Including Authentication Patents (Class 380/232)
  • Patent number: 11908084
    Abstract: Provided is a method for generating high-quality isosurface mesh in real time, which takes the Marching Cubes algorithm as a baseline to efficiently generate a high-quality mesh of a 3D model, re-examines the case table in the MC algorithm, and puts forward the concept of equivalent edges. By combining with the remeshing technology, the MC algorithm is optimized from three aspects: deleting equivalent edges with the worst performance from the case table by using connectivity modification and vertex insertion technology; changing the geometric shape of the active edge to make it more perpendicular to the isosurface; and moving the shared cut points of cube cells. According to the present application, the mesh with a higher quality is generated at the running speed close to the standard MC algorithm, and the mesh quality is close to the post-processing remeshing algorithm with extremely high time consumption.
    Type: Grant
    Filed: December 16, 2021
    Date of Patent: February 20, 2024
    Assignee: ZHEJIANG UNIVERSITY
    Inventors: Zhong Ren, Jiahui Hao
  • Patent number: 11895132
    Abstract: A network security computing system includes a steganographic communications analysis engine monitoring incoming and outgoing messages on a secure computing network. The steganographic communications analysis engine identifies a pattern of file transfers between a first computing device on the secure computing network and an internal or external message recipient. When a pattern is identified, the steganographic communications analysis engine quarantines an associated computing device from the secure network. The steganographic communications analysis engine analyzes files transferred between the computing device and the recipient for indications of steganographic information and causes display, based on an identified indication of steganography, an indication that the computing device had been compromised by command and control malware.
    Type: Grant
    Filed: November 23, 2022
    Date of Patent: February 6, 2024
    Assignee: Bank of America Corporation
    Inventors: Steven Sinks, Jonathan Sheedy
  • Patent number: 11853217
    Abstract: Multi-cache-based digital output generation is provided. A system receives data objects that include fields from a remote data source. The system sorts the data objects based on a field to generate a sorted data set. The system cleans the sorted data set to generate a clean data set based on a policy. The system receives a request for a type of digital output based on the data objects received from the data source and loads a portion of the clean data set to a first level cache. The system selects a machine learning model configured for the type of digital output, and loads a primary cache with a subset of fields stored in the first level cache selected based on the machine learning model. The system generates, based on the first level cache being complete, digital output corresponding to the type of digital output from data in the primary cache.
    Type: Grant
    Filed: July 1, 2022
    Date of Patent: December 26, 2023
    Inventors: Adam Rumanek, Charles Sinsofsky
  • Patent number: 11714883
    Abstract: A media device receives a domain key from a service provider. The media device further encrypts media with a media key and encrypts the media key with the domain key to form an encrypted media token: the protected media key is encapsulated in an encrypted media token. The service provider may then receive the encrypted media token and one or more receiving entity identifiers relating to a receiving entity and ascertain whether the receiving entity is entitled to access media from the media device. If the receiving entity is entitled to access media from the media device, the service provider decrypts the cryptographic media token using the domain key to obtain the media key and providing the media key to the receiving entity. As such, an authenticated receiving entity may obtain the media key necessary to decrypt the media.
    Type: Grant
    Filed: April 4, 2018
    Date of Patent: August 1, 2023
    Assignee: Nagravision Sàrl
    Inventors: Michel Angel, Hervé Retaureau, Antony Celletti
  • Patent number: 11063914
    Abstract: A secure end-to-end communication system is implemented via one or more security processing devices. In one embodiment, a method includes: loading, by a key manager, a first set of keys into a security device; encrypting first data with the first set of keys using the security device; and sending, over a network, the encrypted first data to an external site or a mobile device. The method may further include: requesting the encrypted data from the external site or mobile device; receiving, over the network, the encrypted first data; and decrypting the received encrypted first data with the first set of keys using the security device.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: July 13, 2021
    Assignee: Secturion Systems, Inc.
