Patents by Inventor James Fahrny

James Fahrny has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240048573
    Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.
    Type: Application
    Filed: October 18, 2023
    Publication date: February 8, 2024
    Inventors: James Fahrny, Kyong Park
  • Patent number: 11831659
    Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.
    Type: Grant
    Filed: August 12, 2020
    Date of Patent: November 28, 2023
    Assignee: Comcast Cable Communications, LLC
    Inventors: James Fahrny, Kyong Park
  • Publication number: 20220158985
    Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.
    Type: Application
    Filed: November 29, 2021
    Publication date: May 19, 2022
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Patent number: 11218459
    Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: January 4, 2022
    Assignee: Comcast Cable Communications, LLC
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Publication number: 20210067526
    Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.
    Type: Application
    Filed: August 12, 2020
    Publication date: March 4, 2021
    Inventors: James Fahrny, Kyong Park
  • Patent number: 10771478
    Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: September 8, 2020
    Assignee: Comcast Cable Communications, LLC
    Inventors: James Fahrny, Kyong Park
  • Publication number: 20200228511
    Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 16, 2020
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Patent number: 10587593
    Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: March 10, 2020
    Assignee: Comcast Cable Communications, LLC
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Publication number: 20190020639
    Abstract: Methods, systems, and apparatuses are described for secure communications. One of a plurality of keys with respective key types may be used to establish a secure communication between computing devices. Verification of an establishment of the secure communication may be sent to a trusted computing device.
    Type: Application
    Filed: October 1, 2018
    Publication date: January 17, 2019
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Patent number: 10003604
    Abstract: Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two security devices bind to establish an initial trust so that security information can be exchanged. Subsequently, trust is refreshed to verify the source of a message is valid. In an embodiment, the security devices may comprise a security processor and a system on a chip (SoC) in a downloadable conditional access system. Trust may be refreshed by a security device inserting authentication information in a message to another security device, where authentication information may assume different forms, including a digital signature (asymmetric key) or a hash message authentication code (HMAC). Trust may also be refreshed by extracting header information from the message, determining state information from at least one parameter contained in the header information, and acting on message content only when the state information is valid.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: June 19, 2018
    Assignee: Comcast Cable Communications, LLC
    Inventors: James Fahrny, Nancy Davoust
  • Patent number: 9948623
    Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.
    Type: Grant
    Filed: February 21, 2014
    Date of Patent: April 17, 2018
    Assignee: Comcast Cable Communications, LLC
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Publication number: 20170244729
    Abstract: Methods and apparatus for real-time security monitoring on a computing device are presented. A system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. The privileges may be defined in a privileged operating system level that controls root access to an operating system. In response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. In response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.
    Type: Application
    Filed: February 18, 2016
    Publication date: August 24, 2017
    Inventors: James Fahrny, Kyong Park
  • Publication number: 20160323294
    Abstract: Apparatuses, computer readable media, and methods establishing and maintaining trust between security devices for distributing media content are provided. Two security devices bind to establish an initial trust so that security information can be exchanged. Subsequently, trust is refreshed to verify the source of a message is valid. In an embodiment, the security devices may comprise a security processor and a system on a chip (SoC) in a downloadable conditional access system. Trust may be refreshed by a security device inserting authentication information in a message to another security device, where authentication information may assume different forms, including a digital signature (asymmetric key) or a hash message authentication code (HMAC). Trust may also be refreshed by extracting header information from the message, determining state information from at least one parameter contained in the header information, and acting on message content only when the state information is valid.
    Type: Application
    Filed: January 27, 2016
    Publication date: November 3, 2016
    Inventors: James Fahrny, Nancy Davoust
  • Publication number: 20140289521
    Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.
    Type: Application
    Filed: February 21, 2014
    Publication date: September 25, 2014
    Applicant: COMCAST CABLE COMMUNICATIONS, LLC
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Patent number: 8713314
    Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.
    Type: Grant
    Filed: August 30, 2011
    Date of Patent: April 29, 2014
    Assignee: Comcast Cable Communications, LLC
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Patent number: 8505064
    Abstract: A method and system of supporting operation of customer equipment in systems having at least a portion of their signals being transported according to standards which are not supported by the customer equipment.
    Type: Grant
    Filed: January 31, 2005
    Date of Patent: August 6, 2013
    Assignee: NGNA, LLC
    Inventors: John G Hildebrand, Francisco Gonzalez, James Fahrny, Joshua Seiden
  • Publication number: 20130054967
    Abstract: A secure communication system or method are disclosed that may employ a constant level of trust between participants and a security management entity. As part of the constant level of trust, a communication policy may cause participants to request key validation every time the participant wishes to take an action that requires use of a key. In this manner, the participant may regularly communicate with the security management, and this regular communication can be further used to implement key renewal and/or rollover procedures.
    Type: Application
    Filed: August 30, 2011
    Publication date: February 28, 2013
    Applicant: COMCAST CABLE COMMUNICATIONS, LLC
    Inventors: Nancy Davoust, James Fahrny, Kevin Taylor
  • Patent number: 8307199
    Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: November 6, 2012
    Assignee: Comcast Cable Holdings, LLC
    Inventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III
  • Publication number: 20110191572
    Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.
    Type: Application
    Filed: March 4, 2011
    Publication date: August 4, 2011
    Inventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III
  • Patent number: 7934083
    Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.
    Type: Grant
    Filed: September 14, 2007
    Date of Patent: April 26, 2011
    Inventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III