Patents Issued in September 30, 2014
-
Patent number: 8850171Abstract: When a temporary data storage unit 104 stores a value of “3” and an iteration number of “3”, and a data updating management unit 103 receives a value of “2” in combination with an iteration number of “2”, a data updating management unit 103 determines not to overwrite information in the temporary data storage unit 104 with the received information by comparing the relative sizes of the iteration numbers. Subsequently, upon receiving information from the multithreaded execution unit 102 indicating that parallel execution is complete, the data updating management unit 103 copies the value of “3”, stored by the temporary data storage unit 104, into the final data storage unit 105.Type: GrantFiled: June 3, 2011Date of Patent: September 30, 2014Assignee: Panasonic CorporationInventor: Kyoko Ueda
-
Patent number: 8850172Abstract: Techniques for conducting an automated analysis of operations carried out during the critical path for a usage scenario and suggesting ways in which the configuration of the computing device could be changed to affect performance of the computing device. Computing devices can be operated in a variety of usage scenarios and users may notice the performance of a computing device in certain usage scenarios more particularly. Critical path analysis of operations conducted in these usage scenarios can be used to identify a critical path of the usage scenario, from which changes that could be made to the computing device to affect performance could be identified. Once the changes that could be made are identified, suggestions can be made to the user, such that a user is able to make changes to the configuration to affect performance when the user has little knowledge about how to improve configurations.Type: GrantFiled: November 15, 2010Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Aaron Dietrich, Sylvain Goyette, Van Stephen Lanning
-
Patent number: 8850173Abstract: A machine and method to manage BIOS images.Type: GrantFiled: April 29, 2009Date of Patent: September 30, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: John Landry, James Luke Mondshine
-
Patent number: 8850174Abstract: In one embodiment, a method to boot up a server using a target storage device over a network is provided. In this embodiment, the method includes installing an operating system onto a server by storing the operating system in the target storage device located on the network. The location of the target device is designated by an internet protocol (IP) address. The method also includes using data block transfers in conjunction with the IP address to access the operating system on the target storage device.Type: GrantFiled: May 19, 2004Date of Patent: September 30, 2014Assignee: PMC-Sierra US, Inc.Inventors: Fadi A. Mahmoud, Victor Raj
-
Patent number: 8850175Abstract: A computer apparatus and a resetting method for a real time clock (RTC) of the computer apparatus are provided. The resetting method for the RTC includes: generating a judging result by determining whether the computer apparatus is in an S5 state and determining whether a plurality of pre-determined keys are simultaneously pressed; pulling down a resume reset signal according to the judging result and correspondingly pulling down an operating voltage; pulling down an S5 enabling signal after pulling down the operating voltage for a pre-determined delay time; generating an RTC reset signal for resetting the RTC after pulling down the S5 enabling signal is pulled down.Type: GrantFiled: December 15, 2011Date of Patent: September 30, 2014Assignee: Wistron CorporationInventors: Chun-Lin Cheng, Yun-Chieh Sung, Kai-Chieh Hsu, Yu-Wei Tsao
-
Patent number: 8850176Abstract: A speed-up booting module of an electronic device includes a first heat pipe with two ends connected to a first component and a second component respectively, and the first heat pipe including a first working fluid, wherein when a booting process is performed at a first environmental temperature, the heat from the first component in operation is transferred to the second component so that a temperature of the second component reaches an operating temperature; and a second heat pipe with two ends connected to the first component and a third component respectively, and the second heat pipe including a second working fluid, a boiling point of the second working fluid is higher than the boiling point of the first working fluid; wherein at a second environmental temperature, a temperature of the second component reaches the boiling point, the heat from the first component is transferred to the second component.Type: GrantFiled: July 5, 2012Date of Patent: September 30, 2014Assignee: Getac Technology CorporationInventor: Chi-Jung Wu
-
Patent number: 8850177Abstract: A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state.Type: GrantFiled: July 6, 2012Date of Patent: September 30, 2014Assignee: OpenPeak Inc.Inventors: John R. Brown, John Irwin Perret-Gentil
-
Patent number: 8850178Abstract: A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information.Type: GrantFiled: September 14, 2012Date of Patent: September 30, 2014Assignee: Intel CorporationInventors: Stephen Anthony Fischer, Varghese George, Sanjeev Jahagirdar, Stephen H. Gunther