    Inventor: Richard J. Takahashi
  • Patent number: 10848489
    Abstract: Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a client and an authenticator. The process provides as output a number that is based on a timestamp. To authenticate the client when it attempts to access a target service, both the client and authenticator execute the authentication process using locally generated timestamps. If the outputs of the authentication process match, the client is authenticated. If not, subsequent network communications from the client are either denied or redirected to an alternative computing system that masquerades as the target service.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: November 24, 2020
    Inventor: Daniel Chien
  • Patent number: 10581977
    Abstract: Provided is a private and secure network that uses an authentication mechanism with a uniquely assigned private IP address and network credentials issued as part of a VPN certificate exchange. A first layer of authentication establishes a secure tunnel between user and VPN server, and a second layer of authentication connects that secure tunnel to the web site or resource, without passing the VPN certificate. Once authenticated, interaction between website or resource and user are automatically monitored for abnormal or malicious behavior and, if required, automatic verification and authentication response is generated.
    Type: Grant
    Filed: June 2, 2016
    Date of Patent: March 3, 2020
    Assignee: ALTR Solutions, Inc.
    Inventors: Scott Nathaniel Goldfarb, James Douglas Beecham, Christopher Edward Struttmann, Gordon Earl Martin, Peter Reuben Martin
  • Patent number: 10515248
    Abstract: An apparatus and method for updating features on an image scanning apparatus has a client computing device capture and decode an image of a first symbol that encodes data that identifies the image scanning apparatus, request a server to enable a feature on the image scanning apparatus, receive activation data from the server to enable the feature, and generate an image of a second symbol on a display of the client computing device that encodes the activation data. The image scanning apparatus captures and decodes an image of the second symbol, and uses the decoded activation data to enable a feature resident on the image scanning apparatus or to request a download of the feature from the client computing device if the feature is not resident on the image scanning apparatus. The client computing device downloads the feature from the server, and uploads the feature to the image scanning apparatus.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: December 24, 2019
    Assignee: Zebra Technologies Corporation
    Inventors: Andrew Cornell, Ke Zhang
  • Patent number: 10477402
    Abstract: Key fob and vehicle control unit identifiers (IDs) are used for entity authentication or trust transfer to achieve a secured initial pairing. The key fob is capable of transmitting only (not receiving) and is paired with a control unit in a vehicle or with any other control device. Use of the key fob and control unit IDs prevents unauthorized pairing and access to the operation key (OpKey) that is later used for communications between the devices. Elliptical curve cryptography (ECC) is used for strong security and efficient implementation. In the pairing process, device IDs are used for entity authentication and public key cryptography is used for easy key management. Symmetric encryption is used for fast normal operation and to accommodate key fob addition or revocation after key fob loss.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: November 12, 2019
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Jin-Meng Ho
  • Patent number: 10410006
    Abstract: A method and electronic device are provided to determine that a text-based message to be sent from a sender to a recipient includes a document attached thereto, determine a protection setting value associated with a protection setting, the protection setting value determined based on collaboration data associated with the sender and the recipient, determine whether the protection setting value meets a threshold, in response to determining that the protection setting value meets the threshold, apply the protection setting associated with the protection setting value to the document attached to the text-based message, and transmit the text-based message.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: September 10, 2019
    Assignee: BlackBerry Limited
    Inventors: Rupen Chanda, Genevieve Elizabeth Mak, Pauline Po Ning Siu, Paul Wilson Lemarquand, Antti Juhani Piira, Leonid Zolotarev
  • Patent number: 10410204
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating rules to apply to fare transactions when a fare card reader cannot communicate with an authorization server, for generating historical data and a risk score for a fare card that are used by a fare card reader, with the rules, to determine whether to authorize access to a transit service when the fare card reader cannot communicate with the authorization server, and for selectively permitting or denying access to the transit service using the rules and the historical data or the score for a fare card.
