Including Authentication Patents (Class 380/232)
  • Patent number: 10194448
    Abstract: A mobile telecommunications network includes: a radio access network having radio means (2000) for wireless communication with a plurality of terminals (10) registered with the telecommunications network and control means (700) operable to control interaction of the terminals with the radio access network; and a core (2030) including a store of policy information comprising group policy data (2210) applicable to a group of the terminals and individual policy data applicable to respective ones of the terminals (10), and distribution means operable to provide to the control means associated with each of the terminals an indicator of the group policy data applicable to each of the terminals and the individual policy data applicable to each of the terminals.
    Type: Grant
    Filed: January 8, 2015
    Date of Patent: January 29, 2019
    Assignee: VODAFONE IP LICENSING LIMITED
    Inventors: Walter Bindrim, John Moughton, Adam Pollard, David Fox, Peter Cosimini, Matthew Cheng, Christopher Pudney
  • Patent number: 10127557
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating rules to apply to fare transactions when a fare card reader cannot communicate with an authorization server, for generating historical data and a risk score for a fare card that are used by a fare card reader, with the rules, to determine whether to authorize access to a transit service when the fare card reader cannot communicate with the authorization server, and for selectively permitting or denying access to the transit service using the rules and the historical data or the score for a fare card.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: November 13, 2018
    Assignee: Accenture Global Solutions Limited
    Inventors: Michael Edward Simanek, Scott T. Butler
  • Patent number: 9967722
    Abstract: Systems and methods are provided that allow a BLE scanning device or other receiving device to use packet transmission timing parameter discovery to synchronize its listening times to the actual packet transmission times from a transmitting device such as a BLE advertising device. Once discovered, the packet transmission timing parameter/s may be used by the receiving device to calculate the same pseudorandom delay time component (such as BLE advDelay) that is being used by the transmitting device to determine intervals between the transmitted packets. This allows the receiving device to calculate the exact time that the transmitting device is transmitting each packet, so that the receiving device may synchronize its listening times to coincide with the packet transmitting intervals used by the transmitting device.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: May 8, 2018
    Assignee: Silicon Laboratories Finland OY
    Inventor: Jere M. Knaappila
  • Patent number: 9870470
    Abstract: A multi-stage event detector for monitoring a system to detect the occurrence of multistage events in the monitored system, the multi-stage event detector includes: one or more event detecting detector units (142, 144) for detecting observable events occurring on the monitored system; one or more parameter generating detector units (152, 154) for generating parameter values which vary over time dependent on the behavior of the monitored system; a hidden state determiner (120) for determining a likely sequence of states of interest of the system based on the outputs of the one or more event detecting detector units; and a transition determiner (130) for determining a likely transition occurrence based on a comparison of a set of values of a parameter or set of parameters generated by one or more of the one or more parameter generating detector units with a plurality of pre-specified functions or sets of values of a corresponding parameter or set of parameters associated with different transition occurrences.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: January 16, 2018
    Assignee: British Telecommunications PLC
    Inventors: Ian Herwono, Zhan Cui, Ben Azvine, Martin Brown, Karl Smith
  • Patent number: 9842205
    Abstract: Time-varying passwords for user authentication are disclosed. Example methods disclosed herein for password generation include obtaining a base password including characters, determining a first character position of the base password at which a first time-varying data element is to be inserted to determine a time-varying password, the first time-varying data element to be computed based on a time-varying parameter, and determining a first offset to be applied to a value of the time-varying parameter to compute the first time-varying data element. Example methods disclosed herein for password evaluation include accessing a base password including characters, applying a first offset to a value of a time-varying parameter to determine a first time-varying data element to be inserted at a first character position of the base password to determine a time-varying password, and comparing the time-varying password with an input password to perform authentication based on the input password.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: December 12, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Richard A. Williams, Roger B. Aboujaoude
  • Patent number: 9823812
    Abstract: A method and system for providing a Network-based User Interface (NUI) is provided. The method for providing the NUI includes: selecting one from among devices connected to a network; acquiring a UI regarding the selected device through the network; and interacting with the device by using the acquired UI. Accordingly, the user terminal can acquire the UI regarding the device connected to the network through the network and interact with the device, so that the user can easily manipulate the device at a remote distance and can easily grasp the statue of the device.