-
Patent number: 8850179Abstract: Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar Type 1 KIV device for decryption. Thus, sensitive, encrypted data is made to appear as if it were any other commercial network data, cloaking it in the vast and busy world of the Internet. The present invention is embodied in a system that provides secure Voice-Over-IP (VoIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet.Type: GrantFiled: September 14, 2007Date of Patent: September 30, 2014Assignee: TeleCommunication Systems, Inc.Inventors: Steve Anspach, Salazar Luke, Brian Heyliger, Greg Kasson, Jeff West
-
Patent number: 8850180Abstract: The description relates to a system designed to protect data exchange involved with the use of cloud computing infrastructures by services and individuals. The system is designed so that a cloud resource and its middleware access points are protected in transferring data among themselves and end users using a system designed to spread the data and then reassemble the data.Type: GrantFiled: August 29, 2008Date of Patent: September 30, 2014Assignee: Empire Technology Development, LLCInventors: Gene Fein, Edward Merritt
-
Patent number: 8850181Abstract: A method of accessing content on a secure terminal is described. The method comprises: capturing an image of a visual code presented on a display of a secure terminal. The method then involves decoding the visual code to ascertain (i) a set of connection parameters and (ii) a unique identifier. The set of connection parameters are used to establish a connection with the secure terminal. The method also comprises receiving the content from the secure terminal via the established connection in response to transmission of the unique identifier.Type: GrantFiled: November 16, 2010Date of Patent: September 30, 2014Assignee: NCR CorporationInventors: Jonathan S. Black, Jim Henderson
-
Patent number: 8850182Abstract: This disclosure relates capture of encrypted network traffic. As an example, a non-transitory computer readable medium can include a command interface programmed to receive control instructions that control capture of protocol data from a network. A capture module can be programmed to receive decoded protocol data from a device application responsive to the control instructions and to synthesize frames of output capture data in that includes at least the decoded protocol data.Type: GrantFiled: September 28, 2012Date of Patent: September 30, 2014Assignee: Shoretel, Inc.Inventors: Kent Fritz, Jason Harper, David Drell, Prabjeet Singh, Palani Selvam Thangavelu
-
Patent number: 8850183Abstract: The present invention provides an interconnect device that connects a source device to a destination device, and allows the source device's non-compliant rights management (RM) interface to deliver media content with little or no restriction to the destination device's compliant RM interface.Type: GrantFiled: January 16, 2012Date of Patent: September 30, 2014Assignee: Qurio Holdings, Inc.Inventors: Gregory Morgan Evans, Cheryl Adams
-
Patent number: 8850184Abstract: A transmission management apparatus includes a receiving unit that receives, from a first transmission terminal 10, a communication request for a communication with a second transmission terminal 10; a fists storage unit that stores therein terminal identification information for identifying the transmission terminals 10 and relay device identification information for identifying a relay device 30 that relays data to be transmitted and received by the first transmission terminal 10, in an associated manner; a relay device selecting unit that selects the relay device 30 associated with the terminal identification information of the first transmission terminal 10 in the first storage unit; a second storage unit that stores therein the relay device identification information and encryption necessity information in an associated manner; and an encryption necessity determining unit that determines whether encryption is needed based on the encryption necessity information associated, in the second storage unit, witType: GrantFiled: October 18, 2012Date of Patent: September 30, 2014Assignee: Ricoh Company, LimitedInventor: Takuya Imai
-
Patent number: 8850185Abstract: Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer also uploads the stored public key certificates associated with a domain to a second computer each time a connection is established with the domain. The second computer receives the public key certificates from the first computer. The second computer then determines whether any of the public key certificates provided by the first computer are fraudulent certificates by comparing the received certificates to known valid certificates. If the second computer determines that the first computer has received one or more fraudulent certificates, the second computer may cause action to be taken with regard to the fraudulent certificates.Type: GrantFiled: June 28, 2013Date of Patent: September 30, 2014Assignee: Amazon Technologies, Inc.Inventor: Charles P. Vaughn
-