    Type: Grant
    Filed: May 4, 2016
    Date of Patent: September 10, 2019
    Assignee: Accenture Global Solutions Limited
    Inventors: Michael Edward Simanek, Scott T. Butler
  • Patent number: 10194448
    Abstract: A mobile telecommunications network includes: a radio access network having radio means (2000) for wireless communication with a plurality of terminals (10) registered with the telecommunications network and control means (700) operable to control interaction of the terminals with the radio access network; and a core (2030) including a store of policy information comprising group policy data (2210) applicable to a group of the terminals and individual policy data applicable to respective ones of the terminals (10), and distribution means operable to provide to the control means associated with each of the terminals an indicator of the group policy data applicable to each of the terminals and the individual policy data applicable to each of the terminals.
    Type: Grant
    Filed: January 8, 2015
    Date of Patent: January 29, 2019
    Assignee: VODAFONE IP LICENSING LIMITED
    Inventors: Walter Bindrim, John Moughton, Adam Pollard, David Fox, Peter Cosimini, Matthew Cheng, Christopher Pudney
  • Patent number: 10127557
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating rules to apply to fare transactions when a fare card reader cannot communicate with an authorization server, for generating historical data and a risk score for a fare card that are used by a fare card reader, with the rules, to determine whether to authorize access to a transit service when the fare card reader cannot communicate with the authorization server, and for selectively permitting or denying access to the transit service using the rules and the historical data or the score for a fare card.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: November 13, 2018
    Assignee: Accenture Global Solutions Limited
    Inventors: Michael Edward Simanek, Scott T. Butler
  • Patent number: 9967722
    Abstract: Systems and methods are provided that allow a BLE scanning device or other receiving device to use packet transmission timing parameter discovery to synchronize its listening times to the actual packet transmission times from a transmitting device such as a BLE advertising device. Once discovered, the packet transmission timing parameter/s may be used by the receiving device to calculate the same pseudorandom delay time component (such as BLE advDelay) that is being used by the transmitting device to determine intervals between the transmitted packets. This allows the receiving device to calculate the exact time that the transmitting device is transmitting each packet, so that the receiving device may synchronize its listening times to coincide with the packet transmitting intervals used by the transmitting device.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: May 8, 2018
    Assignee: Silicon Laboratories Finland OY
    Inventor: Jere M. Knaappila
  • Patent number: 9870470
    Abstract: A multi-stage event detector for monitoring a system to detect the occurrence of multistage events in the monitored system, the multi-stage event detector includes: one or more event detecting detector units (142, 144) for detecting observable events occurring on the monitored system; one or more parameter generating detector units (152, 154) for generating parameter values which vary over time dependent on the behavior of the monitored system; a hidden state determiner (120) for determining a likely sequence of states of interest of the system based on the outputs of the one or more event detecting detector units; and a transition determiner (130) for determining a likely transition occurrence based on a comparison of a set of values of a parameter or set of parameters generated by one or more of the one or more parameter generating detector units with a plurality of pre-specified functions or sets of values of a corresponding parameter or set of parameters associated with different transition occurrences.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: January 16, 2018
    Assignee: British Telecommunications PLC
    Inventors: Ian Herwono, Zhan Cui, Ben Azvine, Martin Brown, Karl Smith
  • Patent number: 9842205
    Abstract: Time-varying passwords for user authentication are disclosed. Example methods disclosed herein for password generation include obtaining a base password including characters, determining a first character position of the base password at which a first time-varying data element is to be inserted to determine a time-varying password, the first time-varying data element to be computed based on a time-varying parameter, and determining a first offset to be applied to a value of the time-varying parameter to compute the first time-varying data element. Example methods disclosed herein for password evaluation include accessing a base password including characters, applying a first offset to a value of a time-varying parameter to determine a first time-varying data element to be inserted at a first character position of the base password to determine a time-varying password, and comparing the time-varying password with an input password to perform authentication based on the input password.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: December 12, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Richard A. Williams, Roger B. Aboujaoude
  • Patent number: 9823812
    Abstract: A method and system for providing a Network-based User Interface (NUI) is provided. The method for providing the NUI includes: selecting one from among devices connected to a network; acquiring a UI regarding the selected device through the network; and interacting with the device by using the acquired UI. Accordingly, the user terminal can acquire the UI regarding the device connected to the network through the network and interact with the device, so that the user can easily manipulate the device at a remote distance and can easily grasp the statue of the device.
