Patents Examined by Viral Lakhia
-
Patent number: 8838998Abstract: A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and transmits each encrypted personalization value to the corresponding party. Each party then stores the encrypted personalization value in their circuit. The stored encrypted personalization value allows a piece of software to be properly executed by the circuit. A semiconductor integrated circuit is arranged to execute a piece of software that inputs a personalization value as an input parameter. The circuit comprises a personalization memory arranged to store an encrypted personalization value; a key memory for storing a decryption key; a control unit comprising a cryptographic circuit arranged to decrypt the encrypted personalization value using the decryption key; and a processor arranged to receive the decrypted personalization value and execute the software using the decrypted personalization value.Type: GrantFiled: January 25, 2013Date of Patent: September 16, 2014Assignee: STMicroelectronics (Research & Development) LimitedInventor: Andrew Dellow
-
Patent number: 8826015Abstract: Embodiments of the present invention provide a portable system and method for accessing data remotely. The system and method include a first module and a second module, each of the modules being associated with the host system, wherein the first module is capable of being connected to the host system and the second module, and the second module is capable of being connected to the remote system to establish a secure communication channel between the first and second modules across the data link to access the data.Type: GrantFiled: April 21, 2008Date of Patent: September 2, 2014Assignee: Agency for Science, Technology and ResearchInventors: Anantharaman Lakshminarayanan, Kalyan Takru
-
Patent number: 8819838Abstract: A method in a multimedia device (130) including obtaining protected content having a limited exercisable right associated therewith, obtaining an extension of the limited exercisable right when a condition is satisfied, for example, when the device enters a DRM system different than the DRM system from which the protected content originated, wherein the extension of the limited exercisable right is obtained from an entity other than the multimedia device, for example, from an anomaly detector.Type: GrantFiled: January 25, 2008Date of Patent: August 26, 2014Assignee: Google Technology Holdings LLCInventor: Hosame H. Abu-Amara
-
Patent number: 8813186Abstract: Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes a device type identifier of a device requesting access to the service. The server extracts the device type identifier from the request and determines a corresponding device type for the requesting device. An authentication module is selected from a plurality of authentication modules based on the device type identifier, and the selected authentication module implements an authentication scheme for the device type of the requesting device. The server authenticates the request using the selected authentication module to determine whether the requesting device is permitted to access the service, and provides access to the service based on at least a determination that the requesting device is authorized to access the service.Type: GrantFiled: September 29, 2010Date of Patent: August 19, 2014Assignee: Amazon Technologies, Inc.Inventors: Joel C. Hegg, Siddharth Sriram, Kamlesh T. Talreja
-
Patent number: 8812851Abstract: The invention relates to a method for reading at least one attribute stored in an ID token (106, 106?) using first (136), second (150) and third (100) computer systems, wherein the third computer system comprises a browser (112) and a client (113), and wherein a service certificate (144) is assigned to the second computer system, wherein the service certificate comprises an identifier which is used to identify the second computer system, wherein the ID token is assigned to a user (102), having the following steps: —a first cryptographically protected connection (TLS1) is set up between the browser of the third computer system and the second computer system, wherein the third computer system receives a first certificate (176), —the first certificate is stored by the third computer system, —the third computer system receives a signed attribute specification (182) via the first connection, —a second cryptographically protected connection (TLS2) is set up between the browser of the third computer system and the fType: GrantFiled: April 20, 2011Date of Patent: August 19, 2014Assignee: Bundesdruckerei GmbHInventors: Carsten Schwarz, Günter Koch
-
Patent number: 8806625Abstract: A computer-implemented method for performing security scans may include 1) generating a first hash of a first file, 2) performing a first security scan on the first file, 3) storing the first hash to indicate a result of the first security scan of the first file, 4) identifying a second file and generating a second hash of the second file, 5) determining that the second hash of the second file is equivalent to the first hash of the first file and, in response, determining that the result of the first security scan of the first file applies to the second file, 6) identifying a third file and determining that the third file is volatile, and 7) performing a second security scan on the third file instead of generating a third hash of the third file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: October 2, 2012Date of Patent: August 12, 2014Assignee: Symantec CorporationInventor: Henry Berger