    Type: Grant
    Filed: December 27, 2011
    Date of Patent: November 21, 2017
    Assignee: KOREA ELECTRONICS TECHNOLOGY INSTITUTE
    Inventors: Jae Ho Kim, Ha Gyeong Sung, Kwang Ho Won, Sang Shin Lee, Il Yeup Ahn, Min Hwan Song, Jae Seok Yoon
  • Patent number: 9729931
    Abstract: A method for displaying multimedia content on the screen of a multimedia terminal, the multimedia content being encoded by data included in a file stored on a server remote from the terminal in a format such that the entire file is required by an application supporting the format for generating a display of the multimedia content on the screen of the terminal, wherein the method includes: requesting by the terminal the transmission of an encoding of the display of the multimedia content into a defined rendering format; using by the server the file for generating the rendering encoding of the multimedia content according to the defined rendering format by the terminal; and transmitting by the server the rendering encoding to the terminal using a graphic interface sharing protocol.
    Type: Grant
    Filed: December 31, 2010
    Date of Patent: August 8, 2017
    Assignee: SAGEMCOM BROADBAND SAS
    Inventor: Jean-Pierre Morard
  • Patent number: 9697378
    Abstract: A method of storing a data object received from a network is described. An encrypted data object encrypted with a first encryption key is received. It is determined whether the encrypted data object is to be stored in an encrypted file system that requires encryption of a data object with a second encryption key. The first encryption key is encrypted with a third encryption key when it is determined the encrypted data object is to be stored in the encrypted file system. The first encryption key is attached to the encrypted data object. The data object encrypted by the first encryption key is stored in the encrypted file system.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9313530
    Abstract: Technique for securely transferring programming content from a first device in a first layer to a second device in a second layer. Upon request to transfer protected content to the second device, the first device authenticates the second device. After authentication, the first device transfers the protected content and a rights file associated therewith to the second device. The rights file specifies the rights of the second device to use the protected content, according to its security level. These rights may concern, the number of times that the second device may subsequently transfer the protected content to other devices, the time period within which the second device may play the protected content, etc. The higher the security level of the second device is, the more rights accorded thereto. The second device may further need to meet a minimum security level in order for it to receive the protected content.
    Type: Grant
    Filed: November 12, 2012
    Date of Patent: April 12, 2016
    Assignees: TIME WARNER CABLE ENTERPRISES LLC, COMCAST CABLE HOLDINGS, LLC
    Inventors: William Helms, John B. Carlucci, Michael T. Hayashi, John W. Fahrny
  • Patent number: 9043827
    Abstract: A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: May 26, 2015
    Assignee: PRIME RESEARCH ALLIANCE E, INC.
    Inventors: Maxim Rapoport, Charles A. Eldering
  • Patent number: 9032538
    Abstract: A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being transmitted to a receiving apparatus. Accordingly, a problem that the receiving apparatus receives the authentication start instruction from the relay apparatus before locking the authentication start video signal and cannot perform authentication processing normally, leading to a failure in authentication. A correction time is decided based on a resolution of the authentication start video signal transmitted from the receiving apparatus and a combination of receiving apparatuses and transmitting apparatuses connected to the relay apparatus.
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: May 12, 2015
    Assignee: Onkyo Corporation
    Inventor: Hiroki Okada
  • Patent number: 9027143
    Abstract: Various embodiments of a system and method for multipronged authentication are described. Embodiments may include a client system that implements a runtime component configured to consume content. The client system may be configured to implement a digital rights management component configured to perform one or more cryptographic operations and also authenticate the runtime component. The client system may receive encrypted content from a remote computer system and receive a given authentication component from a remote computer system; that authentication component may be configured to authenticate the runtime component. The client system may, based on authentication of the runtime component by both the digital rights management component and the given authentication component, decrypt at least a portion of the encrypted content.
    Type: Grant
    Filed: August 26, 2009
    Date of Patent: May 5, 2015
    Assignee: Adobe Systems Incorporated
    Inventors: Sunil C. Agrawal, Joseph D. Steele
  • Patent number: 8984652
    Abstract: A device including a communication interface and processing logic is provided. The communication interface may receive digital rights management security information and content from a source device, the digital rights management information having been deactivated in the source device. The processing logic may reactivate the digital rights management security information and may render the content according to the digital rights management security information.