    Type: Grant
    Filed: December 27, 2011
    Date of Patent: November 21, 2017
    Assignee: KOREA ELECTRONICS TECHNOLOGY INSTITUTE
    Inventors: Jae Ho Kim, Ha Gyeong Sung, Kwang Ho Won, Sang Shin Lee, Il Yeup Ahn, Min Hwan Song, Jae Seok Yoon
  • Patent number: 9729931
    Abstract: A method for displaying multimedia content on the screen of a multimedia terminal, the multimedia content being encoded by data included in a file stored on a server remote from the terminal in a format such that the entire file is required by an application supporting the format for generating a display of the multimedia content on the screen of the terminal, wherein the method includes: requesting by the terminal the transmission of an encoding of the display of the multimedia content into a defined rendering format; using by the server the file for generating the rendering encoding of the multimedia content according to the defined rendering format by the terminal; and transmitting by the server the rendering encoding to the terminal using a graphic interface sharing protocol.
    Type: Grant
    Filed: December 31, 2010
    Date of Patent: August 8, 2017
    Assignee: SAGEMCOM BROADBAND SAS
    Inventor: Jean-Pierre Morard
  • Patent number: 9697378
    Abstract: A method of storing a data object received from a network is described. An encrypted data object encrypted with a first encryption key is received. It is determined whether the encrypted data object is to be stored in an encrypted file system that requires encryption of a data object with a second encryption key. The first encryption key is encrypted with a third encryption key when it is determined the encrypted data object is to be stored in the encrypted file system. The first encryption key is attached to the encrypted data object. The data object encrypted by the first encryption key is stored in the encrypted file system.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9313530
    Abstract: Technique for securely transferring programming content from a first device in a first layer to a second device in a second layer. Upon request to transfer protected content to the second device, the first device authenticates the second device. After authentication, the first device transfers the protected content and a rights file associated therewith to the second device. The rights file specifies the rights of the second device to use the protected content, according to its security level. These rights may concern, the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc. The higher the security level of the second device is, the more rights accorded thereto. The second device may further need to meet a minimum security level in order for it to receive the protected content.
    Type: Grant
    Filed: November 12, 2012
    Date of Patent: April 12, 2016
    Assignees: TIME WARNER CABLE ENTERPRISES LLC, COMCAST CABLE HOLDINGS, LLC
    Inventors: William Helms, John B. Carlucci, Michael T. Hayashi, John W. Fahrny
  • Patent number: 9043827
    Abstract: A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: May 26, 2015
    Assignee: PRIME RESEARCH ALLIANCE E, INC.
    Inventors: Maxim Rapoport, Charles A. Eldering
  • Patent number: 9032538
    Abstract: A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being transmitted to a receiving apparatus. Accordingly, a problem that the receiving apparatus receives the authentication start instruction from the relay apparatus before locking the authentication start video signal and cannot perform authentication processing normally, leading to a failure in authentication. A correction time is decided based on a resolution of the authentication start video signal transmitted from the receiving apparatus and a combination of receiving apparatuses and transmitting apparatuses connected to the relay apparatus.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: May 12, 2015
    Assignee: Onkyo Corporation
    Inventor: Hiroki Okada
  • Patent number: 9027143
    Abstract: Various embodiments of a system and method for multipronged authentication are described. Embodiments may include a client system that implements a runtime component configured to consume content. The client system may be configured to implement a digital rights management component configured to perform one or more cryptographic operations and also authenticate the runtime component. The client system may receive encrypted content from a remote computer system and receive a given authentication component from a remote computer system; that authentication component may be configured to authenticate the runtime component. The client system may, based on authentication of the runtime component by both the digital rights management component and the given authentication component, decrypt at least a portion of the encrypted content.
