automatically generating new security credentials, such as security tokens, which can involve automatically re-authenticating a user (or client device) using a previous security token issued to that user (or device). The re-authentication can happen without any knowledge and/or action on the part of the user. The re-authentication mechanism can invalidate and/or keep track of the previous security token, such that when a subsequent request is received that includes the previous security token, the new security token can be invalidated, and the user caused to re-authenticate, as receiving more than one request with the previous security token can be indicative that the user's token might have been stolen.Type: GrantFiled: March 14, 2013Date of Patent: February 24, 2015Assignee: Amazon Technologies, Inc.Inventors: Maximilian Francis Barrows, Paul Francis Dean Ferraro, Jason George Mchugh, Abraham Martin Passaglia, Andrew Jay Roths, Eric Allan Shell
-
Patent number: 8966625Abstract: In some embodiments, identification of malware sites using unknown URL sites and newly registered DNS addresses includes performing a heuristic analysis for information associated with a network site; and assigning a score based on the heuristic analysis, in which the score indicates whether the network site is potentially malicious. In some embodiments, the system includes a security appliance that is in communication with the Internet. In some embodiments, the network site is associated with a network domain and/or a network uniform resource locator (URL). In some embodiments, performing a heuristic analysis for information associated with a network site further includes determining if a network site has recently been registered. In some embodiments, performing a heuristic analysis for information associated with a network site further includes determining if a network site is associated with recently changed DNS information.Type: GrantFiled: May 24, 2011Date of Patent: February 24, 2015Assignee: Palo Alto Networks, Inc.Inventors: Nir Zuk, Renzo Lazzarato, Huagang Xie
-
Patent number: 8964829Abstract: Techniques to perform fast motion estimation are described. An apparatus may comprise a motion estimator operative to receive as input a current frame and a reference frame from a digital video sequence. The motion estimator may generate and output a motion vector. The motion vector may represent a change in position between a current block of the current frame and a matching reference block of the reference frame. The motion estimator may utilize an enhanced block matching technique to perform block matching based on stationary and spatially proximate blocks. Other embodiments are described and claimed.Type: GrantFiled: December 21, 2012Date of Patent: February 24, 2015Assignee: Microsoft CorporationInventors: Ce Wang, Walid Ali
-
Patent number: 8954747Abstract: Systems and methods of managing keystroke data in embedded keyboard environments may involve transferring a mode request from a management controller to an embedded controller of a keyboard via a dedicated communication channel. Keystroke activity can be detected at the keyboard, and keystroke data may be transferred from the embedded controller to the management controller via the dedicated communication channel in response to the keystroke activity and the mode request. In addition, the management controller may be used to encrypt the keystroke data, wherein the encrypted keystroke data can be transmitted from the management controller to an off-platform service via a network controller.Type: GrantFiled: July 1, 2011Date of Patent: February 10, 2015Assignee: Intel CorporationInventors: Nitin V. Sarangdhar, Jasmeet Chhabra
-
Patent number: 8955086Abstract: A computer system determines whether the computer system is able to access an authentication server. If the computer system is able to access the authentication server, the computer system requesting a first set of credentials from a user. If the first set of credentials is valid, the computer system assigns the user a first role for performing operations on the computer system based on the first set of credentials. If the computer system is unable to access the authentication server, the computer system requests another set of credentials from the user. If the other set of credentials is valid, the computer system assigns the user another role for performing operations on the computer system based on the other set of credentials.Type: GrantFiled: March 16, 2012Date of Patent: February 10, 2015Assignee: Red Hat, Inc.Inventor: Dmitri V. Pal
-