-
Patent number: 8800011Abstract: In one embodiment a method for receiving a request from a user to update a pointer record of a domain name system (DNS) in a DNS service includes issuing a query from the DNS service to a resource of a first service of the data center from the DNS service using a uniform resource indicator (URI) of the request corresponding to the resource, receiving a list of Internet protocol (IP) addresses in the DNS service from the first service, determining whether an IP address received in the request corresponds to one of the IP addresses of the list, and if so, enabling the user to update the pointer record.Type: GrantFiled: May 31, 2012Date of Patent: August 5, 2014Assignee: Rackspace US, Inc.Inventors: Keith Bray, Daniel Morris, Randall Burt
-
Patent number: 8789159Abstract: Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process.Type: GrantFiled: February 11, 2008Date of Patent: July 22, 2014Assignee: Microsoft CorporationInventors: S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta
-
Patent number: 8782759Abstract: The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile environment, a mobile device is disconnected from or otherwise unable to connect to a wireless network. The inventive method provides the mobile device with a “long term” token, which is obtained from an identity provider coupled to the network. The token may be valid for a given time period. During that time period, the mobile device can enter a disconnected mode but still obtain a mobile device-aided function (e.g., access to a resource) by presenting for authentication the long term token. Upon a given occurrence (e.g., loss of or theft of the mobile device) the long term token is canceled to restrict unauthorized further use of the mobile device in disconnected mode.Type: GrantFiled: February 11, 2008Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Joseph Nadalin
-
Patent number: 8776195Abstract: An improved technique involves converting facts from multiple fact sources to a common data format. Along these lines, for each fact source having a source-specific format, a KBA system provides an adaptor that converts incoming facts in the source-specific format to the common data format prior to generating questions. The KBA system stores the facts in the common format in a database for subsequent access. In response to an authorization request, the KBA system then builds questions based on the facts from multiple sources in the common data format stored in the database.Type: GrantFiled: March 30, 2012Date of Patent: July 8, 2014Assignee: EMC CorporationInventors: Ayelet Avni, Bryan Knauss, Yedidya Dotan, Erez Yakoel
-
Patent number: 8763123Abstract: In one aspect, a method of determining the protection that a remote computer has from malware includes receiving at a base computer, details of all or selected security products operating on a remote computer, receiving similar information from other remote computers, and identifying malware process that were not identified by the security products installed on the other remote computers and having a same or similar combination of security products installed on the remote computer.Type: GrantFiled: July 8, 2012Date of Patent: June 24, 2014Assignee: Prevx LimitedInventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
-
Patent number: 8752206Abstract: A system and method for using content on multiple devices includes a head end associating a first user device and a second user device with a user account and authorizing the first user device and the second user device to receive content. The first user device forms a selection signal corresponding to a first content. The head end communicates the first content to the first user device corresponding to the selection signal. The first user device displays the first content on a first display associated therewith. The second user device receives the first content and displays the first content on a second display associated with the second user device.Type: GrantFiled: September 12, 2012Date of Patent: June 10, 2014Assignee: The DIRECTV Group, Inc.Inventors: Kuriacose Joseph, Scott D. Casavant, Sean S. Lee
-
Patent number: 8752167Abstract: A content management device, includes: a folder level access control information storage unit configured to store folder level access control information indicating access rights of a user to a folder where content is stored; an access control unit configured to acquire content level access control information indicating access rights of a user to content, from a predetermined content level access control unit; and a user interface configured to output display data for displaying a hierarchical structure between at least one folder and at least one content stored in the at least one folder, along with information indicating whether or not an inconsistency has occurred in access rights between the folder level access control information of the at least one folder and the content level access control information of the content stored in the at least one folder.Type: GrantFiled: July 1, 2011Date of Patent: June 10, 2014Assignee: NEC CorporationInventor: Yiyi Jin
-