    Type: Grant
    Filed: August 26, 2009
    Date of Patent: May 5, 2015
    Assignee: Adobe Systems Incorporated
    Inventors: Sunil C. Agrawal, Joseph D. Steele
  • Patent number: 8984652
    Abstract: A device including a communication interface and processing logic is provided. The communication interface may receive digital rights management security information and content from a source device, the digital rights management information having been deactivated in the source device. The processing logic may reactivate the digital rights management security information and may render the content according to the digital rights management security information.
    Type: Grant
    Filed: January 29, 2007
    Date of Patent: March 17, 2015
    Assignees: Sony Corporation, Sony Mobile Comunications AB
    Inventors: Peter Ljung, Stefan Andersson
  • Patent number: 8949967
    Abstract: An information management apparatus includes a first control information setting unit that sets first control information for permitting use of information within a destination terminal to the information; a second control information setting unit that sets second control information for permitting the destination terminal to forward the information to the information; a displaying permitting unit that controls, when information set with the first control information is received from a source terminal, to permit the information to be used locally within an apparatus; and a forwarding permitting unit that controls, when information set with the second control information is received from a source terminal, to permit the information to be forwarded.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: February 3, 2015
    Assignee: Fujitsu Limited
    Inventor: Naoko Hayashida
  • Patent number: 8924742
    Abstract: Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be determined. Subsequently, distinct types of data may be stored in a distinct manner, with the manner of storage having a security level appropriate to the type of data. For example, a first type of data may be stored in an encrypted manner (i.e., with a high level of security), while a second level of data may be stored in a plain text manner (i.e., with a low level of security).
    Type: Grant
    Filed: February 11, 2009
    Date of Patent: December 30, 2014
    Assignee: BlackBerry Limited
    Inventors: Kristof Takacs, Neil Patrick Adams, Ravi Singh, Van Quy Tu
  • Patent number: 8908920
    Abstract: Systems and methods for identifying, tracking, tracing and determining the authenticity of a good are described herein. In some embodiments, a system includes an imaging system, a database, and an authentication center. The imaging system is configured to capture an image of a unique signature associated with a good at the good's origin. The unique signature can be, for example, a random structure or pattern unique to the particular good. The imaging system is configured to process the image of the good to identify at least one metric that distinguishes the unique signature from unique signatures of other goods. The database is configured to receive information related to the good and its unique signature from the imaging system; and is configured to store the information therein.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: December 9, 2014
    Assignee: Covectra, Inc.
    Inventors: Stephen M. Wood, Richard Smith, David Bear, George Kechter, Conor O'Neill
  • Patent number: 8880404
    Abstract: An electronic device configured for adaptively encoding a watermarked signal is described. The electronic device includes modeler circuitry that determines watermark data based on a first signal. The electronic device also includes coder circuitry coupled to the modeler circuitry. The coder circuitry determines a low priority portion of a second signal and embeds the watermark data into the low priority portion of the second signal to produce a watermarked second signal.
    Type: Grant
    Filed: October 18, 2011
    Date of Patent: November 4, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Stephane Pierre Villette, Daniel J. Sinder
  • Patent number: 8874895
    Abstract: The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and a control unit performs control as to whether to obtain the device information through a wireless communication unit or obtain the device information through a wire communication unit, and as to whether to transmit image information encrypted by a first encryption unit from the wireless communication unit or transmit image information encrypted by a second encryption unit from the wire communication unit when the verification unit verifies that the data receiving apparatus is authorized.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: October 28, 2014
    Assignee: Sony Corporation
    Inventor: Toru Nagara
  • Patent number: 8863310
    Abstract: A method and apparatus for improved digital rights management is provided.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: October 14, 2014
    Assignee: Samsung Information Systems America, Inc.
