Patents Examined by Viral Lakhia
  • Patent number: 8838998
    Abstract: A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and transmits each encrypted personalization value to the corresponding party. Each party then stores the encrypted personalization value in their circuit. The stored encrypted personalization value allows a piece of software to be properly executed by the circuit. A semiconductor integrated circuit is arranged to execute a piece of software that inputs a personalization value as an input parameter. The circuit comprises a personalization memory arranged to store an encrypted personalization value; a key memory for storing a decryption key; a control unit comprising a cryptographic circuit arranged to decrypt the encrypted personalization value using the decryption key; and a processor arranged to receive the decrypted personalization value and execute the software using the decrypted personalization value.
    Type: Grant
    Filed: January 25, 2013
    Date of Patent: September 16, 2014
    Assignee: STMicroelectronics (Research & Development) Limited
    Inventor: Andrew Dellow
  • Patent number: 8826015
    Abstract: Embodiments of the present invention provide a portable system and method for accessing data remotely. The system and method include a first module and a second module, each of the modules being associated with the host system, wherein the first module is capable of being connected to the host system and the second module, and the second module is capable of being connected to the remote system to establish a secure communication channel between the first and second modules across the data link to access the data.
    Type: Grant
    Filed: April 21, 2008
    Date of Patent: September 2, 2014
    Assignee: Agency for Science, Technology and Research
    Inventors: Anantharaman Lakshminarayanan, Kalyan Takru
  • Patent number: 8819838
    Abstract: A method in a multimedia device (130) including obtaining protected content having a limited exercisable right associated therewith, obtaining an extension of the limited exercisable right when a condition is satisfied, for example, when the device enters a DRM system different than the DRM system from which the protected content originated, wherein the extension of the limited exercisable right is obtained from an entity other than the multimedia device, for example, from an anomaly detector.
    Type: Grant
    Filed: January 25, 2008
    Date of Patent: August 26, 2014
    Assignee: Google Technology Holdings LLC
    Inventor: Hosame H. Abu-Amara
  • Patent number: 8813186
    Abstract: Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes a device type identifier of a device requesting access to the service. The server extracts the device type identifier from the request and determines a corresponding device type for the requesting device. An authentication module is selected from a plurality of authentication modules based on the device type identifier, and the selected authentication module implements an authentication scheme for the device type of the requesting device. The server authenticates the request using the selected authentication module to determine whether the requesting device is permitted to access the service, and provides access to the service based on at least a determination that the requesting device is authorized to access the service.
    Type: Grant
    Filed: September 29, 2010
    Date of Patent: August 19, 2014
    Assignee: Amazon Technologies, Inc.
    Inventors: Joel C. Hegg, Siddharth Sriram, Kamlesh T. Talreja
  • Patent number: 8812851
    Abstract: The invention relates to a method for reading at least one attribute stored in an ID token (106, 106?) using first (136), second (150) and third (100) computer systems, wherein the third computer system comprises a browser (112) and a client (113), and wherein a service certificate (144) is assigned to the second computer system, wherein the service certificate comprises an identifier which is used to identify the second computer system, wherein the ID token is assigned to a user (102), having the following steps: —a first cryptographically protected connection (TLS1) is set up between the browser of the third computer system and the second computer system, wherein the third computer system receives a first certificate (176), —the first certificate is stored by the third computer system, —the third computer system receives a signed attribute specification (182) via the first connection, —a second cryptographically protected connection (TLS2) is set up between the browser of the third computer system and the f
    Type: Grant
    Filed: April 20, 2011
    Date of Patent: August 19, 2014
    Assignee: Bundesdruckerei GmbH
    Inventors: Carsten Schwarz, Günter Koch
  • Patent number: 8806625
    Abstract: A computer-implemented method for performing security scans may include 1) generating a first hash of a first file, 2) performing a first security scan on the first file, 3) storing the first hash to indicate a result of the first security scan of the first file, 4) identifying a second file and generating a second hash of the second file, 5) determining that the second hash of the second file is equivalent to the first hash of the first file and, in response, determining that the result of the first security scan of the first file applies to the second file, 6) identifying a third file and determining that the third file is volatile, and 7) performing a second security scan on the third file instead of generating a third hash of the third file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: August 12, 2014
    Assignee: Symantec Corporation
    Inventor: Henry Berger
  • Patent number: 8800011
    Abstract: In one embodiment a method for receiving a request from a user to update a pointer record of a domain name system (DNS) in a DNS service includes issuing a query from the DNS service to a resource of a first service of the data center from the DNS service using a uniform resource indicator (URI) of the request corresponding to the resource, receiving a list of Internet protocol (IP) addresses in the DNS service from the first service, determining whether an IP address received in the request corresponds to one of the IP addresses of the list, and if so, enabling the user to update the pointer record.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: August 5, 2014
    Assignee: Rackspace US, Inc.