Patent number: 8750499Abstract: A cryptographic method is provided of a type with public key over a non-supersingular elliptic curve E, determined by the simplified Weirstrass equation y2=x3+a·x2+b over a finite field GF(3n), with n being an integer greater than or equal to 1. The method includes associating an element t of said finite field with a point P? of the elliptic field. The step of associating includes: obtaining a pre-determined quadratic non-residue ? on GF(3n); obtaining a pre-determined point P=(zP, yP) belonging to a conic C defined by the following equation: a·?·z2?y2+b =0; obtaining a point Q=(zQ, yQ), distinct from the point P belonging to the conic C and a straight line D defined by the following equation: y=t·z+yP?t·zP; obtaining the element ? of GF(3n) verifying the following linear equation over GF(3): ??·?=(?2·zQ)/a; and associating, with the element t of the finite field, the point P? of the elliptic curve, for which the coordinates are defined by the pair (?·zQ/?, yQ).Type: GrantFiled: December 9, 2010Date of Patent: June 10, 2014Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingenico”Inventor: Eric Brier
-
Patent number: 8751831Abstract: A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical volumes, and an encryption device in communication with both the file server and the physical storage. The encryption device is operable in response to signaling from the file server, including an indication of a range of blocks of data, to cause encryption of the range of blocks with an encryption key that is unique within the physical storage. The encryption device includes nested tables mapping block ranges to encryption keys. Consequently, undesirable key sharing across files, file systems, and other units can be avoided down to the block level.Type: GrantFiled: April 20, 2012Date of Patent: June 10, 2014Assignee: EMC CorporationInventors: Roger F Osmond, Gil Goren
-
Patent number: 8745718Abstract: Information useful for authenticating an entity is sent over a back channel during the authentication of an entity to a RESTful service. The delivery of the entity-related information is triggered by the validation of a service ticket received by the authentication component of the RESTful service.Type: GrantFiled: October 2, 2012Date of Patent: June 3, 2014Assignee: Jericho Systems CorporationInventors: Michael Dufel, Vijayababu Subramanium, Mizanul Chowdhury
-
Patent number: 8732836Abstract: Disclose are system, method and computer program product for correcting antivirus records. In an example method, during analysis of a software object for malware, an antivirus application retrieves from an antivirus database an antivirus record associated with the analyzed object, which identifies the object as malicious or clean. The application also checks if there is a correction for the antivirus record in an antivirus cache and use the correction for analysis of the software object. If no correction is found in the cache, the application checks correctness of the antivirus record with an antivirus server. The antivirus server uses statistical information about software objects collected from antivirus applications deployed on different computers to validate correctness of antivirus records. If the antivirus server provides a correction for the antivirus record, the application uses the provided correction for analysis of the software object for malware.Type: GrantFiled: March 23, 2012Date of Patent: May 20, 2014Assignee: Kaspersky Lab ZAOInventors: Alexander A. Romanenko, Anton S. Lapushkin, Oleg A. Ishanov
-
Patent number: 8713649Abstract: A system and method can provide subnet manager (SM) restrictions in an InfiniBand (IB) network. A first SM in a subnet in the IB network operates to determine whether a second SM associated with a remote port is trustworthy. Furthermore, the first SM is allowed to send at least one of a request and a response that contains a management key to the second SM, if the first SM determines that the second SM is trustworthy. Additionally, the first SM is prevented from attempting to initiate communication with the second SM, if otherwise.Type: GrantFiled: June 4, 2012Date of Patent: April 29, 2014Assignee: Oracle International CorporationInventors: Bjorn-Dag Johnsen, Line Holen, Dag Georg Moxnes
-
Patent number: 8707384Abstract: Some embodiments of the present invention provide a system for maintaining a software system. During operation, the system obtains a compliance policy for the software system and monitors the software system for a violation of the compliance policy. If a violation is detected, the system generates a change recommendation associated with the violation using the compliance policy and provides the change recommendation to an administrator, so that the administrator can use the change recommendation to resolve the violation.Type: GrantFiled: February 11, 2008Date of Patent: April 22, 2014Assignee: Oracle International CorporationInventors: Nitin Jain, Amit Bhalla, Sourav Mukherjee, Macks Ningombam
-
Patent number: 8707385Abstract: Some embodiments of the present invention provide a system that maintains a software system. During operation, the system obtains a compliance policy for the software system and monitors the software system for a violation of the compliance policy. If such a violation is detected, the system retrieves a change package associated with the violation based on the compliance policy and automatically deploys the change package to the software system to resolve the violation.Type: GrantFiled: February 11, 2008Date of Patent: April 22, 2014Assignee: Oracle International CorporationInventors: Nitin Jain, Amit Bhalla, Anurag Singh, Aawardhan Logandan, Sourav Mukherjee