    Inventor: Eric Buchanan
  • Patent number: 8862899
    Abstract: In embodiments according to the present invention an encryption switch is used to authorize access to LUNs from client VMs present in the cloud provider network. The encryption switch includes responder side software for an authentication protocol and an agent in the client VM includes the requestor side of the authentication protocol. The certificate of the client is securely provided to the encryption switch, which associates the client VM with the LUN. The client private key is securely provided to the client VM, which retains it only non-persistently. The client VM requests LUN access and performs an authentication handshake with the encryption switch. If successful the client VM than has access to the LUN. As the original certificate is linked to the client, if the client is itself a VM, should the client be moved to a different host, the certificate moves with it and LUN accessibility is maintained.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: October 14, 2014
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Aseem Rastogi, Lintu Thomas, Christopher Del Signore
  • Patent number: 8856535
    Abstract: An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data to create signatures corresponding to each of the multiple channels. Based on similarities between signatures, the analyzer may then identify clusters of signatures associated with devices that share channels or portions of channels.
    Type: Grant
    Filed: November 1, 2010
    Date of Patent: October 7, 2014
    Assignee: Comcast Cable Communications, LLC
    Inventors: Lawrence D. Wolcott, Phillip F. Chang
  • Patent number: 8856548
    Abstract: An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service. The encryption switch develops a cloud crypto domain (CCD) as a secure area, with the data at rest on the LUNs encrypted. The encryption switch develops a master key for client use in the CCD, which is provided to the client encrypted by the client's public key. Data encryption keys (DEKs) are created for each LUN and provided to the client. The DEKs are stored in a key vault by the client for use if needed. The cloud service provisions a client VM to be used with the encrypted LUN and develops a nexus between the LUN and the client VM for the encryption switch to use in data operations. The client communicates through the client VM to access the LUN.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: October 7, 2014
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Christopher Del Signore, Aseem Rastogi, Lintu Thomas
  • Patent number: 8833663
    Abstract: The invention relates to identification documents, and in particular to pre-printing processing covert images, such as UV or IR images, provided on such identification documents. In one implementation, the invention provides a method of processing a digital image that is to be printed on a surface of an identification document as a fluorescing-capable image to improve the quality of the image. Edges or boundaries are detected within the image, the detected edges or boundaries forming an intermediate image. The edges or boundaries within the image are emphasized, and the emphasized image is used for printing the covert image. In some implementations of the invention, a digital watermark is embedded in the covert image.
    Type: Grant
    Filed: October 18, 2010
    Date of Patent: September 16, 2014
    Assignee: L-1 Secure Credentialing, Inc.
    Inventors: Nelson T. Schneck, Charles F. Duggan, Robert L. Jones, Daoshen Bi
  • Patent number: 8826014
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Grant
    Filed: January 21, 2005
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffery Bart Jennings, Kofi Kekessie
  • Patent number: 8774405
    Abstract: The invention relates to a value-added service applied to the broadcasting of video programs or content and more particularly to mobile television (Mobile TV). The invention promotes service continuity during the broadcasting of programs having an undefined duration and the broadcasting of which has been subject to a Pay-Per-View type purchase.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: July 8, 2014
    Assignee: Gemalto SA
    Inventor: Anne-Marie Praden
  • Patent number: 8751825
    Abstract: A method of storing content, in accordance with one embodiment of the present invention, includes receiving an item of content in a protected format and a key corresponding to the item of content. The item of content in its protected format may be stored on a mass storage device. The key may also be stored in a safeguarded format on the mass storage device.
