Patents Examined by Viral Lakhia
  • Patent number: 8601536
    Abstract: The present invention discloses a bus monitor for enhancing SOC system security and a realization method thereof. The bus monitor disposed between a system bus and a system control unit includes a configuration unit, a condition judgment unit, an effective data selection unit, a hardware algorithm unit and a comparative output unit. Without affecting the bus access efficiency, the present invention provides the method capable of immediately monitoring the bus behavior, and the detection system notices whether a particular bus access serial behavior is changed due to an accidental fault or intentional attacking fault. If the particular bus access serial behavior is changed, the present invention warns the system to adopt a suitable security measure to prevent the security hidden trouble and leakage of classified information due to the incorrect system security process.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: December 3, 2013
    Assignee: Shenzhen State Micro Technology Co., Ltd.
    Inventors: Huayu Liu, Liangqing Wang
  • Patent number: 8595827
    Abstract: A safety controller for controlling an automated installation has a control unit to which a plurality of control input signals are supplied from the sensors of the installation. The control unit produces a plurality of control output signals on the basis of the control input signals in accordance with a user program running in said control unit in an automatic mode. The plurality of control output signals actuate the actuators. The safety controller also has a diagnosis evaluation unit that ascertains which one of a plurality of operating states is present at a defined instant of time and produces an operating state signal which represents the ascertained operating state. A diagnosis selection unit generates a diagnosis report as a function of the operating state signal and as a function of a user access authorization signal and/or a special operating mode signal.
    Type: Grant
    Filed: May 25, 2011
    Date of Patent: November 26, 2013
    Assignee: Pilz GmbH & Co. KG
    Inventors: Martin Zondler, Helmut Ehrhart, Stefan Woehrle
  • Patent number: 8577042
    Abstract: A system includes a transmit unit to transmit a signal including a data key, and a receiving unit to receive the signal. The receiving unit to determine an encryption key based at least in part on the data key and to decrypt encrypted data using the encryption key.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: November 5, 2013
    Assignee: RF Code, Inc.
    Inventor: David Worthy
  • Patent number: 8566922
    Abstract: A system for isolating a data communication network has been developed. The system includes an internal computer system with an internal computer that is in data communication with the internal computer system, and an external computer system with an external computer that is in data communication with the external computer system. The internal and external computers are connected with an ethernet adapter that only allows transmission of data from the internal computer system and prohibits the receipt of data by the internal computer system.
    Type: Grant
    Filed: May 25, 2011
    Date of Patent: October 22, 2013
    Inventor: Barry W. Hargis
  • Patent number: 8566900
    Abstract: Using geographical information in policy enforcement is disclosed. A policy is determined based on geographical information associated with an IP address. A policy is enforced based at least in part on the geographical information. The IP address may be either a source IP address or a destination IP address. In some cases network traffic is monitored to determine the IP address.
    Type: Grant
    Filed: May 23, 2011
    Date of Patent: October 22, 2013
    Assignee: Palo Alto Networks, Inc.
    Inventors: Anupam Bharali, Ravi Ithal, Yueh-Zen Chen
  • Patent number: 8561201
    Abstract: An image reading apparatus, an image information verification apparatus, an image reading method, an image information verification method, and an image reading program are disclosed. The image reading apparatus includes an image acquisition unit for acquiring an image from an image reading unit for reading the image formed on a medium, a medium description receiving unit for receiving a medium description provided by a medium description acquisition unit for acquiring the medium description of the medium, a set generating unit for generating a set of information about the image and information about the medium description, and a set unique value acquisition unit for acquiring a set unique value about the set.
    Type: Grant
    Filed: August 9, 2007
    Date of Patent: October 15, 2013
    Assignee: Ricoh Company, Limited
    Inventor: Yoichi Kanai
  • Patent number: 8555388
    Abstract: In some embodiments, heuristic botnet detection is provided. In some embodiments, heuristic botnet detection includes monitoring network traffic to identify suspicious network traffic; and detecting a bot based on a heuristic analysis of the suspicious network traffic behavior using a processor, in which the suspicious network traffic behavior includes command and control traffic associated with a bot master. In some embodiments, heuristic botnet detection further includes assigning a score to the monitored network traffic, in which the score corresponds to a botnet risk characterization of the monitored network traffic (e.g., based on one or more heuristic botnet detection techniques); increasing the score based on a correlation of additional suspicious behaviors associated with the monitored network traffic (e.g., based on one or more heuristic botnet detection techniques); and determining the suspicious behavior is associated with a botnet based on the score.
