Patents by Inventor James Fahrny
James Fahrny has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240048573Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.Type: ApplicationFiled: October 18, 2023Publication date: February 8, 2024Inventors: James Fahrny, Kyong Park
-
Patent number: 11831659Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.Type: GrantFiled: August 12, 2020Date of Patent: November 28, 2023Assignee: Comcast Cable Communications, LLCInventors: James Fahrny, Kyong Park
-
Publication number: 20220158985Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.Type: ApplicationFiled: November 29, 2021Publication date: May 19, 2022Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Patent number: 11218459Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.Type: GrantFiled: January 23, 2020Date of Patent: January 4, 2022Assignee: Comcast Cable Communications, LLCInventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Publication number: 20210067526Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.Type: ApplicationFiled: August 12, 2020Publication date: March 4, 2021Inventors: James Fahrny, Kyong Park
-
Patent number: 10771478Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.Type: GrantFiled: February 18, 2016Date of Patent: September 8, 2020Assignee: Comcast Cable Communications, LLCInventors: James Fahrny, Kyong Park
-
Publication number: 20200228511Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.Type: ApplicationFiled: January 23, 2020Publication date: July 16, 2020Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Patent number: 10587593Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.Type: GrantFiled: March 5, 2018Date of Patent: March 10, 2020Assignee: Comcast Cable Communications, LLCInventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Publication number: 20190020639Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.Type: ApplicationFiled: October 1, 2018Publication date: January 17, 2019Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Patent number: 10003604Abstract: Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two security devices bind to establish an initial trust so that security information can be exchanged. Subsequently, trust is refreshed to verify the source of a message is valid. In an embodiment, the security devices may comprise a security processor and a system on a chip (SoC) in a downloadable conditional access system. Trust may be refreshed by a security device inserting authentication information in a message to another security device, where authentication information may assume different forms, including a digital signature (asymmetric key) or a hash message authentication code (HMAC). Trust may also be refreshed by extracting header information from the message, determining state information from at least one parameter contained in the header information, and acting on message content only when the state information is valid.Type: GrantFiled: January 27, 2016Date of Patent: June 19, 2018Assignee: Comcast Cable Communications, LLCInventors: James Fahrny, Nancy Davoust
-
Patent number: 9948623Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.Type: GrantFiled: February 21, 2014Date of Patent: April 17, 2018Assignee: Comcast Cable Communications, LLCInventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Publication number: 20170244729Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.Type: ApplicationFiled: February 18, 2016Publication date: August 24, 2017Inventors: James Fahrny, Kyong Park
-
Publication number: 20160323294Abstract: Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two security devices bind to establish an initial trust so that security information can be exchanged. Subsequently, trust is refreshed to verify the source of a message is valid. In an embodiment, the security devices may comprise a security processor and a system on a chip (SoC) in a downloadable conditional access system. Trust may be refreshed by a security device inserting authentication information in a message to another security device, where authentication information may assume different forms, including a digital signature (asymmetric key) or a hash message authentication code (HMAC). Trust may also be refreshed by extracting header information from the message, determining state information from at least one parameter contained in the header information, and acting on message content only when the state information is valid.Type: ApplicationFiled: January 27, 2016Publication date: November 3, 2016Inventors: James Fahrny, Nancy Davoust
-
Publication number: 20140289521Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.Type: ApplicationFiled: February 21, 2014Publication date: September 25, 2014Applicant: COMCAST CABLE COMMUNICATIONS, LLCInventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Patent number: 8713314Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.Type: GrantFiled: August 30, 2011Date of Patent: April 29, 2014Assignee: Comcast Cable Communications, LLCInventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Patent number: 8505064Abstract: A method and system of supporting operation of customer equipment in systems having at least a portion of their signals being transported according to standards which are not supported by the customer equipment.Type: GrantFiled: January 31, 2005Date of Patent: August 6, 2013Assignee: NGNA, LLCInventors: John G Hildebrand, Francisco Gonzalez, James Fahrny, Joshua Seiden
-
Publication number: 20130054967Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.Type: ApplicationFiled: August 30, 2011Publication date: February 28, 2013Applicant: COMCAST CABLE COMMUNICATIONS, LLCInventors: Nancy Davoust, James Fahrny, Kevin Taylor
-
Patent number: 8307199Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.Type: GrantFiled: March 4, 2011Date of Patent: November 6, 2012Assignee: Comcast Cable Holdings, LLCInventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III
-
Publication number: 20110191572Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.Type: ApplicationFiled: March 4, 2011Publication date: August 4, 2011Inventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III
-
Patent number: 7934083Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.Type: GrantFiled: September 14, 2007Date of Patent: April 26, 2011Inventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III