    Type: Grant
    Filed: January 29, 2007
    Date of Patent: March 17, 2015
    Assignees: Sony Corporation, Sony Mobile Comunications AB
    Inventors: Peter Ljung, Stefan Andersson
  • Patent number: 8949967
    Abstract: An information management apparatus includes a first control information setting unit that sets first control information for permitting use of information within a destination terminal to the information; a second control information setting unit that sets second control information for permitting the destination terminal to forward the information to the information; a displaying permitting unit that controls, when information set with the first control information is received from a source terminal, to permit the information to be used locally within an apparatus; and a forwarding permitting unit that controls, when information set with the second control information is received from a source terminal, to permit the information to be forwarded.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: February 3, 2015
    Assignee: Fujitsu Limited
    Inventor: Naoko Hayashida
  • Patent number: 8924742
    Abstract: Rather than storing all data in the same manner, e.g., an encrypted manner, a security level with which to associate received data of a given type may be determined. Subsequently, distinct types of data may be stored in a distinct manner, with the manner of storage having a security level appropriate to the type of data. For example, a first type of data may be stored in an encrypted manner (i.e., with a high level of security), while a second level of data may be stored in a plain text manner (i.e., with a low level of security).
    Type: Grant
    Filed: February 11, 2009
    Date of Patent: December 30, 2014
    Assignee: BlackBerry Limited
    Inventors: Kristof Takacs, Neil Patrick Adams, Ravi Singh, Van Quy Tu
  • Patent number: 8908920
    Abstract: Systems and methods for identifying, tracking, tracing and determining the authenticity of a good are described herein. In some embodiments, a system includes an imaging system, a database, and an authentication center. The imaging system is configured to capture an image of a unique signature associated with a good at the good's origin. The unique signature can be, for example, a random structure or pattern unique to the particular good. The imaging system is configured to process the image of the good to identify at least one metric that distinguishes the unique signature from unique signatures of other goods. The database is configured to receive information related to the good and its unique signature from the imaging system; and is configured to store the information therein.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: December 9, 2014
    Assignee: Covectra, Inc.
    Inventors: Stephen M. Wood, Richard Smith, David Bear, George Kechter, Conor O'Neill
  • Patent number: 8880404
    Abstract: An electronic device configured for adaptively encoding a watermarked signal is described. The electronic device includes modeler circuitry that determines watermark data based on a first signal. The electronic device also includes coder circuitry coupled to the modeler circuitry. The coder circuitry determines a low priority portion of a second signal and embeds the watermark data into the low priority portion of the second signal to produce a watermarked second signal.
    Type: Grant
    Filed: October 18, 2011
    Date of Patent: November 4, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Stephane Pierre Villette, Daniel J. Sinder
  • Patent number: 8874895
    Abstract: The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and a control unit performs control as to whether to obtain the device information through a wireless communication unit or obtain the device information through a wire communication unit, and as to whether to transmit image information encrypted by a first encryption unit from the wireless communication unit or transmit image information encrypted by a second encryption unit from the wire communication unit when the verification unit verifies that the data receiving apparatus is authorized.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: October 28, 2014
    Assignee: Sony Corporation
    Inventor: Toru Nagara
  • Patent number: 8863310
    Abstract: A method and apparatus for improved digital rights management is provided.
    Type: Grant
    Filed: November 22, 2011
    Date of Patent: October 14, 2014
    Assignee: Samsung Information Systems America, Inc.
    Inventor: Eric Buchanan
  • Patent number: 8862899
    Abstract: In embodiments according to the present invention an encryption switch is used to authorize access to LUNs from client VMs present in the cloud provider network. The encryption switch includes responder side software for an authentication protocol and an agent in the client VM includes the requestor side of the authentication protocol. The certificate of the client is securely provided to the encryption switch, which associates the client VM with the LUN. The client private key is securely provided to the client VM, which retains it only non-persistently. The client VM requests LUN access and performs an authentication handshake with the encryption switch. If successful the client VM than has access to the LUN. As the original certificate is linked to the client, if the client is itself a VM, should the client be moved to a different host, the certificate moves with it and LUN accessibility is maintained.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: October 14, 2014
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Aseem Rastogi, Lintu Thomas, Christopher Del Signore
  • Patent number: 8856535
    Abstract: An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data to create signatures corresponding to each of the multiple channels. Based on similarities between signatures, the analyzer may then identify clusters of signatures associated with devices that share channels or portions of channels.