    Type: Grant
    Filed: May 24, 2011
    Date of Patent: October 8, 2013
    Assignee: Palo Alto Networks, Inc.
    Inventors: Xinran Wang, Huagang Xie
  • Patent number: 8542834
    Abstract: A device, system, and method are provided for simply and securely pairing a wireless peripheral device with a host device or system. The device, claim, and method and other peripheral devices provide for improved simplification and security of the pairing process involved with establishing a secure wireless connection between a peripheral device and a host. Simplification is improved because actions required by the user to complete the pairing process are minimized, and security is improved because of a greatly increased ability on the part of the user to ensure that pairing process is conducted in a secure environment. The pairing may be applicable to any number of host devices and peripheral devices. The host device may be a desktop computer, notebook computer, tablet computer, or similar device, and the peripheral device may be a keyboard, mouse, game controller, or personal digital assistant (PDA).
    Type: Grant
    Filed: August 9, 2007
    Date of Patent: September 24, 2013
    Assignee: Motion Computing, Inc.
    Inventors: John Feikis, Robert Ashenbrenner
  • Patent number: 8539233
    Abstract: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
    Type: Grant
    Filed: May 24, 2007
    Date of Patent: September 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Kedarnath A. Dubhashi, James M. Alkove, Patrik Schnell, Alexandre V. Grigorovitch, Vikram Mangalore
  • Patent number: 8538020
    Abstract: In one embodiment, a system and associated processes for transparent client-side cryptography are provided. In this system, some or all of a user's private data can be encrypted at a client device operated by the user. The client can transmit the encrypted user data to a content site that hosts a network application, such as a social networking application, financial application, or the like. The content site can store the private data in its encrypted form instead of the actual private data. When the content site receives a request for the private data from the user or optionally from other users (such as social networking friends), the server can send the encrypted user data to a client associated with the requesting user. This client, if operated by an authorized user, can decrypt the private data and present it to the authorized user.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: September 17, 2013
    Assignee: Amazon Technologies, Inc.
    Inventor: Kevin Miller
  • Patent number: 8537841
    Abstract: A problem is to provide a connection support apparatus and a gateway apparatus in which management of information is easy and remote access from a user terminal to the gateway apparatus can be performed easily and securely, and the problem is solved by including a control unit configured to perform control on a gateway apparatus to which a user apparatus connects so as to permit connection from the user apparatus for which authentication succeeds; and a communication unit configured to provide the user terminal with connection information used for connecting to the gateway apparatus.
    Type: Grant
    Filed: August 9, 2007
    Date of Patent: September 17, 2013
    Assignee: Fujitsu Limited
    Inventors: Haruyuki Takeyoshi, Naoki Matsuoka, Tomohiro Ishihara
  • Patent number: 8533847
    Abstract: Data to be screened for undesired content can be quickly downloaded into a non-volatile storage of a system, stored in a manner so as to be unavailable to the system for general use, and then screened later at a convenient time regardless of whether the data source is still available. At the time of screening, a screening module retrieves the data objects stored in the non-volatile storage and indicates whether they comply with screening criteria. Data objects not complying with the screening criteria are either deleted or otherwise made unavailable for general use by the system. By retaining the data objects that do not comply with the screening criteria, the downloaded content remains available for a different system having less restrictive or otherwise different screening criteria.
    Type: Grant
    Filed: January 27, 2008
    Date of Patent: September 10, 2013
    Assignee: SanDisk IL Ltd.
    Inventor: Noam Kedem
  • Patent number: 8533821
    Abstract: A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records an incoming IP address, userid, and time of each session occurring with the target server; an activity analysis system that identifies suspect IP addresses by determining if an unacceptable number of sessions are occurring from a single incoming IP address during a predefined time period; and a countermeasure system for taking action against suspect IP addresses.
