Patents by Inventor Henry Levy

Henry Levy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9531752
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: December 27, 2016
    Assignee: University of Washington
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 9489523
    Abstract: Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a user may obtain reliable, explicit evidence that no files have been accessed after a device's loss. A user may also disable future file access after a device's loss, even in the absence of device network connectivity. In one embodiment, files are encrypted locally but the encryption keys are stored remotely, so that an audit server is queried for encryption keys to access protected files. By configuring the audit server to refuse to return a particular file's key, the user can prevent new accesses after the device is lost.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: November 8, 2016
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Tadayoshi Kohno, Roxana Geambasu, Henry Levy, Steven Gribble
  • Publication number: 20150326607
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Application
    Filed: April 22, 2015
    Publication date: November 12, 2015
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 9043913
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: May 26, 2015
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Publication number: 20130198522
    Abstract: Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a user may obtain reliable, explicit evidence that no files have been accessed after a device's loss. A user may also disable future file access after a device's loss, even in the absence of device network connectivity. In one embodiment, files are encrypted locally but the encryption keys are stored remotely, so that an audit server is queried for encryption keys to access protected files. By configuring the audit server to refuse to return a particular file's key, the user can prevent new accesses after the device is lost.
    Type: Application
    Filed: April 8, 2011
    Publication date: August 1, 2013
    Inventors: Tadayoshi Kohno, Roxana Geambasu, Henry Levy, Steven Gribble
  • Publication number: 20130014259
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Application
    Filed: June 4, 2012
    Publication date: January 10, 2013
    Applicant: University of Washington through its Center for Commercialization
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 8196205
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Grant
    Filed: June 26, 2006
    Date of Patent: June 5, 2012
    Assignee: University of Washington through its Center for Commercialization
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Patent number: 8127029
    Abstract: A user accesses the Internet through a hybrid data communications system architecture in which upstream service is provided via the local loop of the public switched telephone network (PSTN) and downstream service is provided via a cable television (CATV) network. The Cable Modem Data Termination system (CMTS) includes a routing table. Upon detection of a CATV service interruption, the CMTS re-routes IP traffic destined for a destination IP address (IP1) associated with the user to a different IP address, or endpoint, as a function of the routing table. In this instance, the different IP address is associated with equipment that provides downstream IP service to the user via the local loop of the PSTN.
    Type: Grant
    Filed: January 5, 2000
    Date of Patent: February 28, 2012
    Assignee: Alcatel Lucent
    Inventors: Donald Edgar Blahut, James D. Bobeck, Robert William Dalton, Enrique Hernandez-Valencia, Roger Henry Levy, Ronald L. Sharp
  • Patent number: 7340465
    Abstract: As a user is drafting an electronic document (e.g., a word processing document, spreadsheet, etc.), the user may enter a predefined string of characters that represents a placeholder for information which is to be inserted into the document. A computerized system recognizes the predefined string of characters and, in response, automatically opens a messaging window that permits the user to request the information from one or more recipients. The message may include a portion of the electronic document surrounding the predefined string of characters to provide context for the recipients. A recipient can edit the context provided in the message to provide the requested information and transmit the message back to the user. If the user approves the edit made by the recipient, the computerized system may be configured to automatically integrate the edit into the electronic document.
    Type: Grant
    Filed: January 23, 2002
    Date of Patent: March 4, 2008
    Assignee: TH, Inc.
    Inventor: David Henry Levy
  • Publication number: 20070260702
    Abstract: Applications and services are accessed over the Web without requiring any modification to the currently available code for such applications. Virtual machines (VMs) can each be associated with one or more pre-configured and pre-installed software applications and hosted by Web sites. A VM is accessed and run when a user of a client computing device selects a Web object for the VM in a browser program. A plug-in in the browser reads a configuration file for the selected VM from a server and requests a server-side controller daemon to launch the VM on the server. The plug-in then opens a remote desktop connection to the VM, which is displayed as an embedded window in the Web page on the browser program. The user can then interact with and use the VM and its provided application software and services from within the browser program.
    Type: Application
    Filed: September 15, 2006
    Publication date: November 8, 2007
    Applicant: University of Washington
    Inventors: David Richardson, Brian Bershad, Steven Gribble, Henry Levy
  • Publication number: 20070174915
    Abstract: A system analyzes content accessed at a network site to determine whether it is malicious. The system employs a tool able to identify spyware that is piggy-backed on executable files (such as software downloads) and is able to detect “drive-by download” attacks that install software on the victim's computer when a page is rendered by a browser program. The tool uses a virtual machine (VM) to sandbox and analyze potentially malicious content. By installing and running executable files within a clean VM environment, commercial anti-spyware tools can be employed to determine whether a specific executable contains piggy-backed spyware. By visiting a Web page with an unmodified browser inside a clean VM environment, predefined “triggers,” such as the installation of a new library, or the creation of a new process, can be used to determine whether the page mounts a drive-by download attack.
    Type: Application
    Filed: June 26, 2006
    Publication date: July 26, 2007
    Applicant: University of Washington
    Inventors: Steven Gribble, Henry Levy, Alexander Moshchuk, Tanya Bragin
  • Publication number: 20070136579
    Abstract: A Web browsing system using a browser operating system (BOS), which provides a trusted software layer on which Web browsers execute. The BOS runs the client-side component of each Web application (e.g., on-line banking, and Web mail) in its own virtual machine, which provides strong isolation between Web services and the user's local resources. Web publishers can thus limit the scope of their Web applications by specifying the URLs and other resources that their browsers are allowed to access, which limits the harm that can be caused by a compromised browser. Web applications are treated as first-class objects that users explicitly install and manage, giving them explicit knowledge about and control over downloaded content and code. An initial embodiment implemented using Linux and the Xen virtual machine monitor has been shown to prevent or contain about 87% of the vulnerabilities that have been identified in a conventional web browser environment.
