With Password Or Key Patents (Class 711/164)
-
Patent number: 10044752Abstract: A single system for detecting and blocking all cases of null-byte injection in all text data received for a network, before the text reaches potentially vulnerable services in the network. A set of directed graphs is received, each one of the directed graphs corresponding to a singly encoded null-byte that is encoded according to a corresponding character encoding method contained within a set of character encoding methods. The set of directed graphs is used to generate an output finite-state machine that models detection of at least one multiply encoded null-byte that is encoded according to at least one of the character encoding methods contained in the set of character encoding methods. The output finite-state machine is loaded into an attack detection and prevention system that receives input text, and that detects null-bytes, including multiply encoded null-bytes, within the input text.Type: GrantFiled: September 30, 2015Date of Patent: August 7, 2018Assignee: EMC IP Holding Company LLCInventor: Andreas Wittenstein
-
Patent number: 10038687Abstract: The present invention relates to a terminal and a control method thereof which automatically log in to an application, which is installed on a common smart apparatus that multiple users use, using a personal smart device used by an individual such as a smart phone.Type: GrantFiled: April 2, 2014Date of Patent: July 31, 2018Assignee: LG ELECTRONICS INC.Inventors: Hansam Jung, Jaeryong Kim
-
Patent number: 10037435Abstract: Providing an encrypted search index for performing searches on encrypted documents, the method comprising: (i) providing a set of documents, the documents comprising a plurality of unencrypted phrases; (ii) providing a master key; (iii) providing, based on the master key, for each phrase a set of encryption keys comprising one or more encryption keys; (iv) selecting, for each phrase, one encryption key of the set of encryption keys; (v) encrypting each phrase with the selected encryption key; and (vi) building an index based on the encrypted phrases, the index comprising information regarding which encrypted phrase is comprised within a certain document.Type: GrantFiled: August 11, 2016Date of Patent: July 31, 2018Assignee: International Business Machines CorporationInventors: Michael Baessler, Jochen Doerre, Thomas A. P. Hampp-Bahnmueller, Philipp Hoffmann, Daniel Pittner, Werner Schollenberger
-
Patent number: 9971516Abstract: Systems, methods, and computer program products retrieve data from a low retrieval speed device. A request is made to retrieve data from the low retrieval speed device. A determination is made that the time to respond to the request will exceed a threshold amount of time. In response to the determination that the time to respond to the request will exceed the threshold amount of time, a load stall interrupt is generated. In response to the load stall interrupt, one or more system resources associated with a source of the request are released.Type: GrantFiled: October 17, 2016Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Charles R. Johns, Kirk E. Morrow, Michael J. Neuling, James Xenidis
-
Patent number: 9940349Abstract: Systems and methods of the present disclosure facilitate synchronizing data between a device management system and ticketing systems. In some embodiments, the system includes an update module, a mapping module, and a service board selection module. The update module may be configured to update ticketing information about a ticketing ticket on the ticketing system to match device management information about a device management ticket on the device management system. The mapping module may be configured to select a ticket category for a device management ticket on the device management system responsive to the device management information about the device management ticket. The service board selection module may be configured to select a service board for a ticketing ticket on the ticketing system.Type: GrantFiled: December 17, 2015Date of Patent: April 10, 2018Assignee: Connectwise, Inc.Inventors: Gregory Francis Buerk, Scott Logan
-
Patent number: 9928079Abstract: The use of a sleep, or halt, instruction enables a processor to halt execution when read from a non-volatile memory. The opcode for the sleep instruction is the same value as the constant bit value of an un-programmed, nonvolatile memory. When the opcode is read by the processor, execution is halted and the processor enters a wait or sleep mode. During the sleep mode, firmware is programmed into memory with another means such as an external host processor. When a valid trigger event occurs, for instance, external or internal interrupts or reset activation, the processor then exits the sleep mode and starts instruction etching at the PC_INIT address.Type: GrantFiled: September 23, 2014Date of Patent: March 27, 2018Assignee: Dialog Semiconductor (UK) LimitedInventor: Philip Todd
-