    Type: Grant
    Filed: May 25, 2007
    Date of Patent: September 10, 2013
    Assignee: International Business Machines Corporation
    Inventor: Jeffery L. Crume
  • Patent number: 8528102
    Abstract: Methods and systems for protection of customer secrets in a secure reprogrammable system are disclosed, and may include controlling, via hardware logic and firmware, access to customer specific functions. The firmware may comprise trusted code, and may comprise boot code, stored in non-volatile memory, which may comprise read only memory, or a locked flash memory. A customer mode may be checked via the trusted code prior to allowing downloading of code written by a customer to the reprogrammable system. Access to customer specific functions may be restricted via commands from a trusted source. The hardware logic may be latched at startup in a disabled mode by the firmware, determined by the customer mode stored in a one time programmable memory. The customer mode may be re-checked utilizing the firmware, and may disallow the use of code other than trusted code in the reprogrammable system when the re-checking fails.
    Type: Grant
    Filed: May 24, 2007
    Date of Patent: September 3, 2013
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Iue Shuenn Chen, Stephane Rodgers, Andrew Dellow
  • Patent number: 8522043
    Abstract: A hardware-based security module is used to protect an electronic device, especially a portable electronic device. The security module may determine either via timeout of a watchdog timer or via an explicit message to encrypt selected data on the electronic device. In addition, the electronic device may enter a limited function mode that only allows display of simplistic messages and supports network traffic with a recovery service. The recovery service may be able to use the network traffic to locate the electronic device. The security module may include a secure memory, a cryptographic function, a timer, and support for direct display of data on a monitor.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: August 27, 2013
    Assignee: Microsoft Corporation
    Inventors: James S. Duffus, Curt Andrew Steeb, Thomas G. Phillips, Jeffrey Alan Herold, William Poole, William J. Westerinen, Martin H. Hall
  • Patent number: 8522349
    Abstract: A system, method and program product for defending against man in the middle (MITM) attacks directed at a target server. A system is provided that includes an activity recording system that records an incoming IP address, userid, and time of each session occurring with the target server; an activity analysis system that identifies suspect IP addresses by determining if an unacceptable number of sessions are occurring from a single incoming IP address during a predefined time period; and a countermeasure system for taking action against suspect IP addresses.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: August 27, 2013
    Assignee: International Business Machines Corporation
    Inventor: Jeffrey L. Crume
  • Patent number: 8510796
    Abstract: Apparatus, methods, and computer program products are disclosed that present a delegated-right to a delegation system by a service-application provisioned with the delegation system. The delegated-right enables the service-application to perform an operation/access on behalf of a delegator-user. The method then attempts to perform the operation/access.
    Type: Grant
    Filed: January 25, 2008
    Date of Patent: August 13, 2013
    Assignee: Oracle International Corporation
    Inventors: Alok Srivastava, Rafiul Ahad
  • Patent number: 8509436
    Abstract: A method and apparatus for remotely controlling access to the components of an optically interconnected information processing infrastructure is presented. Access to the infrastructure is controlled independently of the infrastructure operating system.
    Type: Grant
    Filed: April 2, 2010
    Date of Patent: August 13, 2013
    Inventors: Richard H. Selinfreund, Fred Berry
  • Patent number: 8499348
    Abstract: Disclosed are various embodiments for detecting and responding to attacks on a computer network. One embodiment of such a method describes monitoring data communications transmitted to a target class of first computing nodes; in response to detecting a non-legitimate data communication to a computing node in the target class, determining whether the non-legitimate data communication is a form of attack on a network to which the computing nodes are connected; and in response to determining that the network is under attack, implementing new security measures for second computing nodes that are not part of the target class to protect the second computing nodes against the attack on the network while the attack is ongoing.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: July 30, 2013
    Assignee: Amazon Technologies, Inc.
    Inventor: Gregory A. Rubin
  • Patent number: 8479269
    Abstract: Methods and systems are disclosed for reducing a number of unauthorized wireless communication devices (WCDs) using a femtocell. A femtocell may transmit a pilot beacon on a macro-network carrier, and may transmit one or more overhead channels on a femtocell carrier. Subsequently, the femtocell may receive a registration request from a WCD. The femtocell may then determine whether the WCD is authorized to receive wireless services from the femtocell, and if it is not so authorized, the femtocell may, during a subsequent slot associated with the unauthorized WCD in a periodically recurring slot cycle, responsively disable at least one of (i) its pilot channel and (ii) one or more of its overhead channels. As a result of the disabling, the unauthorized WCD may move away from the femtocell, perhaps handing off to the macro network.
    Type: Grant
    Filed: April 13, 2010
    Date of Patent: July 2, 2013
    Assignee: Sprint Spectrum L.P.
    Inventors: Muralidhar Malreddy, Ryan S. Talley, Rajveen Narendran