    Type: Grant
    Filed: November 1, 2010
    Date of Patent: October 7, 2014
    Assignee: Comcast Cable Communications, LLC
    Inventors: Lawrence D. Wolcott, Phillip F. Chang
  • Patent number: 8856548
    Abstract: An encryption switch which is used in a cloud environment to secure data on the LUNs used by the clients. A client provides a certificate to the cloud service. The encryption switch develops a cloud crypto domain (CCD) as a secure area, with the data at rest on the LUNs encrypted. The encryption switch develops a master key for client use in the CCD, which is provided to the client encrypted by the client's public key. Data encryption keys (DEKs) are created for each LUN and provided to the client. The DEKs are stored in a key vault by the client for use if needed. The cloud service provisions a client VM to be used with the encrypted LUN and develops a nexus between the LUN and the client VM for the encryption switch to use in data operations. The client communicates through the client VM to access the LUN.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: October 7, 2014
    Assignee: Brocade Communications Systems, Inc.
    Inventors: Christopher Del Signore, Aseem Rastogi, Lintu Thomas
  • Patent number: 8833663
    Abstract: The invention relates to identification documents, and in particular to pre-printing processing covert images, such as UV or IR images, provided on such identification documents. In one implementation, the invention provides a method of processing a digital image that is to be printed on a surface of an identification document as a fluorescing-capable image to improve the quality of the image. Edges or boundaries are detected within the image, the detected edges or boundaries forming an intermediate image. The edges or boundaries within the image are emphasized, and the emphasized image is used for printing the covert image. In some implementations of the invention, a digital watermark is embedded in the covert image.
    Type: Grant
    Filed: October 18, 2010
    Date of Patent: September 16, 2014
    Assignee: L-1 Secure Credentialing, Inc.
    Inventors: Nelson T. Schneck, Charles F. Duggan, Robert L. Jones, Daoshen Bi
  • Patent number: 8826014
    Abstract: A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.
    Type: Grant
    Filed: January 21, 2005
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jeffery Bart Jennings, Kofi Kekessie
  • Patent number: 8774405
    Abstract: The invention relates to a value-added service applied to the broadcasting of video programs or content and more particularly to mobile television (Mobile TV). The invention promotes service continuity during the broadcasting of programs having an undefined duration and the broadcasting of which has been subject to a Pay-Per-View type purchase.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: July 8, 2014
    Assignee: Gemalto SA
    Inventor: Anne-Marie Praden
  • Patent number: 8751825
    Abstract: A method of storing content, in accordance with one embodiment of the present invention, includes receiving an item of content in a protected format and a key corresponding to the item of content. The item of content in its protected format may be stored on a mass storage device. The key may also be stored in a safeguarded format on the mass storage device.
    Type: Grant
    Filed: December 15, 2004
    Date of Patent: June 10, 2014
    Assignee: Nvidia Corporation
    Inventors: Michael B. Diamond, Jonathan B. White
  • Patent number: 8745742
    Abstract: A computer-implemented method for processing web content may comprise receiving web content encoded with malicious steganographic code. Before presenting the web content, the method may comprise modifying the web content to create modified content such that information conveyed by the malicious steganographic code is at least partially corrupted in the modified content. Additionally, a functionality of the modified content may be at least substantially similar to a functionality of the web content following modification of the web content to create the modified content. Various other methods, computer-readable media, and systems are also disclosed.
    Type: Grant
    Filed: November 3, 2008
    Date of Patent: June 3, 2014
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, William E. Sobel, Bruce McCorkendale
  • Patent number: 8732803
    Abstract: Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code.
    Type: Grant
    Filed: October 3, 2013
    Date of Patent: May 20, 2014
    Assignee: Credibility Corp.
    Inventors: Jeffrey M. Stibel, Aaron B. Stibel, Peter Delgrosso, Shailen Mistry, Bryan Mierke, Paul Servino, Charles Chi Thoi Le, David Lo, David Allen Lyon
  • Patent number: 8732795
    Abstract: A computer-implemented authentication method is described. The method includes the steps of (a) receiving an authentication request at an authentication computing system, the request including a resource identifier, (b) identifying one or more authentication pools associated with the resource identifier, each authentication pool including at least one authentication method implementation, (c) executing a pool authentication process for the one or more identified authentication pools, and (d) transmitting a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: May 20, 2014
    Assignee: Epic Systems Corporation
    Inventors: Trent N. Skeel, Eric W. Cooper, Travis Keshav
  • Patent number: 8724809
    Abstract: A method and system for tuning to a scrambled television channel is provided. One implementation involves receiving a channel selection from a user, tuning to the selected scrambled channel, checking a cache for Conditional Access (CA) descrambling information associated with the selected channel, and in case of a cache hit, then retrieving the descrambling information associated with the selected channel from the cache for descrambling the scrambled channel.