    Inventors: Keith Bray, Daniel Morris, Randall Burt
  • Patent number: 8789159
    Abstract: Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: July 22, 2014
    Assignee: Microsoft Corporation
    Inventors: S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta
  • Patent number: 8782759
    Abstract: The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile environment, a mobile device is disconnected from or otherwise unable to connect to a wireless network. The inventive method provides the mobile device with a “long term” token, which is obtained from an identity provider coupled to the network. The token may be valid for a given time period. During that time period, the mobile device can enter a disconnected mode but still obtain a mobile device-aided function (e.g., access to a resource) by presenting for authentication the long term token. Upon a given occurrence (e.g., loss of or theft of the mobile device) the long term token is canceled to restrict unauthorized further use of the mobile device in disconnected mode.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: July 15, 2014
    Assignee: International Business Machines Corporation
    Inventors: Heather Maria Hinton, Anthony Joseph Nadalin
  • Patent number: 8776195
    Abstract: An improved technique involves converting facts from multiple fact sources to a common data format. Along these lines, for each fact source having a source-specific format, a KBA system provides an adaptor that converts incoming facts in the source-specific format to the common data format prior to generating questions. The KBA system stores the facts in the common format in a database for subsequent access. In response to an authorization request, the KBA system then builds questions based on the facts from multiple sources in the common data format stored in the database.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: July 8, 2014
    Assignee: EMC Corporation
    Inventors: Ayelet Avni, Bryan Knauss, Yedidya Dotan, Erez Yakoel
  • Patent number: 8763123
    Abstract: In one aspect, a method of determining the protection that a remote computer has from malware includes receiving at a base computer, details of all or selected security products operating on a remote computer, receiving similar information from other remote computers, and identifying malware process that were not identified by the security products installed on the other remote computers and having a same or similar combination of security products installed on the remote computer.
    Type: Grant
    Filed: July 8, 2012
    Date of Patent: June 24, 2014
    Assignee: Prevx Limited
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 8752206
    Abstract: A system and method for using content on multiple devices includes a head end associating a first user device and a second user device with a user account and authorizing the first user device and the second user device to receive content. The first user device forms a selection signal corresponding to a first content. The head end communicates the first content to the first user device corresponding to the selection signal. The first user device displays the first content on a first display associated therewith. The second user device receives the first content and displays the first content on a second display associated with the second user device.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: June 10, 2014
    Assignee: The DIRECTV Group, Inc.
    Inventors: Kuriacose Joseph, Scott D. Casavant, Sean S. Lee
  • Patent number: 8752167
    Abstract: A content management device, includes: a folder level access control information storage unit configured to store folder level access control information indicating access rights of a user to a folder where content is stored; an access control unit configured to acquire content level access control information indicating access rights of a user to content, from a predetermined content level access control unit; and a user interface configured to output display data for displaying a hierarchical structure between at least one folder and at least one content stored in the at least one folder, along with information indicating whether or not an inconsistency has occurred in access rights between the folder level access control information of the at least one folder and the content level access control information of the content stored in the at least one folder.
    Type: Grant
    Filed: July 1, 2011
    Date of Patent: June 10, 2014
    Assignee: NEC Corporation
    Inventor: Yiyi Jin
  • Patent number: 8750499
    Abstract: A cryptographic method is provided of a type with public key over a non-supersingular elliptic curve E, determined by the simplified Weirstrass equation y2=x3+a·x2+b over a finite field GF(3n), with n being an integer greater than or equal to 1. The method includes associating an element t of said finite field with a point P? of the elliptic field. The step of associating includes: obtaining a pre-determined quadratic non-residue ? on GF(3n); obtaining a pre-determined point P=(zP, yP) belonging to a conic C defined by the following equation: a·?·z2?y2+b =0; obtaining a point Q=(zQ, yQ), distinct from the point P belonging to the conic C and a straight line D defined by the following equation: y=t·z+yP?t·zP; obtaining the element ? of GF(3n) verifying the following linear equation over GF(3): ??·?=(?2·zQ)/a; and associating, with the element t of the finite field, the point P? of the elliptic curve, for which the coordinates are defined by the pair (?·zQ/?, yQ).