Patent number: 8953801Abstract: A system and method is provided which allows multicast communications encrypted using IPSec protocol to be received by receivers in a network. In order to allow the receivers to receive the encrypted multicast communication, the address information of the received multicast communication is modified to appear as a unicast communication being transmitted directly to the address of the receiver, such that the receiver may then decrypt the received multicast communication using IPSec decryption capabilities or may, alternatively, forward the received multicast communication in its encrypted state to other devices. The system and method further provide IPSec encryption key delivery to the receiver using an encrypted markup language file. Multiple keys may also be generated for a given IP address of a receiver with each key being generated for a particular multicasting hierarchical classification.Type: GrantFiled: April 18, 2012Date of Patent: February 10, 2015Assignee: Hughes Networks Systems, LLCInventors: John K. Thomasson, Neil R. Terry, Matthew M. Davis, Myron L. Mosbarger
-
Application digital rights management (DRM) and portability using a mobile device for authentication
Patent number: 8950000Abstract: A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a computer software on a mobile device with different computing devices. A mobile device is used to authenticate a user's access to computer software. The computer software may reside on the mobile device, the user's computing device, or another computing device. A unique identifier is stored in the mobile device associated with the computer software to enable the authentication.Type: GrantFiled: November 15, 2012Date of Patent: February 3, 2015Assignee: Sprint Communications Company L.P.Inventors: Shane R. Werner, Warren B. Cope, Von McConnell -
Patent number: 8948388Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.Type: GrantFiled: February 19, 2013Date of Patent: February 3, 2015Assignee: Certicom Corp.Inventors: Daniel Richard L. Brown, Scott Alexander Vanstone
-
Patent number: 8949880Abstract: Various embodiments of the present invention relate to systems, methods, and computer-readable medium providing licensing rights for media content that follows a subscriber so that the subscriber may experience the media content on various content distribution platforms. In particular embodiments, the systems, methods, and computer-readable medium transfer licensing rights for a user for particular media content that is associated with a first device on a first distribution platform so that the rights are associated with a second device on a second distribution platform. As a result, in various embodiments, the user is able to experience the particular media content with the use of the second device on the second distribution platform.Type: GrantFiled: December 13, 2012Date of Patent: February 3, 2015Assignee: Ericsson Television Inc.Inventors: Alan Rouse, Charles Hammett Dasher
-
Patent number: 8938789Abstract: An information processing system stores key information for determining an authentication device and information about the authentication device by associating these information pieces with each other and extract the key information from access of an unauthenticated user. Based on the information about the authentication device associated with the key information, the access of the unauthenticated user is redirected.Type: GrantFiled: February 10, 2012Date of Patent: January 20, 2015Assignee: Canon Kabushiki KaishaInventor: Yu Tamura
-
Patent number: 8938777Abstract: Using geographical information in policy enforcement is disclosed. A request for a resource is received from a device. A policy to be applied to the request is determined based at least in part on geographical information associated with an IP address. The policy is enforced. The IP address may be either a source IP address or a destination IP address.Type: GrantFiled: September 23, 2013Date of Patent: January 20, 2015Assignee: Palo Alto Networks, Inc.Inventors: Anupam Bharali, Ravi Ithal, Yueh-Zen Chen
-
Patent number: 8935758Abstract: A data processing system (100) comprises: a database (4); a host computer (3) and a user computer (1) capable of communicating with each other over a network (2); wherein the user computer sends a data request message (RQ) to the host computer (3), the request message containing Data information (RD), Identity information (RI), and Authenticity information (A; VI), wherein the host computer (3) checks the authentication information and only sends the required data if the Identity information (RI) defines an authorized user and the authentication information (A; VI) authenticates the user identification information. The request message further contains secondary information (RT) and the host computer (3) calculates, from the secondary-information, a reliability value (R), compares the calculated reliability value with a predefined reliability threshold, and sends the required data only if the reliability value is at least as high as the reliability threshold.Type: GrantFiled: March 18, 2011Date of Patent: January 13, 2015Assignee: Authasas BVInventors: Rik Peters, Reinier Maria Van Der Drift, Menno Stijl
-