    Type: Application
    Filed: December 9, 2005
    Publication date: June 14, 2007
    Applicant: University of Washington
    Inventors: Henry Levy, Steven Gribble, Jacob Hansen, Richard Cox
  • Publication number: 20060242402
    Abstract: A solution to the problem of maintaining application integrity when device drivers fail. This solution employs a new mechanism, the shadow driver, which is an operating system (OS) kernel agent that monitors communication between the OS kernel and the device driver it “shadows.” When a device driver error occurs, the shadow driver acts in place of the failed device driver, intercepting and responding to calls from the OS kernel and the device driver during cleanup, unloading, reloading, and re-initialization of the failed device driver. Applications and the OS kernel are thus isolated from the failure. An initial embodiment was developed for use with the Linux™ OS and was tested with a dozen device drivers. Results demonstrate that shadow drivers successfully mask device driver failures from applications, impose minimal performance overhead, require no changes to existing applications and device drivers, and can be implemented with relatively little code.
    Type: Application
    Filed: April 6, 2006
    Publication date: October 26, 2006
    Applicant: University of Washington
    Inventors: Michael Swift, Brian Bershad, Henry Levy
  • Publication number: 20040039731
    Abstract: A method for integrating a written communication means with a document generation means including the steps of: typing a predefined string of characters, by a user, into a document; recognizing said predefined string with a computer algorithm that opens a messaging window; entering a query from said user into said message window regarding unknown information intended to be located at the location of said predefined string; sending said query to a third party; receiving a response to said query; reading said response by said user for the purpose of said user accepting, or rejecting said response; transposing said predefined string with a portion of said response in the event said response was accepted, not transposing said predefined string with a portion of said response in the event said response is rejected. Another embodiment further includes the purpose of modifying said response including transposition of a modified response with a predefined character string.
    Type: Application
    Filed: January 23, 2002
    Publication date: February 26, 2004
    Inventor: David Henry Levy
  • Patent number: 6065061
    Abstract: A user accesses the Internet through a hybrid data communications system architecture in which upstream service is provided via the local loop of the public switched telephone network (PSTN) and downstream service is provided via a cable television (CATV) network. The Cable Modem Data Termination system (CMTS) includes a routing table. Upon detection of a CATV service interruption, the CMTS re-routes IP traffic destined for a destination IP address (IP1) associated with the user to a different IP address, or endpoint, as a function of the routing table. In this instance, the different IP address is associated with equipment that provides downstream IP service to the user via the local loop of the PSTN.
    Type: Grant
    Filed: December 16, 1997
    Date of Patent: May 16, 2000
    Assignee: Lucent Technologies Inc.
    Inventors: Donald Edgar Blahut, James D. Bobeck, Robert William Dalton, Enrique Hernandez-Valencia, Roger Henry Levy, Ronald L. Sharp
  • Patent number: 5673028
    Abstract: An electronic component failure indicator for clearly visably indicating on the surface of an electronic component to be tested a self sustaining indication of the functional operational status of the component. It is used for easily locating and identifying the exact used electronic component that has failed while it is still in a circuit and also later after it is removed from a circuit without the need of test equipment and electrical power. It includes an electronic testing circuit which continually monitors one or more parameters of the electronic component other than temperature. Upon a determination that one or more parameters has deviated from a normal condition, the test circuit generates an appropriate signal. This in turn causes a visable change in an indicator that is visable on the surface of the electronic component being monitored. In some embodiments, this may constitute a color change of the indicator, and in other embodiments, it may cause a bending or movement of the indicator.
    Type: Grant
    Filed: January 7, 1993
    Date of Patent: September 30, 1997
    Inventor: Henry A. Levy
  • Patent number: 5039365
    Abstract: A method of encapsulating and providing barrier containment for asbestos which forms an integral part of existing building structures includes applying an encapsulating coating comprising a water soluble polyvinyl acetate emulsion to the exterior surface of the structure. The encapsulating coating is dried to permit maximum penetration and encapsulation prior to performing subsequent steps which may disturb the asbestos fibers in the surface of the building structure. A primer coating comprising a stronger formulation of polyvinyl acetate emulsion is applied to the structure surface. An adhesive coating comprising the stronger formulation of the polyvinyl acetate emulsion is applied to the gypsum side of a sheet of a surface covering product that comprises a substantially dry, semi-hydrated gypsum. The sheet of gypsum product is applied to the surface of the structure by contacting the primer and adhesive coatings with one another.
    Type: Grant
    Filed: September 14, 1989
    Date of Patent: August 13, 1991
    Assignee: Wall & Floor Treatments, Inc.
    Inventors: William W. Rutledge, Sr., Henry Levy, John L. Cousins
  • Patent number: 4583957
    Abstract: The pneumatically-operated robotic toy includes an internal bellows or air pump which forces pressurized air to flow from the internal air pump or bellows through passageways into hollow arms of the robot. Inasmuch as the arms of the robot include bellows, this flow of air causes the arms to move from an open to a closed position, or vice versa. Air pressure holding joints are provided to permit several degrees of freedom of movement. Alternatively, the internal bellows may be positioned in the head of the robot, and movement of the head will cause the arms to move up and down. A flexible rotatable suction cup base may be provided. A second internal bellows may be provided, either in the torso or in the head, for activation of the suction cup base of the robotic toy.
    Type: Grant
    Filed: March 8, 1984
    Date of Patent: April 22, 1986
    Inventor: Henry A. Levy