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: June 10, 2014
    Assignee: Compagnie Industrielle et Financiere d'Ingenierie “Ingenico”
    Inventor: Eric Brier
  • Patent number: 8751831
    Abstract: A data storage architecture for networked access by clients includes a file server capable of communication with the clients via the network, physical storage organized as a plurality of logical volumes, and an encryption device in communication with both the file server and the physical storage. The encryption device is operable in response to signaling from the file server, including an indication of a range of blocks of data, to cause encryption of the range of blocks with an encryption key that is unique within the physical storage. The encryption device includes nested tables mapping block ranges to encryption keys. Consequently, undesirable key sharing across files, file systems, and other units can be avoided down to the block level.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: June 10, 2014
    Assignee: EMC Corporation
    Inventors: Roger F Osmond, Gil Goren
  • Patent number: 8745718
    Abstract: Information useful for authenticating an entity is sent over a back channel during the authentication of an entity to a RESTful service. The delivery of the entity-related information is triggered by the validation of a service ticket received by the authentication component of the RESTful service.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: June 3, 2014
    Assignee: Jericho Systems Corporation
    Inventors: Michael Dufel, Vijayababu Subramanium, Mizanul Chowdhury
  • Patent number: 8732836
    Abstract: Disclose are system, method and computer program product for correcting antivirus records. In an example method, during analysis of a software object for malware, an antivirus application retrieves from an antivirus database an antivirus record associated with the analyzed object, which identifies the object as malicious or clean. The application also checks if there is a correction for the antivirus record in an antivirus cache and use the correction for analysis of the software object. If no correction is found in the cache, the application checks correctness of the antivirus record with an antivirus server. The antivirus server uses statistical information about software objects collected from antivirus applications deployed on different computers to validate correctness of antivirus records. If the antivirus server provides a correction for the antivirus record, the application uses the provided correction for analysis of the software object for malware.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: May 20, 2014
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexander A. Romanenko, Anton S. Lapushkin, Oleg A. Ishanov
  • Patent number: 8713649
    Abstract: A system and method can provide subnet manager (SM) restrictions in an InfiniBand (IB) network. A first SM in a subnet in the IB network operates to determine whether a second SM associated with a remote port is trustworthy. Furthermore, the first SM is allowed to send at least one of a request and a response that contains a management key to the second SM, if the first SM determines that the second SM is trustworthy. Additionally, the first SM is prevented from attempting to initiate communication with the second SM, if otherwise.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: April 29, 2014
    Assignee: Oracle International Corporation
    Inventors: Bjorn-Dag Johnsen, Line Holen, Dag Georg Moxnes
  • Patent number: 8707384
    Abstract: Some embodiments of the present invention provide a system for maintaining a software system. During operation, the system obtains a compliance policy for the software system and monitors the software system for a violation of the compliance policy. If a violation is detected, the system generates a change recommendation associated with the violation using the compliance policy and provides the change recommendation to an administrator, so that the administrator can use the change recommendation to resolve the violation.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: April 22, 2014
    Assignee: Oracle International Corporation
    Inventors: Nitin Jain, Amit Bhalla, Sourav Mukherjee, Macks Ningombam
  • Patent number: 8707385
    Abstract: Some embodiments of the present invention provide a system that maintains a software system. During operation, the system obtains a compliance policy for the software system and monitors the software system for a violation of the compliance policy. If such a violation is detected, the system retrieves a change package associated with the violation based on the compliance policy and automatically deploys the change package to the software system to resolve the violation.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: April 22, 2014
    Assignee: Oracle International Corporation
    Inventors: Nitin Jain, Amit Bhalla, Anurag Singh, Aawardhan Logandan, Sourav Mukherjee