Patent number: 9922208Abstract: Embodiments of the present application relate to a method, apparatus, and system for managing confidential information. The method includes accessing stored target information comprising a public part and a confidential part, wherein an identifier corresponds to the confidential part of the target information, outputting the public part of the target information and the corresponding identifier, wherein the public part of the target information comprises at least first address information, receiving location information and a to-be-recognized identifier, wherein the location information is associated with a current location of a mobile terminal, determining whether the location information is consistent with the first address information, and in the event that the location information is consistent with the first address information, sending the confidential part of the target information associated with the to-be-recognized identifier to the mobile terminal.Type: GrantFiled: January 24, 2017Date of Patent: March 20, 2018Assignee: Alibaba Group Holding LimitedInventor: Lizhong Li
-
Patent number: 9921967Abstract: Methods and apparatus are disclosed for using a shared page miss handler device to satisfy page miss requests of a plurality of devices in a multi-core system. One embodiment of such a method comprises receiving one or more page miss requests from one or more respective requesting devices of the plurality of devices in the multi-core system, and arbitrating to identify a first page miss requests of the one or more requesting devices A page table walk is performed to generate a physical address responsive to the first page miss request. Then the physical address is sent to the corresponding requesting device, or a fault is signaled to an operating system for the corresponding requesting device responsive to the first page miss request.Type: GrantFiled: July 26, 2011Date of Patent: March 20, 2018Assignee: Intel CorporationInventors: Christopher D. Bryant, Rama S. Gopal
-
Patent number: 9910611Abstract: A processing system includes a processing core to execute a task and a memory management unit, coupled to the core. The memory management unit includes a protection key register comprising a plurality of fields. Each field comprising a set of bits reflecting a memory access permission for each of a plurality of memory domains. The memory management unit also includes a plurality of protection key mask registers. Each of the protection key mask registers comprising a mask having a plurality of bits, each bit reflecting an access permission to a corresponding field of the protection key register by a code page residing in a memory domain of the plurality of memory domains identified by an index of the protection key mask register.Type: GrantFiled: May 29, 2015Date of Patent: March 6, 2018Assignee: Intel CorporationInventors: David A. Koufaty, Ravi L. Sahita
-
Patent number: 9876646Abstract: Systems and methods for managing the identity of a user, for managing the identity of the user in a public storage facility, and for certifying pending transactions for a user are disclosed. One example method includes receiving, at an input device, personal data that identifies the user. The personal data is represented as input data. The input device is configured to process a hashing function to provide a hash value and user accessible interface for transmitting the hash value and a public key of the user to the public storage facility, e.g., block chain, and for receiving back from the public storage facility a transaction number corresponding to the hash value and the public key. In one example, the input device is configured to encrypt the hash value, a time stamp and the transaction number with a public key of a certification entity to provide user certifiable data to the certification entity. The certification entity is configured to access the public storage facility to verify the user.Type: GrantFiled: May 5, 2016Date of Patent: January 23, 2018Assignee: ShoCard, Inc.Inventors: Armin Ebrahimi, Jeff Weitzman
-
Patent number: 9875189Abstract: A processor for supporting secure memory intent is disclosed. The processor of the disclosure includes a memory execution unit to access memory and a processor core coupled to the memory execution unit. The processor core is to receive a request to access a convertible page of the memory. In response to the request, the processor core to determine an intent for the convertible page in view of a page table entry (PTE) corresponding to the convertible page. The intent indicates whether the convertible page is to be accessed as at least one of a secure page or a non-secure page.Type: GrantFiled: June 12, 2015Date of Patent: January 23, 2018Assignee: Intel CorporationInventors: Krystof C. Zmudzinski, Siddhartha Chhabra, Uday R. Savagaonkar, Simon P. Johnson, Rebekah M. Leslie-Hurd, Francis X. McKeen, Gilbert Neiger, Raghunandan Makaram, Carlos V. Rozas, Amy L. Santoni, Vincent R. Scarlata, Vedvyas Shanbhogue, Ilya Alexandrovich, Ittai Anati, Wesley H. Smith, Michael Goldsmith
-