    Type: Grant
    Filed: August 12, 2008
    Date of Patent: May 13, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Fei Xie, Victor Liang, Kitae Nahm, Juan Carlos Trujillo
  • Patent number: 8713700
    Abstract: When a user carries a mobile terminal with confidential information, such as customer information, stored therein, it is required to maintain information confidentiality and to prevent an unauthorized third party from accessing the confidential information even if the mobile terminal is stolen. According to the disclosed access control method, an encryption key is generated based on a planned route and the information is encrypted. When the user accesses the information, a decryption key is generated based on the actual movement route that is regularly acquired. The encrypted information can be decrypted if the planned route and the movement route match.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: April 29, 2014
    Assignee: Hitachi Automotive Sytstems, Ltd.
    Inventors: Tsuneo Sobue, Tatsuaki Osafune
  • Patent number: 8655318
    Abstract: A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous operation when roaming, the mobile node identifies itself with a coded identifier instead of a public identifier. The coded identifier used at a given time includes the time-based code that is valid for that given time. To authenticate the mobile node, a serving system receives authentication information from the mobile node and forwards the authentication information to a home system. The authentication information includes the current time-based code and a timestamp. The home system identifies the mobile node from the current time-based code and the timestamp. The home system then uses the authentication information to authenticate the mobile node.
    Type: Grant
    Filed: March 27, 2013
    Date of Patent: February 18, 2014
    Assignee: Sprint Spectrum L.P.
    Inventors: Tong Zhou, George Jason Schnellbacher
  • Patent number: 8639930
    Abstract: Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code.
    Type: Grant
    Filed: November 7, 2011
    Date of Patent: January 28, 2014
    Assignee: Credibility Corp.
    Inventors: Jeffrey M. Stibel, Aaron B. Stibel, Peter Delgrosso, Shailen Mistry, Bryan Mierke, Paul Servino, Charles Chi Thoi Le, David Lo, David Allen Lyon
  • Patent number: 8627507
    Abstract: There is disclosed a media file distribution system and method. An asset management and delivery system and method for the distribution of digital files and data is provided. There are two major functions, with sub-functions within each. The system first serves as a fully automated management system for a company involved in video/file distribution, such as in video on demand (VOD) or other digital file industries. The system can ingest, prepare, schedule, transmit, track and report on any aspect of the business chain. Secondly, it also serves as a product for both content providers and recipients to be able to view, manage and run their entire content offering remotely from anywhere through the Internet.
    Type: Grant
    Filed: March 23, 2009
    Date of Patent: January 7, 2014
    Assignee: Vubiquity Entertainment Corporation
    Inventors: Christopher Stasi, Kelly Perdue, Dom Stasi
  • Patent number: 8621559
    Abstract: Methods and systems for managing data communications are described. The method includes receiving a data communication; analyzing the data communication to determine a particular type of sender or recipient activity associated with the data communication based at least in part on an application of a plurality of tests to the data communication; assigning a total risk level to the data communication based at least in part on one or more risks associated with the particular type of sender or recipient activity and a tolerance for each of the one or more risks; comparing the total risk level assigned to the data communication with a maximum total acceptable level of risk; and allowing the data communication to be delivered to a recipient in response to the comparison indicating that the total risk level assigned to the data communication does not exceed the maximum total acceptable level of risk.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Dmitri Alperovitch, Paula Greve, Sven Krasser, Tomo Foote-Lennox
  • Patent number: 8572708
    Abstract: A method that provides efficient integration of infrastructure for federated single sign on (e.g. Liberty ID-FP framework) and generic bootstrapping architecture (e.g. 3GPP GAA/GBA architecture) uses an integrated proxy server (IAP). The IAP is inserted in the path between a user and a service provider (SP). The IAP differentiates type of access and determines corresponding operative state to act as a liberty enabled server or as a GAA/GBA network application function. A Bootstrapping, Identity, Authentication and Session Management arrangement (BIAS) leverages on 3GPP GAA/GBA infrastructure to provide an integrated system for handling Liberty Federated SSO and 3GPP GAA/GBA bootstrapping procedures at the same time. This method and arrangement provides improved use of infrastructure elements and performance for authenticated service access.