    Type: Grant
    Filed: December 15, 2004
    Date of Patent: June 10, 2014
    Assignee: Nvidia Corporation
    Inventors: Michael B. Diamond, Jonathan B. White
  • Patent number: 8745742
    Abstract: A computer-implemented method for processing web content may comprise receiving web content encoded with malicious steganographic code. Before presenting the web content, the method may comprise modifying the web content to create modified content such that information conveyed by the malicious steganographic code is at least partially corrupted in the modified content. Additionally, a functionality of the modified content may be at least substantially similar to a functionality of the web content following modification of the web content to create the modified content. Various other methods, computer-readable media, and systems are also disclosed.
    Type: Grant
    Filed: November 3, 2008
    Date of Patent: June 3, 2014
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, William E. Sobel, Bruce McCorkendale
  • Patent number: 8732803
    Abstract: Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code.
    Type: Grant
    Filed: October 3, 2013
    Date of Patent: May 20, 2014
    Assignee: Credibility Corp.
    Inventors: Jeffrey M. Stibel, Aaron B. Stibel, Peter Delgrosso, Shailen Mistry, Bryan Mierke, Paul Servino, Charles Chi Thoi Le, David Lo, David Allen Lyon
  • Patent number: 8732795
    Abstract: A computer-implemented authentication method is described. The method includes the steps of (a) receiving an authentication request at an authentication computing system, the request including a resource identifier, (b) identifying one or more authentication pools associated with the resource identifier, each authentication pool including at least one authentication method implementation, (c) executing a pool authentication process for the one or more identified authentication pools, and (d) transmitting a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: May 20, 2014
    Assignee: Epic Systems Corporation
    Inventors: Trent N. Skeel, Eric W. Cooper, Travis Keshav
  • Patent number: 8724809
    Abstract: A method and system for tuning to a scrambled television channel is provided. One implementation involves receiving a channel selection from a user, tuning to the selected scrambled channel, checking a cache for Conditional Access (CA) descrambling information associated with the selected channel, and in case of a cache hit, then retrieving the descrambling information associated with the selected channel from the cache for descrambling the scrambled channel.
    Type: Grant
    Filed: August 12, 2008
    Date of Patent: May 13, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Fei Xie, Victor Liang, Kitae Nahm, Juan Carlos Trujillo
  • Patent number: 8713700
    Abstract: When a user carries a mobile terminal with confidential information, such as customer information, stored therein, it is required to maintain information confidentiality and to prevent an unauthorized third party from accessing the confidential information even if the mobile terminal is stolen. According to the disclosed access control method, an encryption key is generated based on a planned route and the information is encrypted. When the user accesses the information, a decryption key is generated based on the actual movement route that is regularly acquired. The encrypted information can be decrypted if the planned route and the movement route match.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: April 29, 2014
    Assignee: Hitachi Automotive Sytstems, Ltd.
    Inventors: Tsuneo Sobue, Tatsuaki Osafune
  • Patent number: 8655318
    Abstract: A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous operation when roaming, the mobile node identifies itself with a coded identifier instead of a public identifier. The coded identifier used at a given time includes the time-based code that is valid for that given time. To authenticate the mobile node, a serving system receives authentication information from the mobile node and forwards the authentication information to a home system. The authentication information includes the current time-based code and a timestamp. The home system identifies the mobile node from the current time-based code and the timestamp. The home system then uses the authentication information to authenticate the mobile node.
    Type: Grant
    Filed: March 27, 2013
    Date of Patent: February 18, 2014
    Assignee: Sprint Spectrum L.P.
    Inventors: Tong Zhou, George Jason Schnellbacher
  • Patent number: 8639930
    Abstract: Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code.
    Type: Grant
    Filed: November 7, 2011
    Date of Patent: January 28, 2014
    Assignee: Credibility Corp.