Patent number: 8850186Abstract: An information processing apparatus that communicates using an electronic certificate is provided. When identification information is configured that identifies the information processing apparatus on a network, the configured identification information is stored in a storage unit. A request for issue of an electronic certificate containing the identification information stored in the storage unit is issued to a certificate authority. Once the request for issue is issued, a determination is made as to whether or not the identification information contained in the request for issue matches the identification information stored in the storage unit prior to obtaining the electronic certificate that is issued by the certificate authority in response to the request for issue. If it is determined that a mismatch exists, the user is notified to that effect.Type: GrantFiled: January 5, 2007Date of Patent: September 30, 2014Assignee: Canon Kabushiki KaishaInventor: Hisayuki Yamauchi
-
Patent number: 8850187Abstract: Provisioning a device with a certificate is contemplated. The certificate may be used to verify whether the device or a user of the device is authorized to access electronic content, services, and signaling. The certificate may be provisioned in relation to the device having successfully completed a two-factor authentication process so that an entity providing the certificate need not have to repeat the two-factor authentication process.Type: GrantFiled: May 17, 2012Date of Patent: September 30, 2014Assignee: Cable Television Laboratories, Inc.Inventor: Stuart A. Hoggan
-
Patent number: 8850188Abstract: A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device. Selected certificates may be downloaded to the computing device for storage, and the downloaded certificates are tracked by the data server. This facilitates the automatic updating of the status of one or more certificates stored on the computing device by the data server, in which updated status data is pushed from the data server to the computing device.Type: GrantFiled: September 13, 2012Date of Patent: September 30, 2014Assignee: BlackBerry LimitedInventors: Neil P. Adams, Herbert A. Little, Michael K. Brown, Michael S. Brown, Michael G. Kirkup
-
Patent number: 8850189Abstract: Various embodiments enable so-called extended data to be added to a signed digital certificate without having a private key of a Certification Authority available. In at least some embodiments, a request to add extended data to a digital certificate generated by a certificate authority is received from a client device. The digital certificate includes a signed first portion, and an unsigned second portion that includes reserved empty spaces that are reserved for the extended data. The extended data is added to the unsigned second portion. the extended data includes a client ID associated with the client device. The unsigned portion of the digital certificate is signed after the extended data is added.Type: GrantFiled: December 21, 2012Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Yu Lin Sie, Kedarnath A. Dubhashi, Anand D. Paka
-
Patent number: 8850190Abstract: The present invention provides a secret communication method, apparatus and system. The method comprises: 1) determining a neighboring encryption switching equipment shared by a first user terminal and a second user terminal, wherein the first user terminal and the second user terminal are neighboring user terminals (1); 2) establishing, by the neighboring encryption switching equipment, an inter-station key for communication between the first user terminal and the second terminal (2); 3) performing data secret communication between the first user terminal and the second terminal by using the inter-station key (3). With the present invention, the neighboring user terminals needing to perform the secret communication can establish the inter-station key without performing identity authentication with each other, and can perform the secret communication with the inter-station key, and thereby the network load is reduced.Type: GrantFiled: April 27, 2011Date of Patent: September 30, 2014Assignee: China IWNCOMM Co., Ltd.Inventors: Qin Li, Jun Cao, Manxia Tie, Zhenhai Huang, Zhiqiang Du
-
Patent number: 8850191Abstract: Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed, digital certificate associated with the entity is accessed. Here, the signed, digital certificate is signed with a group private key that is associated with a certification authority for the group. The signed, digital certificate is added to a group roster, and this addition is to admit the entity into the group. The group roster with the signed, digital certificate is itself signed with the group private key and distributed to the group, which includes the entity that transmitted the request. Communication to the entity is then encrypted using the signed, digital certificate included in the group roster.Type: GrantFiled: April 28, 2011Date of Patent: September 30, 2014Assignee: NetApp, Inc.Inventors: Craig Fulmer Everhart, David Slik
-