    Type: Grant
    Filed: December 28, 2006
    Date of Patent: October 29, 2013
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Luis Barriga, David Castellanos Zamora
  • Patent number: 8549284
    Abstract: A method and system is provide for performing a certificate validity check between a vehicle receiving a message and an entity transmitting the message in a vehicle-to-entity communication system. The message includes a digital certificate. A determination is made whether the digital certificate is expired. A determination is made whether the digital certificate is listed in a local certificate revocation list stored in a memory of the vehicle in response to a determination that the digital certificate is not expired, otherwise, disregarding the message. An elapsed time is determined since a last freshness check in response the digital certificate not listed in the local certificate revocation list. The elapsed time is compared to a threshold requirement. The digital message is accepted for additional processing in response to the freshness check meeting the threshold requirement, otherwise, the message is disregarded.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: October 1, 2013
    Assignee: GM Global Technology Operations LLC
    Inventor: Arzad A. Kherani
  • Patent number: 8542825
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: September 24, 2013
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
  • Patent number: 8543824
    Abstract: A cryptographic hash of content (e.g., applications, documents, widgets, software, music, videos, etc.) is created and made available for distribution over a network (or by other means) as part of a ticket file. The ticket file can be cryptographically signed to ensure its authenticity. The ticket file and content can be downloaded separately (e.g., from different websites) to a user system (e.g., a computer, mobile phone, media player/recorder, personal digital assistant (PDA), etc.). The user system verifies the signature of the ticket file and the content hash to ensure that the content has not been compromised. The ticket file can include information relating to downloading the content (e.g., a Uniform Resource Identifier (URI)) and other meta-data (e.g., hash type, content information, public key, size, version, etc.).
    Type: Grant
    Filed: April 20, 2006
    Date of Patent: September 24, 2013
    Assignee: Apple Inc.
    Inventors: John O. Louch, Aaron Sige, Maciej Stachowiak
  • Patent number: 8543091
    Abstract: Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of providing secure Short Message Service (SMS) communications comprises requesting that SMS data to be sent from a client device to a remote location be encrypted. The method also comprises encrypting the SMS data by processing the SMS data with a Message Authentication Code (MAC) and a timestamp and/or counter along with second factor authentication information. The method further comprises sending the encrypted SMS data to the remote location by a secure SMS application via a regular SMS channel of the client device.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: September 24, 2013
    Assignee: eBay Inc.
    Inventor: Upendra Mardikar
  • Patent number: 8526610
    Abstract: A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means may operate in accordance with rules received as part of the streamed content, or through a side-band channel. The rules may specify allowed uses of the content, including whether or not the content can be copied or transferred, and whether and under what circumstances received content may be “checked out” of one device and used in a second device. The rules may also include or specify budgets, and a requirement that audit information be collected and/or transmitted to an external server. In a different aspect, the apparatus may include a media player designed to call plugins to assist in rendering content.
    Type: Grant
    Filed: October 5, 2010
    Date of Patent: September 3, 2013
    Assignee: Intertrust Technologies Corporation
    Inventors: Talal G. Shamoon, Ralph D. Hill, Chris D. Radcliffe, John P. Hwa, W. Olin Sibert, David M. Van Wie
  • Patent number: 8515065
    Abstract: An input processing circuit decodes a digital video signal selected by an input signal selector. Decryption circuits each decrypt the encryption of a video signal output from the input processing circuit, and generate an authentication key of the encryption. A video signal selector selects and outputs one of the video signals output from the decryption circuits, to a monitor. The decryption circuits each include a pseudo-signal generation circuit which extracts information from the video signal, and based on the extracted information, generates a pseudo-video signal.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: August 20, 2013
    Assignee: Panasonic Corporation
    Inventors: Shinya Murakami, Ryogo Yanagisawa, Syuji Kato, Toru Iwata
  • Patent number: 8488842
    Abstract: Systems and methods for identifying, tracking, tracing and determining the authenticity of a good include an imaging system, a database, and an authentication center. The imaging system is configured to capture an image of a unique signature associated with a good. The unique signature can be, for example, a random structure or pattern unique to the particular good. The imaging system is configured to process the image to identify at least one metric that distinguishes the unique signature from unique signatures of other goods. The database is configured to receive information related to the good and its unique signature from the imaging system, and to store the information therein. The authentication center is configured to analyze the field image with respect to the information stored in the database to determine whether the unique signature in the field image is a match to the captured image stored in the database.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: July 16, 2013
    Assignee: Covectra, Inc.