Patent number: 8925044Abstract: A system and method for recognizing traffic generated from an authenticated a device roaming in a wireless local area network and related aspects are provided. An authentication server is arranged to authorize communications traffic originating from a wireless access point to use a roaming service, the traffic comprising an NAT translated IP address. The server first authorizes a WLAN roaming device, and then processes a meta-data message received from a WLAN access point in which the source address of the message comprises the source address of the roaming device at the WLAN access point. The server then determines, from the information provided in the meta-data message when it is received by the authentication server, which includes at this point a NAT translated source address in the meta-data message what the NAT translated source address of traffic from said NAT translated source address.Type: GrantFiled: March 30, 2011Date of Patent: December 30, 2014Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Paul Thomas Woodward, Shahzad Subedar
-
Patent number: 8893293Abstract: Credentials sent over a back channel during the authentication of a user to a RESTful service can elevate the trust the recipient system can place in the user's identity. The addition of an identity credential of higher strength can increase confidence in user identities electronically presented with a lower strength credential.Type: GrantFiled: March 15, 2013Date of Patent: November 18, 2014Assignee: Jericho Systems CorporationInventors: Timothy Schmoyer, Michael Dufel, David Staggs, Vijayababu Subramanium
-
Patent number: 8886947Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.Type: GrantFiled: December 20, 2012Date of Patent: November 11, 2014Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Melanie Riendeau
-
Patent number: 8881310Abstract: Systems, methods, and non-transitory computer-readable storage media are provided for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic.Type: GrantFiled: September 9, 2012Date of Patent: November 4, 2014Assignee: Apple Inc.Inventors: Usama Mikael Hajj, Megan M. Frost
-
Patent number: 8881295Abstract: Methods and apparatus are provided for generating a garbled circuit for a client in a leakage-resilient manner, for use in secure function evaluation between the client and a server. The garbled circuit is generated by obtaining a token from the server, wherein said token comprises a leakage-protected area; querying the token gate-by-gate, wherein for each gate of said garbled circuit, the token interacts with the leakage-protected area to generate a garbled table for the gate; and receiving the garbled circuit from the token. The client can interact with the server to obtain garbled inputs; and then evaluate the garbled circuit on the garbled inputs to obtain a garbled output. A final output can be obtained by matching the garbled output with an output table in the garbled circuit.Type: GrantFiled: June 30, 2011Date of Patent: November 4, 2014Assignee: Alcatel LucentInventors: Vladimir Kolesnikov, Virendra Kumar
-
Patent number: 8874891Abstract: Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location on a virtual disk server, activation credentials generated in response to successful activation of the application during a previous boot Example embodiments then reinstall the application activation credentials to verify activation of the application for the particular client computing device.Type: GrantFiled: May 20, 2010Date of Patent: October 28, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Yves Gattegno
-
Patent number: 8863229Abstract: The disclosure provides a method for resource and admission control of a home network, the RACF of an NGN retail service provider formulates an initial policy rule according to a resource request after receiving the resource request sent by an SCF; a CPN performs authorization check on one or more resource requests after receiving them, each of which includes the initial policy rule and is sent by an RACF of a respective NGN retail service provider, formulates a final policy rule after the authorization check is passed, and executes the final policy rule. The disclosure further provides a system for resource and admission control of a home network correspondingly, since a CGPE-FE executes corresponding operation according to the decision result of an HPD-FE, the disclosure can avoid resource control errors such as resource desynchrony or resource inconsistence, and can improve system stability.Type: GrantFiled: June 11, 2010Date of Patent: October 14, 2014Assignee: ZTE CorporationInventor: Jianjie You
-
Patent number: 8843744Abstract: A method of distributing media content over networks where content is shared includes coupling downloading metadata, which is accessed to start downloading media contents from the network, with semantic metadata representative of the semantic information associated with at least one of the content, and with source metadata indicative of the source of the media content. At least one of the semantic and the source metadata may be made accessible without downloading, even partially, the media content. A digital signature may also be applied to the metadata to enable the verification that, at reception, the metadata is intact and has not been subjected to malicious tampering.Type: GrantFiled: December 29, 2010Date of Patent: September 23, 2014Assignee: STMicroelectronics S.R.L.Inventors: Alexandro Sentinelli, Nicola Capovilla, Luca Celetto