Patent number: 8850192Abstract: An apparatus and method for determining contents information corresponding to a Rights Object (RO) by transmitting information on contents together when the RO is moved from a mobile device to a memory card or a smart card or when the RO is moved from the memory card or the smart card to the mobile device are provided. The apparatus includes a meta information manager for determining information on contents corresponding to the RO when the RO is moved, and for generating meta information containing the determined contents information, and a controller for providing control to transmit the RO and the meta information generated by the meta information manager to a portable storage device. Accordingly, the conventional problem can be solved in which information on contents cannot be determined by using a Contents IDentifier (CID) if the RO does not exist together with the contents.Type: GrantFiled: November 26, 2012Date of Patent: September 30, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Seong Choi, Jung-Hun Park, Yun-Sang Oh
-
Patent number: 8850193Abstract: Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by authenticating a cryptographic hash value of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that is maintained by a trusted service provider and that contains cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code and (ii) a local whitelist database containing cryptographic hash values of at least a subset of the approved code modules. The activity relating to the code module is allowed when the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the multi-level whitelist.Type: GrantFiled: January 14, 2014Date of Patent: September 30, 2014Assignee: Fortinet, Inc.Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
-
Patent number: 8850194Abstract: A system and methods for providing a supplicant access to a communications network are disclosed. An authenticator receives an authentication request at an authenticator (210) from the supplicant. A state is created based on the authentication request at the authenticator (210). The authentication request is relayed towards a prime authenticator (215) where the prime authenticator is connected to an authentication server. Finally, the authenticator (215) receives authentication information from the prime authenticator and fulfills the authentication request using the authentication information.Type: GrantFiled: April 19, 2005Date of Patent: September 30, 2014Assignee: Motorola Solutions, Inc.Inventors: Anthony R. Metke, Robert D. LoGalbo
-
Patent number: 8850195Abstract: Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.Type: GrantFiled: July 23, 2008Date of Patent: September 30, 2014Assignee: Intertrust Technologies CorporationInventors: Gilles Boccon-Gibod, Julien Boeuf, Gary F. Ellison, David P. Maher
-
Patent number: 8850196Abstract: Authentication methods are used to authenticate, a device1 having an ESN1 (electronic serial number), a device2 having an ESN2, and/or a user of the devices. In one implementation, device1 receives the ESN2 in a near-field signal; derives an authentication result as a function of the ESN1 and ESN2; and sends the authentication result to an authenticator device to use in completing authentication. Authentication is confirmed when the device1 authentication result matches an authentication result independently generated by the authenticator device, which is provisioned with the ESN1 and ESN2. In a second implementation, device1 generates a RAND1 (random number) and sends the RAND1 to device2 over a near-filed link. An authenticator device confirms authentication upon receiving the same RAND1 from both device1 and device2.Type: GrantFiled: March 29, 2010Date of Patent: September 30, 2014Assignee: Motorola Solutions, Inc.Inventors: Alejandro G. Blanco, George S. Hanna, John B. Preston, Mark Boerger
-
Patent number: 8850197Abstract: A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical network unit (ONU) via an ONU management control interface (OMCI) channel, wherein the attributes provide security features for the ONU and an optical line terminal (OLT). Also included is an apparatus comprising an ONU configured to couple to an OLT and comprising an OMCI ME, wherein the OMCI ME comprises a plurality of attributes that support a plurality of security features for transmissions between the ONU and the OLT, and wherein the attributes are communicated via an OMCI channel between the ONU and the OLT and provide the security features for the ONU and the OLT.Type: GrantFiled: July 27, 2010Date of Patent: September 30, 2014Assignee: Futurewei Technologies, Inc.Inventor: Frank J. Effenberger
-
Patent number: 8850198Abstract: A method for validating a road traffic control transaction. The method includes: storing a cryptographic key assigned to a transaction receiver, in the transaction receiver; recording an image of a vehicle; reading an identification of the vehicle in the recorded image by OCR and generating a control transaction thereof in the control station; generating a random key and encrypting the recorded image into authentication data with the random key and the cryptographic key in the control station; transmitting the recorded image, the control transaction, the random key and the authentication data to the transaction receiver; in the transaction receiver, encrypting the received recorded image into nominal authentication data with the received random key and the stored cryptographic key; and comparing the received authentication data with the nominal authentication data. The received control transaction is then validated when the received authentication data and the nominal authentication data are identical.Type: GrantFiled: March 1, 2012Date of Patent: September 30, 2014Assignee: Kapsch TrafficCom AGInventor: Albert Hafenscher