    Inventors: Stephen M. Wood, Richard Smith, David Bear, George Kechter, Conor O'Neill
  • Patent number: 8478266
    Abstract: A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous operation when roaming, the mobile node identifies itself with a coded identifier instead of a public identifier. The coded identifier used at a given time includes the time-based code that is valid for that given time. To authenticate the mobile node, a serving system receives authentication information from the mobile node and forwards the authentication information to a home system. The authentication information includes the current time-based code and a timestamp. The home system identifies the mobile node from the current time-based code and the timestamp. The home system then uses the authentication information to authenticate the mobile node.
    Type: Grant
    Filed: March 7, 2006
    Date of Patent: July 2, 2013
    Assignee: Sprint Spectrum L.P.
    Inventors: Tong Zhou, George Jason Schnellbacher
  • Patent number: 8453247
    Abstract: Provided are apparatuses, systems and methods for providing security services. The apparatus includes a network interface unit for transceiving data between a control device and a management device, a controller for controlling provision of services requested from the control device through the network interface unit when a permit time, during which a target of security service is allowed to be given services, is longer than a used time, during which predetermined services are provided to the target of security service, and a used time processing unit for updating the used time by reflecting time during which the services are provided. When security services are performed, services of a controlled device can be provided during the permitted time according to a user or a control device.
    Type: Grant
    Filed: October 11, 2005
    Date of Patent: May 28, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Tae-jin Jeong, Hyun-gyoo Yook, Sung-min Lee, Se-hee Han
  • Patent number: 8438388
    Abstract: A method and apparatus for distributing Certificate Revocation List (CRL) information in an ad hoc network are provided. Ad hoc nodes in an ad hoc network can each transmit one or more certificate revocation list advertisement message(s) (CRLAM(s)). Each CRLAM includes an issuer certification authority (CA) field that identifies a certification authority (CA) that issued a particular certificate revocation list (CRL), a certificate revocation list (CRL) sequence number field that specifies a number that specifies the version of the particular certificate revocation list (CRL) that was issued by the issuer certification authority (CA). Nodes that receive the CRLAMs can then use the CRL information provided in the CRLAM to determine whether to retrieve the particular certificate revocation list (CRL).
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: May 7, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Shanthi E. Thomas, Erwin Himawan, Ananth Ignaci, Anthony R. Metke
  • Patent number: 8429734
    Abstract: Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: April 23, 2013
    Assignee: Symantec Corporation
    Inventors: Paul Agbabian, William E. Sobel, Bruce McCorkendale
  • Patent number: 8424072
    Abstract: Described herein are techniques for operating a security server to determine behavioral profiles for entities in a network and to detect attacks or unauthorized traffic in a network based on those behavioral profiles. In one technique, a behavioral profile may be generated based on requests for security operations to be performed that are received at a security server from an entity in a network. The behavioral profile may be generated using learning techniques, including artificial intelligence techniques such as neural networks. When the security server receives from an entity one or more requests for security operations to be performed, the security server may compare properties of the requests to the behavioral profile for the entity and properties of requests commonly sent by the entity. The security server may determine a similarity score indicating how similar the request are to the behavioral profile and to requests commonly received from the entity.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Jack Pullikottil, Mitica Manu
  • Patent number: 8416057
    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
    Type: Grant
    Filed: June 8, 2012
    Date of Patent: April 9, 2013
    Assignee: International Business Machines Corporation
    Inventors: Frederic Bauchot, Jean-Yves Clement, Gerard Marmigere, Pierre Secondo
  • Patent number: 8407467
    Abstract: A ubiquitous audio reproducing and servicing method and apparatus for streaming or downloading a lossless audio source from a Content Provider (CP) using a lossy audio source card as an authentication key. The ubiquitous audio reproducing method includes determining whether a memory card storing lossy audio sources and their authentication codes is inserted, if it is determined that the memory card is inserted, transmitting an authentication code of a lossy audio source in the memory card and a system unique Identifier (ID) to a content server by connecting to the content server via a network, and if the content server allows the use of a lossless audio source corresponding to the lossy audio source using the authentication code, streaming or downloading the lossless audio source from the content server.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: March 26, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Jong-bae Kim