    Inventors: Jeffrey M. Stibel, Aaron B. Stibel, Peter Delgrosso, Shailen Mistry, Bryan Mierke, Paul Servino, Charles Chi Thoi Le, David Lo, David Allen Lyon
  • Patent number: 8627507
    Abstract: There is disclosed a media file distribution system and method. An asset management and delivery system and method for the distribution of digital files and data is provided. There are two major functions, with sub-functions within each. The system first serves as a fully automated management system for a company involved in video/file distribution, such as in video on demand (VOD) or other digital file industries. The system can ingest, prepare, schedule, transmit, track and report on any aspect of the business chain. Secondly, it also serves as a product for both content providers and recipients to be able to view, manage and run their entire content offering remotely from anywhere through the Internet.
    Type: Grant
    Filed: March 23, 2009
    Date of Patent: January 7, 2014
    Assignee: Vubiquity Entertainment Corporation
    Inventors: Christopher Stasi, Kelly Perdue, Dom Stasi
  • Patent number: 8621559
    Abstract: Methods and systems for managing data communications are described. The method includes receiving a data communication; analyzing the data communication to determine a particular type of sender or recipient activity associated with the data communication based at least in part on an application of a plurality of tests to the data communication; assigning a total risk level to the data communication based at least in part on one or more risks associated with the particular type of sender or recipient activity and a tolerance for each of the one or more risks; comparing the total risk level assigned to the data communication with a maximum total acceptable level of risk; and allowing the data communication to be delivered to a recipient in response to the comparison indicating that the total risk level assigned to the data communication does not exceed the maximum total acceptable level of risk.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Dmitri Alperovitch, Paula Greve, Sven Krasser, Tomo Foote-Lennox
  • Patent number: 8572708
    Abstract: A method that provides efficient integration of infrastructure for federated single sign on (e.g. Liberty ID-FP framework) and generic bootstrapping architecture (e.g. 3GPP GAA/GBA architecture) uses an integrated proxy server (IAP). The IAP is inserted in the path between a user and a service provider (SP). The IAP differentiates type of access and determines corresponding operative state to act as a liberty enabled server or as a GAA/GBA network application function. A Bootstrapping, Identity, Authentication and Session Management arrangement (BIAS) leverages on 3GPP GAA/GBA infrastructure to provide an integrated system for handling Liberty Federated SSO and 3GPP GAA/GBA bootstrapping procedures at the same time. This method and arrangement provides improved use of infrastructure elements and performance for authenticated service access.
    Type: Grant
    Filed: December 28, 2006
    Date of Patent: October 29, 2013
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Luis Barriga, David Castellanos Zamora
  • Patent number: 8549284
    Abstract: A method and system is provide for performing a certificate validity check between a vehicle receiving a message and an entity transmitting the message in a vehicle-to-entity communication system. The message includes a digital certificate. A determination is made whether the digital certificate is expired. A determination is made whether the digital certificate is listed in a local certificate revocation list stored in a memory of the vehicle in response to a determination that the digital certificate is not expired, otherwise, disregarding the message. An elapsed time is determined since a last freshness check in response the digital certificate not listed in the local certificate revocation list. The elapsed time is compared to a threshold requirement. The digital message is accepted for additional processing in response to the freshness check meeting the threshold requirement, otherwise, the message is disregarded.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: October 1, 2013
    Assignee: GM Global Technology Operations LLC
    Inventor: Arzad A. Kherani
  • Patent number: 8543091
    Abstract: Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of providing secure Short Message Service (SMS) communications comprises requesting that SMS data to be sent from a client device to a remote location be encrypted. The method also comprises encrypting the SMS data by processing the SMS data with a Message Authentication Code (MAC) and a timestamp and/or counter along with second factor authentication information. The method further comprises sending the encrypted SMS data to the remote location by a secure SMS application via a regular SMS channel of the client device.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: September 24, 2013
    Assignee: eBay Inc.
    Inventor: Upendra Mardikar
  • Patent number: 8542825
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: September 24, 2013
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh