Patents Issued in September 30, 2014
  • Patent number: 8850171
    Abstract: When a temporary data storage unit 104 stores a value of “3” and an iteration number of “3”, and a data updating management unit 103 receives a value of “2” in combination with an iteration number of “2”, a data updating management unit 103 determines not to overwrite information in the temporary data storage unit 104 with the received information by comparing the relative sizes of the iteration numbers. Subsequently, upon receiving information from the multithreaded execution unit 102 indicating that parallel execution is complete, the data updating management unit 103 copies the value of “3”, stored by the temporary data storage unit 104, into the final data storage unit 105.
    Type: Grant
    Filed: June 3, 2011
    Date of Patent: September 30, 2014
    Assignee: Panasonic Corporation
    Inventor: Kyoko Ueda
  • Patent number: 8850172
    Abstract: Techniques for conducting an automated analysis of operations carried out during the critical path for a usage scenario and suggesting ways in which the configuration of the computing device could be changed to affect performance of the computing device. Computing devices can be operated in a variety of usage scenarios and users may notice the performance of a computing device in certain usage scenarios more particularly. Critical path analysis of operations conducted in these usage scenarios can be used to identify a critical path of the usage scenario, from which changes that could be made to the computing device to affect performance could be identified. Once the changes that could be made are identified, suggestions can be made to the user, such that a user is able to make changes to the configuration to affect performance when the user has little knowledge about how to improve configurations.
    Type: Grant
    Filed: November 15, 2010
    Date of Patent: September 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Aaron Dietrich, Sylvain Goyette, Van Stephen Lanning
  • Patent number: 8850173
    Abstract: A machine and method to manage BIOS images.
    Type: Grant
    Filed: April 29, 2009
    Date of Patent: September 30, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: John Landry, James Luke Mondshine
  • Patent number: 8850174
    Abstract: In one embodiment, a method to boot up a server using a target storage device over a network is provided. In this embodiment, the method includes installing an operating system onto a server by storing the operating system in the target storage device located on the network. The location of the target device is designated by an internet protocol (IP) address. The method also includes using data block transfers in conjunction with the IP address to access the operating system on the target storage device.
    Type: Grant
    Filed: May 19, 2004
    Date of Patent: September 30, 2014
    Assignee: PMC-Sierra US, Inc.
    Inventors: Fadi A. Mahmoud, Victor Raj
  • Patent number: 8850175
    Abstract: A computer apparatus and a resetting method for a real time clock (RTC) of the computer apparatus are provided. The resetting method for the RTC includes: generating a judging result by determining whether the computer apparatus is in an S5 state and determining whether a plurality of pre-determined keys are simultaneously pressed; pulling down a resume reset signal according to the judging result and correspondingly pulling down an operating voltage; pulling down an S5 enabling signal after pulling down the operating voltage for a pre-determined delay time; generating an RTC reset signal for resetting the RTC after pulling down the S5 enabling signal is pulled down.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: September 30, 2014
    Assignee: Wistron Corporation
    Inventors: Chun-Lin Cheng, Yun-Chieh Sung, Kai-Chieh Hsu, Yu-Wei Tsao
  • Patent number: 8850176
    Abstract: A speed-up booting module of an electronic device includes a first heat pipe with two ends connected to a first component and a second component respectively, and the first heat pipe including a first working fluid, wherein when a booting process is performed at a first environmental temperature, the heat from the first component in operation is transferred to the second component so that a temperature of the second component reaches an operating temperature; and a second heat pipe with two ends connected to the first component and a third component respectively, and the second heat pipe including a second working fluid, a boiling point of the second working fluid is higher than the boiling point of the first working fluid; wherein at a second environmental temperature, a temperature of the second component reaches the boiling point, the heat from the first component is transferred to the second component.
    Type: Grant
    Filed: July 5, 2012
    Date of Patent: September 30, 2014
    Assignee: Getac Technology Corporation
    Inventor: Chi-Jung Wu
  • Patent number: 8850177
    Abstract: A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: September 30, 2014
    Assignee: OpenPeak Inc.
    Inventors: John R. Brown, John Irwin Perret-Gentil
  • Patent number: 8850178
    Abstract: A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: September 30, 2014
    Assignee: Intel Corporation
    Inventors: Stephen Anthony Fischer, Varghese George, Sanjeev Jahagirdar, Stephen H. Gunther
  • Patent number: 8850179
    Abstract: Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar Type 1 KIV device for decryption. Thus, sensitive, encrypted data is made to appear as if it were any other commercial network data, cloaking it in the vast and busy world of the Internet. The present invention is embodied in a system that provides secure Voice-Over-IP (VoIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet.
    Type: Grant
    Filed: September 14, 2007
    Date of Patent: September 30, 2014
    Assignee: TeleCommunication Systems, Inc.
    Inventors: Steve Anspach, Salazar Luke, Brian Heyliger, Greg Kasson, Jeff West
  • Patent number: 8850180
    Abstract: The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The system is designed so that a cloud resource and its middleware access points are protected in transferring data among themselves and end users using a system designed to spread the data and then reassemble the data.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: September 30, 2014
    Assignee: Empire Technology Development, LLC
    Inventors: Gene Fein, Edward Merritt
  • Patent number: 8850181
    Abstract: A method of accessing content on a secure terminal is described. The method comprises: capturing an image of a visual code presented on a display of a secure terminal. The method then involves decoding the visual code to ascertain (i) a set of connection parameters and (ii) a unique identifier. The set of connection parameters are used to establish a connection with the secure terminal. The method also comprises receiving the content from the secure terminal via the established connection in response to transmission of the unique identifier.
    Type: Grant
    Filed: November 16, 2010
    Date of Patent: September 30, 2014
    Assignee: NCR Corporation
    Inventors: Jonathan S. Black, Jim Henderson
  • Patent number: 8850182
    Abstract: This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface programmed to receive control instructions that control capture of protocol data from a network. A capture module can be programmed to receive decoded protocol data from a device application responsive to the control instructions and to synthesize frames of output capture data in that includes at least the decoded protocol data.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 30, 2014
    Assignee: Shoretel, Inc.
    Inventors: Kent Fritz, Jason Harper, David Drell, Prabjeet Singh, Palani Selvam Thangavelu
  • Patent number: 8850183
    Abstract: The present invention provides an interconnect device that connects a source device to a destination device, and allows the source device's non-compliant rights management (RM) interface to deliver media content with little or no restriction to the destination device's compliant RM interface.
    Type: Grant
    Filed: January 16, 2012
    Date of Patent: September 30, 2014
    Assignee: Qurio Holdings, Inc.
    Inventors: Gregory Morgan Evans, Cheryl Adams
  • Patent number: 8850184
    Abstract: A transmission management apparatus includes a receiving unit that receives, from a first transmission terminal 10, a communication request for a communication with a second transmission terminal 10; a fists storage unit that stores therein terminal identification information for identifying the transmission terminals 10 and relay device identification information for identifying a relay device 30 that relays data to be transmitted and received by the first transmission terminal 10, in an associated manner; a relay device selecting unit that selects the relay device 30 associated with the terminal identification information of the first transmission terminal 10 in the first storage unit; a second storage unit that stores therein the relay device identification information and encryption necessity information in an associated manner; and an encryption necessity determining unit that determines whether encryption is needed based on the encryption necessity information associated, in the second storage unit, wit
    Type: Grant
    Filed: October 18, 2012
    Date of Patent: September 30, 2014
    Assignee: Ricoh Company, Limited
    Inventor: Takuya Imai
  • Patent number: 8850185
    Abstract: Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer also uploads the stored public key certificates associated with a domain to a second computer each time a connection is established with the domain. The second computer receives the public key certificates from the first computer. The second computer then determines whether any of the public key certificates provided by the first computer are fraudulent certificates by comparing the received certificates to known valid certificates. If the second computer determines that the first computer has received one or more fraudulent certificates, the second computer may cause action to be taken with regard to the fraudulent certificates.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: September 30, 2014
    Assignee: Amazon Technologies, Inc.
    Inventor: Charles P. Vaughn
  • Patent number: 8850186
    Abstract: An information processing apparatus that communicates using an electronic certificate is provided. When identification information is configured that identifies the information processing apparatus on a network, the configured identification information is stored in a storage unit. A request for issue of an electronic certificate containing the identification information stored in the storage unit is issued to a certificate authority. Once the request for issue is issued, a determination is made as to whether or not the identification information contained in the request for issue matches the identification information stored in the storage unit prior to obtaining the electronic certificate that is issued by the certificate authority in response to the request for issue. If it is determined that a mismatch exists, the user is notified to that effect.
    Type: Grant
    Filed: January 5, 2007
    Date of Patent: September 30, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventor: Hisayuki Yamauchi
  • Patent number: 8850187
    Abstract: Provisioning a device with a certificate is contemplated. The certificate may be used to verify whether the device or a user of the device is authorized to access electronic content, services, and signaling. The certificate may be provisioned in relation to the device having successfully completed a two-factor authentication process so that an entity providing the certificate need not have to repeat the two-factor authentication process.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: September 30, 2014
    Assignee: Cable Television Laboratories, Inc.
    Inventor: Stuart A. Hoggan
  • Patent number: 8850188
    Abstract: A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device. Selected certificates may be downloaded to the computing device for storage, and the downloaded certificates are tracked by the data server. This facilitates the automatic updating of the status of one or more certificates stored on the computing device by the data server, in which updated status data is pushed from the data server to the computing device.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: September 30, 2014
    Assignee: BlackBerry Limited
    Inventors: Neil P. Adams, Herbert A. Little, Michael K. Brown, Michael S. Brown, Michael G. Kirkup
  • Patent number: 8850189
    Abstract: Various embodiments enable so-called extended data to be added to a signed digital certificate without having a private key of a Certification Authority available. In at least some embodiments, a request to add extended data to a digital certificate generated by a certificate authority is received from a client device. The digital certificate includes a signed first portion, and an unsigned second portion that includes reserved empty spaces that are reserved for the extended data. The extended data is added to the unsigned second portion. the extended data includes a client ID associated with the client device. The unsigned portion of the digital certificate is signed after the extended data is added.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: September 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Yu Lin Sie, Kedarnath A. Dubhashi, Anand D. Paka
  • Patent number: 8850190
    Abstract: The present invention provides a secret communication method, apparatus and system. The method comprises: 1) determining a neighboring encryption switching equipment shared by a first user terminal and a second user terminal, wherein the first user terminal and the second user terminal are neighboring user terminals (1); 2) establishing, by the neighboring encryption switching equipment, an inter-station key for communication between the first user terminal and the second terminal (2); 3) performing data secret communication between the first user terminal and the second terminal by using the inter-station key (3). With the present invention, the neighboring user terminals needing to perform the secret communication can establish the inter-station key without performing identity authentication with each other, and can perform the secret communication with the inter-station key, and thereby the network load is reduced.
    Type: Grant
    Filed: April 27, 2011
    Date of Patent: September 30, 2014
    Assignee: China IWNCOMM Co., Ltd.
    Inventors: Qin Li, Jun Cao, Manxia Tie, Zhenhai Huang, Zhiqiang Du
  • Patent number: 8850191
    Abstract: Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster.
    Type: Grant
    Filed: April 28, 2011
    Date of Patent: September 30, 2014
    Assignee: NetApp, Inc.
    Inventors: Craig Fulmer Everhart, David Slik
  • Patent number: 8850192
    Abstract: An apparatus and method for determining contents information corresponding to a Rights Object (RO) by transmitting information on contents together when the RO is moved from a mobile device to a memory card or a smart card or when the RO is moved from the memory card or the smart card to the mobile device are provided. The apparatus includes a meta information manager for determining information on contents corresponding to the RO when the RO is moved, and for generating meta information containing the determined contents information, and a controller for providing control to transmit the RO and the meta information generated by the meta information manager to a portable storage device. Accordingly, the conventional problem can be solved in which information on contents cannot be determined by using a Contents IDentifier (CID) if the RO does not exist together with the contents.
    Type: Grant
    Filed: November 26, 2012
    Date of Patent: September 30, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Seong Choi, Jung-Hun Park, Yun-Sang Oh
  • Patent number: 8850193
    Abstract: Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by authenticating a cryptographic hash value of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that is maintained by a trusted service provider and that contains cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code and (ii) a local whitelist database containing cryptographic hash values of at least a subset of the approved code modules. The activity relating to the code module is allowed when the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the multi-level whitelist.
    Type: Grant
    Filed: January 14, 2014
    Date of Patent: September 30, 2014
    Assignee: Fortinet, Inc.
    Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
  • Patent number: 8850194
    Abstract: A system and methods for providing a supplicant access to a communications network are disclosed. An authenticator receives an authentication request at an authenticator (210) from the supplicant. A state is created based on the authentication request at the authenticator (210). The authentication request is relayed towards a prime authenticator (215) where the prime authenticator is connected to an authentication server. Finally, the authenticator (215) receives authentication information from the prime authenticator and fulfills the authentication request using the authentication information.
    Type: Grant
    Filed: April 19, 2005
    Date of Patent: September 30, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Anthony R. Metke, Robert D. LoGalbo
  • Patent number: 8850195
    Abstract: Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.
    Type: Grant
    Filed: July 23, 2008
    Date of Patent: September 30, 2014
    Assignee: Intertrust Technologies Corporation
    Inventors: Gilles Boccon-Gibod, Julien Boeuf, Gary F. Ellison, David P. Maher
  • Patent number: 8850196
    Abstract: Authentication methods are used to authenticate, a device1 having an ESN1 (electronic serial number), a device2 having an ESN2, and/or a user of the devices. In one implementation, device1 receives the ESN2 in a near-field signal; derives an authentication result as a function of the ESN1 and ESN2; and sends the authentication result to an authenticator device to use in completing authentication. Authentication is confirmed when the device1 authentication result matches an authentication result independently generated by the authenticator device, which is provisioned with the ESN1 and ESN2. In a second implementation, device1 generates a RAND1 (random number) and sends the RAND1 to device2 over a near-filed link. An authenticator device confirms authentication upon receiving the same RAND1 from both device1 and device2.
    Type: Grant
    Filed: March 29, 2010
    Date of Patent: September 30, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Alejandro G. Blanco, George S. Hanna, John B. Preston, Mark Boerger
  • Patent number: 8850197
    Abstract: A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical network unit (ONU) via an ONU management control interface (OMCI) channel, wherein the attributes provide security features for the ONU and an optical line terminal (OLT). Also included is an apparatus comprising an ONU configured to couple to an OLT and comprising an OMCI ME, wherein the OMCI ME comprises a plurality of attributes that support a plurality of security features for transmissions between the ONU and the OLT, and wherein the attributes are communicated via an OMCI channel between the ONU and the OLT and provide the security features for the ONU and the OLT.
    Type: Grant
    Filed: July 27, 2010
    Date of Patent: September 30, 2014
    Assignee: Futurewei Technologies, Inc.
    Inventor: Frank J. Effenberger
  • Patent number: 8850198
    Abstract: A method for validating a road traffic control transaction. The method includes: storing a cryptographic key assigned to a transaction receiver, in the transaction receiver; recording an image of a vehicle; reading an identification of the vehicle in the recorded image by OCR and generating a control transaction thereof in the control station; generating a random key and encrypting the recorded image into authentication data with the random key and the cryptographic key in the control station; transmitting the recorded image, the control transaction, the random key and the authentication data to the transaction receiver; in the transaction receiver, encrypting the received recorded image into nominal authentication data with the received random key and the stored cryptographic key; and comparing the received authentication data with the nominal authentication data. The received control transaction is then validated when the received authentication data and the nominal authentication data are identical.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: September 30, 2014
    Assignee: Kapsch TrafficCom AG
    Inventor: Albert Hafenscher
  • Patent number: 8850199
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: September 30, 2014
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Patent number: 8850200
    Abstract: A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a packet-based network, such as the public Internet or an intranet. Communications are routed between private ports of the clients through the trusted intermediary server, with the private key transfer supported by a second type of communication medium. Although the trusted intermediary server negotiates the connection and is involved in the process, the communicants can perform their own key agreement and authentication for protecting data routed through the system.
    Type: Grant
    Filed: June 20, 2012
    Date of Patent: September 30, 2014
    Assignee: Synectic Design, LLC
    Inventor: Michael J. Horgan
  • Patent number: 8850201
    Abstract: An apparatus for encrypting content to be played on another device is provided. The apparatus includes a processor and memory that includes a set of instructions. The set of instructions is configured to cause the processor to receive a selection of content from a user accessing the apparatus, and determine whether the user is authorized to receive the content. The set of instructions is further configured to cause the processor to transfer content along with an encrypted key associated with the user when the user is authorized to receive the selected content.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: September 30, 2014
    Assignee: Kiora, Inc.
    Inventors: Ganesh Janyavula, Renganathan Veerasubramanian
  • Patent number: 8850202
    Abstract: A system and method for authenticating a peer device onto a network using Extensible Authentication Protocol (EAP). The key lifetime associated with the keying material generated in the peer device and the authentication server is communicated from the authenticator to the peer device within the EAP Success message. The peer device, having been provided with the key lifetime, can anticipate the termination of its authenticated session and initiate re-authentication prior to expiry of the key lifetime.
    Type: Grant
    Filed: December 3, 2012
    Date of Patent: September 30, 2014
    Assignee: BlackBerry Limited
    Inventor: Leonardo José Silva Salomone
  • Patent number: 8850203
    Abstract: Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a method for performing an authenticated key agreement protocol, in accordance with a multimedia communication system, between a first party and a second party comprises, at the first party, the following steps. Note that encryption/decryption is performed in accordance with an identity based encryption operation. At least one private key for the first party is obtained from a key service. A first message comprising an encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party, and the first message having been encrypted using a public key of the second party.
    Type: Grant
    Filed: August 28, 2009
    Date of Patent: September 30, 2014
    Assignee: Alcatel Lucent
    Inventors: Ganapathy S. Sundaram, Violeta Cakulev
  • Patent number: 8850204
    Abstract: A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: September 30, 2014
    Assignee: Intel Corporation
    Inventors: Robert Stacey, Jesse Walker, Emily H. Qi
  • Patent number: 8850205
    Abstract: A method of and an authentication server for distributing a key are disclosed. According to an embodiment of the present invention, the method of distributing a key, which is distributed by an authentication server connected with wireless terminals through a communication network, for encrypting and decrypting data in accordance with providing a service can include: obtaining characteristic information by decrypting encrypted characteristic information that has been received from each of n number of wireless terminals; generating a random key; generating a group key used for encrypting and decrypting data in accordance with providing a service; and generating a distribution key by using the random key, the group key and the characteristic information, and transmitting the distribution key to each wireless terminal.
    Type: Grant
    Filed: December 1, 2008
    Date of Patent: September 30, 2014
    Assignee: Sungyunkwan University Foundation for Corporate Collaboration
    Inventors: Hyoung-Kee Choi, Jung-Yoon Kim, Do-Hyun Kwon, Eun-Young Lee, In-Hwan Kim, Se-Hwa Song
  • Patent number: 8850206
    Abstract: In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: September 30, 2014
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula
  • Patent number: 8850207
    Abstract: A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the first controller identification information. A decryptor decrypts the encrypted medium device key using the controller unique key to obtain a medium device key. An authentication/key exchange process unit performs authentication/key exchange process with the host device through an interface unit using the medium device key, the medium device key certificate and the second controller identification information to establish a secure channel.
    Type: Grant
    Filed: March 22, 2012
    Date of Patent: September 30, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Taku Kato, Yuji Nagai, Tatsuyuki Matsushita
  • Patent number: 8850208
    Abstract: Embodiments relate to a method for generating a set of authentication certificates by a set of certificate authority devices. The method includes receiving, by the set of certificate authority devices, a set of certificate requests from a user device. The method includes generating, by the set of certificate authority devices, a set of crosschecked certificates, each crosschecked certificate of the set of crosschecked certificates being configured to cryptographically verify the remaining crosschecked certificate of the set of crosschecked certificates. The method includes transmitting, by the set of certificate authority devices, the set of crosschecked certificates to the user device, the set of crosschecked certificates configured to be utilized by the user device in establishing a secured communication channel over a network between the user device and a client device.
    Type: Grant
    Filed: June 24, 2011
    Date of Patent: September 30, 2014
    Assignee: EMC Corporation
    Inventor: Sean F. Parkinson
  • Patent number: 8850209
    Abstract: In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the database schema only when the object of the database schema is verified to have a valid digital signature associated with the trusted entity. In another embodiment, an object in a database schema may be verified as having a digital signature associated with at least one trusted entity. An application may be permitted access to the object of the database schema only when the digital signature for the object is verified to be associated with the at least one trusted entity.
    Type: Grant
    Filed: September 12, 2006
    Date of Patent: September 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Tanmoy Dutta, Raul Garcia, Steven Richard Gott, Ruslan Pavlovich Ovechkin, Roger Lynn Wolter
  • Patent number: 8850210
    Abstract: An authentication system, including a service use device 1 which presents blurred information obtained by blurring certification information desired to be certified, service providing devices 3a to 3c which verify the validity of blurred information presented by the service use device 1, and an authentication device 2 which supports the service use device 1 to issue valid blurred information. The authentication device 2 adds a digital signature to information including certification information and blurred information, and generates authentication information including the obtained digital signature, certification information, and blurred information (S2). The service use device 1 generates, based on the authentication information generated in the authentication device 2, blurred authentication information including blurred information selected according to an instruction from a user, instruction information representing the instruction, and a digital signature (S4).
    Type: Grant
    Filed: June 2, 2006
    Date of Patent: September 30, 2014
    Assignee: Panasonic Corporation
    Inventors: Kaoru Yokota, Natsume Matsuzaki, Masao Nonaka
  • Patent number: 8850211
    Abstract: Methods and computing devices enable code and/or data software on computer devices to be verified using methods and signatures which can be updated by a signing server after distribution. Updated verification methods and signatures may be provided in a second signature file. When a computing device unpacks an application for execution it may check whether a second signature file is associated with the application file. If not it may connect to a signing server to request a second signature file for the software. The signing server then may request information related to the software sufficient to determine if the software is trustworthy. If determined to be trustworthy, the signing server can send a second signature file to the computer device for use in verifying the software henceforth. The second signature file may include new or modified verification methods and a new signature.
    Type: Grant
    Filed: April 27, 2009
    Date of Patent: September 30, 2014
    Assignee: QUALCOMM Incorporated
    Inventor: Ivan H. McLean
  • Patent number: 8850212
    Abstract: A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers (PCRs) for the device and the current values of the listed PCRs and an integrity value identifying the integrity measurement into a policy register, verify a signature over the integrity value extended into the policy register, and, if verification succeeds, extend a verification key of the trusted platform, plus an indication that it is a verification key, into the policy register, compare the integrity value extended into the policy register with a value stored in the trusted platform, and, if they are the same: extend the stored value, plus an indication that it is a stored value, into the policy register, and extend the integrity measurement in the trusted device if the value in the policy register matches a value stored with the integrity measurement.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: September 30, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Graeme John Proudler, Liqun Chen
  • Patent number: 8850213
    Abstract: A method for verifying an electronic signature is described including determining a residue class given by the signature; determining an integer having the residue class; determining a field element of a finite field such that the field element corresponds to the integer according to a predetermined mapping of the finite field to the set of integers; determining whether the field element fulfills a predetermined criterion and deciding whether the signature is valid based on whether the field element fulfills the predetermined criterion.
    Type: Grant
    Filed: January 29, 2013
    Date of Patent: September 30, 2014
    Assignee: Infineon Technologies AG
    Inventors: Bernd Meyer, Erwin Hess
  • Patent number: 8850214
    Abstract: Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: September 30, 2014
    Assignee: Intertrust Technologies Corporation
    Inventors: Xavier Serret-Avila, Gilles Boccon-Gibod
  • Patent number: 8850215
    Abstract: A computing device which includes an access control mechanism which is used to control access to keys which are used in cryptographic processes. Any application wishing to gain access to a key must first obtain authorization from the access control mechanism. Authorized applications may access keys directly, without having to pass data through the access control mechanism.
    Type: Grant
    Filed: December 16, 2008
    Date of Patent: September 30, 2014
    Assignee: Nokia Corporation
    Inventor: Tim Gover
  • Patent number: 8850216
    Abstract: Establishing trusted communication with a media client application on a client device includes receiving an identifying token originating in a secure messaging session between a messaging server and the client device, and sending an encrypted generated nonce to the messaging server for delivery to the client device. A blob request message is received that includes a decrypted nonce value and identifies the client device, user, and content owner. The blob request message is tested and a blob is conditionally sent to the client device that includes a secret value for accessing an API via which the client device obtains decryption keys for decrypting protected media. Testing includes evaluating whether the decrypted nonce value matches the generated nonce value. The blob request message may include device integrity information to evaluate whether the device has been tampered with, as a further condition to allowing access to the protected media.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: September 30, 2014
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Mikhail Mikhailov, Raj Nair
  • Patent number: 8850217
    Abstract: A method comprises detecting zapping to or from one or more services; determining whether the zapping includes termination of a password-protected service; and sending a trigger message (248, 256, 262) only if the zapping includes termination of a password-protected service (X, Y, Z). In one embodiment, the trigger message is sent to a smartcard (SC). In one embodiment, the password-protected service is password-protected for parental control. In one embodiment, the method further includes requesting a password when the zapping includes zapping to a password-protected service. In one embodiment, the password-protected service is a pincode-protected service.
    Type: Grant
    Filed: August 19, 2009
    Date of Patent: September 30, 2014
    Assignee: Nokia Corporation
    Inventors: Anja Jerichow, Martin Jansky, Kyösti Koivisto, Matti Puputti
  • Patent number: 8850218
    Abstract: A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.
    Type: Grant
    Filed: October 14, 2013
    Date of Patent: September 30, 2014
    Assignee: CA, Inc.
    Inventors: Geoffrey R. Hird, Rammohan Varadarajan
  • Patent number: 8850219
    Abstract: Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token message may include a first security token. The first security token may include a communication interaction identifier that identifies a communication interaction between the client machine and the server and an action request identifier that identifies an action request message capable of being sent from the client machine to the server to request that an action be performed on the server. An action request message including a second security token and transmitted in association with the communication interaction may be received at the server. When it is determined that the first security token matches the second security token, the requested action may be performed.
    Type: Grant
    Filed: January 12, 2011
    Date of Patent: September 30, 2014
    Assignee: salesforce.com, inc.
    Inventors: Peter Dapkus, Alan Vangpat, Nikita Prokopev, Forrest Junod
  • Patent number: 8850220
    Abstract: Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: September 30, 2014
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Mousumi M. Hazra, Selim Aissi, Jasmeet Chhabra