-
Patent number: 8850199Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.Type: GrantFiled: April 27, 2012Date of Patent: September 30, 2014Assignee: Certicom Corp.Inventors: Gregory Marc Zaverucha, David William Kravitz
-
Patent number: 8850200Abstract: A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a packet-based network, such as the public Internet or an intranet. Communications are routed between private ports of the clients through the trusted intermediary server, with the private key transfer supported by a second type of communication medium. Although the trusted intermediary server negotiates the connection and is involved in the process, the communicants can perform their own key agreement and authentication for protecting data routed through the system.Type: GrantFiled: June 20, 2012Date of Patent: September 30, 2014Assignee: Synectic Design, LLCInventor: Michael J. Horgan
-
Patent number: 8850201Abstract: An apparatus for encrypting content to be played on another device is provided. The apparatus includes a processor and memory that includes a set of instructions. The set of instructions is configured to cause the processor to receive a selection of content from a user accessing the apparatus, and determine whether the user is authorized to receive the content. The set of instructions is further configured to cause the processor to transfer content along with an encrypted key associated with the user when the user is authorized to receive the selected content.Type: GrantFiled: July 2, 2012Date of Patent: September 30, 2014Assignee: Kiora, Inc.Inventors: Ganesh Janyavula, Renganathan Veerasubramanian
-
Patent number: 8850202Abstract: A system and method for authenticating a peer device onto a network using Extensible Authentication Protocol (EAP). The key lifetime associated with the keying material generated in the peer device and the authentication server is communicated from the authenticator to the peer device within the EAP Success message. The peer device, having been provided with the key lifetime, can anticipate the termination of its authenticated session and initiate re-authentication prior to expiry of the key lifetime.Type: GrantFiled: December 3, 2012Date of Patent: September 30, 2014Assignee: BlackBerry LimitedInventor: Leonardo José Silva Salomone
-
Patent number: 8850203Abstract: Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a method for performing an authenticated key agreement protocol, in accordance with a multimedia communication system, between a first party and a second party comprises, at the first party, the following steps. Note that encryption/decryption is performed in accordance with an identity based encryption operation. At least one private key for the first party is obtained from a key service. A first message comprising an encrypted first random key component is sent from the first party to the second party, the first random key component having been computed at the first party, and the first message having been encrypted using a public key of the second party.Type: GrantFiled: August 28, 2009Date of Patent: September 30, 2014Assignee: Alcatel LucentInventors: Ganapathy S. Sundaram, Violeta Cakulev
-
Patent number: 8850204Abstract: A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.Type: GrantFiled: December 23, 2009Date of Patent: September 30, 2014Assignee: Intel CorporationInventors: Robert Stacey, Jesse Walker, Emily H. Qi
-
Patent number: 8850205Abstract: A method of and an authentication server for distributing a key are disclosed. According to an embodiment of the present invention, the method of distributing a key, which is distributed by an authentication server connected with wireless terminals through a communication network, for encrypting and decrypting data in accordance with providing a service can include: obtaining characteristic information by decrypting encrypted characteristic information that has been received from each of n number of wireless terminals; generating a random key; generating a group key used for encrypting and decrypting data in accordance with providing a service; and generating a distribution key by using the random key, the group key and the characteristic information, and transmitting the distribution key to each wireless terminal.Type: GrantFiled: December 1, 2008Date of Patent: September 30, 2014Assignee: Sungyunkwan University Foundation for Corporate CollaborationInventors: Hyoung-Kee Choi, Jung-Yoon Kim, Do-Hyun Kwon, Eun-Young Lee, In-Hwan Kim, Se-Hwa Song
-
Patent number: 8850206Abstract: In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.Type: GrantFiled: November 15, 2011Date of Patent: September 30, 2014Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula
-
Patent number: 8850207Abstract: A controller is provided with a controller key and a first controller identification information unique to the controller. The controller generates a controller unique key unique to a respective controller based on the controller key and the first controller identification information, and a second controller identification information based on the first controller identification information. A decryptor decrypts the encrypted medium device key using the controller unique key to obtain a medium device key. An authentication/key exchange process unit performs authentication/key exchange process with the host device through an interface unit using the medium device key, the medium device key certificate and the second controller identification information to establish a secure channel.Type: GrantFiled: March 22, 2012Date of Patent: September 30, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Taku Kato, Yuji Nagai, Tatsuyuki Matsushita
-
Patent number: 8850208Abstract: Embodiments relate to a method for generating a set of authentication certificates by a set of certificate authority devices. The method includes receiving, by the set of certificate authority devices, a set of certificate requests from a user device. The method includes generating, by the set of certificate authority devices, a set of crosschecked certificates, each crosschecked certificate of the set of crosschecked certificates being configured to cryptographically verify the remaining crosschecked certificate of the set of crosschecked certificates. The method includes transmitting, by the set of certificate authority devices, the set of crosschecked certificates to the user device, the set of crosschecked certificates configured to be utilized by the user device in establishing a secured communication channel over a network between the user device and a client device.Type: GrantFiled: June 24, 2011Date of Patent: September 30, 2014Assignee: EMC CorporationInventor: Sean F. Parkinson
-
Patent number: 8850209Abstract: In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the database schema only when the object of the database schema is verified to have a valid digital signature associated with the trusted entity. In another embodiment, an object in a database schema may be verified as having a digital signature associated with at least one trusted entity. An application may be permitted access to the object of the database schema only when the digital signature for the object is verified to be associated with the at least one trusted entity.Type: GrantFiled: September 12, 2006Date of Patent: September 30, 2014Assignee: Microsoft CorporationInventors: Tanmoy Dutta, Raul Garcia, Steven Richard Gott, Ruslan Pavlovich Ovechkin, Roger Lynn Wolter
-
Patent number: 8850210Abstract: An authentication system, including a service use device 1 which presents blurred information obtained by blurring certification information desired to be certified, service providing devices 3a to 3c which verify the validity of blurred information presented by the service use device 1, and an authentication device 2 which supports the service use device 1 to issue valid blurred information. The authentication device 2 adds a digital signature to information including certification information and blurred information, and generates authentication information including the obtained digital signature, certification information, and blurred information (S2). The service use device 1 generates, based on the authentication information generated in the authentication device 2, blurred authentication information including blurred information selected according to an instruction from a user, instruction information representing the instruction, and a digital signature (S4).Type: GrantFiled: June 2, 2006Date of Patent: September 30, 2014Assignee: Panasonic CorporationInventors: Kaoru Yokota, Natsume Matsuzaki, Masao Nonaka
-
Patent number: 8850211Abstract: Methods and computing devices enable code and/or data software on computer devices to be verified using methods and signatures which can be updated by a signing server after distribution. Updated verification methods and signatures may be provided in a second signature file. When a computing device unpacks an application for execution it may check whether a second signature file is associated with the application file. If not it may connect to a signing server to request a second signature file for the software. The signing server then may request information related to the software sufficient to determine if the software is trustworthy. If determined to be trustworthy, the signing server can send a second signature file to the computer device for use in verifying the software henceforth. The second signature file may include new or modified verification methods and a new signature.Type: GrantFiled: April 27, 2009Date of Patent: September 30, 2014Assignee: QUALCOMM IncorporatedInventor: Ivan H. McLean
-
Patent number: 8850212Abstract: A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers (PCRs) for the device and the current values of the listed PCRs and an integrity value identifying the integrity measurement into a policy register, verify a signature over the integrity value extended into the policy register, and, if verification succeeds, extend a verification key of the trusted platform, plus an indication that it is a verification key, into the policy register, compare the integrity value extended into the policy register with a value stored in the trusted platform, and, if they are the same: extend the stored value, plus an indication that it is a stored value, into the policy register, and extend the integrity measurement in the trusted device if the value in the policy register matches a value stored with the integrity measurement.Type: GrantFiled: May 12, 2011Date of Patent: September 30, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Graeme John Proudler, Liqun Chen
-
Patent number: 8850213Abstract: A method for verifying an electronic signature is described including determining a residue class given by the signature; determining an integer having the residue class; determining a field element of a finite field such that the field element corresponds to the integer according to a predetermined mapping of the finite field to the set of integers; determining whether the field element fulfills a predetermined criterion and deciding whether the signature is valid based on whether the field element fulfills the predetermined criterion.Type: GrantFiled: January 29, 2013Date of Patent: September 30, 2014Assignee: Infineon Technologies AGInventors: Bernd Meyer, Erwin Hess
-
Patent number: 8850214Abstract: Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold.Type: GrantFiled: May 10, 2013Date of Patent: September 30, 2014Assignee: Intertrust Technologies CorporationInventors: Xavier Serret-Avila, Gilles Boccon-Gibod
-
Patent number: 8850215Abstract: A computing device which includes an access control mechanism which is used to control access to keys which are used in cryptographic processes. Any application wishing to gain access to a key must first obtain authorization from the access control mechanism. Authorized applications may access keys directly, without having to pass data through the access control mechanism.Type: GrantFiled: December 16, 2008Date of Patent: September 30, 2014Assignee: Nokia CorporationInventor: Tim Gover
-
Patent number: 8850216Abstract: Establishing trusted communication with a media client application on a client device includes receiving an identifying token originating in a secure messaging session between a messaging server and the client device, and sending an encrypted generated nonce to the messaging server for delivery to the client device. A blob request message is received that includes a decrypted nonce value and identifies the client device, user, and content owner. The blob request message is tested and a blob is conditionally sent to the client device that includes a secret value for accessing an API via which the client device obtains decryption keys for decrypting protected media. Testing includes evaluating whether the decrypted nonce value matches the generated nonce value. The blob request message may include device integrity information to evaluate whether the device has been tampered with, as a further condition to allowing access to the protected media.Type: GrantFiled: May 21, 2012Date of Patent: September 30, 2014Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Mikhail Mikhailov, Raj Nair
-
Patent number: 8850217Abstract: A method comprises detecting zapping to or from one or more services; determining whether the zapping includes termination of a password-protected service; and sending a trigger message (248, 256, 262) only if the zapping includes termination of a password-protected service (X, Y, Z). In one embodiment, the trigger message is sent to a smartcard (SC). In one embodiment, the password-protected service is password-protected for parental control. In one embodiment, the method further includes requesting a password when the zapping includes zapping to a password-protected service. In one embodiment, the password-protected service is a pincode-protected service.Type: GrantFiled: August 19, 2009Date of Patent: September 30, 2014Assignee: Nokia CorporationInventors: Anja Jerichow, Martin Jansky, Kyösti Koivisto, Matti Puputti
-
Patent number: 8850218Abstract: A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.Type: GrantFiled: October 14, 2013Date of Patent: September 30, 2014Assignee: CA, Inc.Inventors: Geoffrey R. Hird, Rammohan Varadarajan
-
Patent number: 8850219Abstract: Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token message may include a first security token. The first security token may include a communication interaction identifier that identifies a communication interaction between the client machine and the server and an action request identifier that identifies an action request message capable of being sent from the client machine to the server to request that an action be performed on the server. An action request message including a second security token and transmitted in association with the communication interaction may be received at the server. When it is determined that the first security token matches the second security token, the requested action may be performed.Type: GrantFiled: January 12, 2011Date of Patent: September 30, 2014Assignee: salesforce.com, inc.Inventors: Peter Dapkus, Alan Vangpat, Nikita Prokopev, Forrest Junod
-
Patent number: 8850220Abstract: Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.Type: GrantFiled: May 9, 2012Date of Patent: September 30, 2014Assignee: Intel CorporationInventors: Gyan Prakash, Mousumi M. Hazra, Selim Aissi, Jasmeet Chhabra