Patent number: 9823841Abstract: A definition is received of at least one data object and a compute object from a host at a storage compute device. A first key is associated with the at least one data object and a second key is associated with the compute object. A command is received from the host to perform a computation that links the first and second keys. The computation is defined by the compute object and acts on the data object. The computation is performed via the storage compute device using the compute object and the data object in response to the command.Type: GrantFiled: September 15, 2014Date of Patent: November 21, 2017Assignee: SEAGATE TECHNOLOGY LLCInventors: David Scott Ebsen, Ryan James Goss, Jeffrey L. Whaley, Dana Simonson
-
Patent number: 9813382Abstract: In some embodiments, a method includes establishing a secured connection between a client device and a subordinate web service of a single sign-on service for a user, using a shared cryptographic key in a cookie stored on the client device that was transmitted over a different secured connection by a master web service of the single sign-on service, as part of authentication of the user for the single sign-on service.Type: GrantFiled: March 7, 2007Date of Patent: November 7, 2017Assignee: ADOBE SYSTEMS INCORPORATEDInventors: Sunil Agrawal, Andrei Sheretov
-
Patent number: 9800614Abstract: A method carried out at a point of contact (e.g., reverse proxy, a web server plug-in, or the like) that serves as an intermediary between a client browser and one or more back-end applications (or application component), wherein each back-end application has the capability to set its own server-side session management data with respect to the point of contact that is independent of any client-side session management data set by the point of contact and used by the point of contact to manage a user session. The method begins as a given back-end application returns a response to a first request that has been issued from the client browser (the first request having been received at the point of contact and passed to a back end application or component for processing).Type: GrantFiled: May 23, 2007Date of Patent: October 24, 2017Assignee: International Business Machines CorporationInventors: Heather Maria Hinton, Anthony Scott Moran, Benjamin Brewer Harmon
-
Patent number: 9798730Abstract: A method for redirecting, to a second machine, without user intervention, a request for access to a folder on a first machine, the request made by a resource executing within a remote access session on the first machine, includes receiving, by a component on a first machine, folder mapping information associated with a folder provided by a shell namespace on a second machine. The component intercepts a request by a resource executing on the first machine for access to file system data on the first machine. The component redirects the request to the second machine responsive to the received folder mapping information.Type: GrantFiled: June 6, 2014Date of Patent: October 24, 2017Assignee: Citrix Systems, Inc.Inventors: A T M Shafiqul Khalid, Abolfazl Sirjani
-
Patent number: 9774909Abstract: Methods, systems, and computer readable media can be operable to facilitate a unique protection of recorded content. A central device may be configured to establish and maintain associations between unique passwords and one or more individual recordings. A user may provide a unique password to be associated with one or more individual recordings. When a recording is associated with a unique password, the central device may require entry of the unique password before carrying out an action such as playback or deletion of the recording.Type: GrantFiled: September 2, 2015Date of Patent: September 26, 2017Assignee: ARRIS Enterprises LLCInventors: Pradeep Kumar Sahoo, Belmannu Harekrishna Acharya, Murali S. Sahasranaman
-
Patent number: 9766950Abstract: There are provided methods for single-owner multi-consumer work queues for repeatable tasks. A method includes permitting a single owner thread of a single owner, multi-consumer, work queue to access the work queue using atomic instructions limited to only a single access and using non-atomic operations. The method further includes restricting the single owner thread from accessing the work queue using atomic instructions involving more than one access. The method also includes synchronizing amongst other threads with respect to their respective accesses to the work queue.Type: GrantFiled: September 11, 2015Date of Patent: September 19, 2017Assignee: International Business Machines CorporationInventors: Maged M. Michael, Vijay Anand Saraswat, Martin Vechev
-
Patent number: 9740638Abstract: A system for preventing data remanence in memory is provided. The system includes a computing device, a memory chip coupled to the computing device and including memory, and a heater, the heater configured to prevent data remanence in a memory by providing heat to at least a portion of the memory. The memory includes a plurality of bits configured to electronically store data.Type: GrantFiled: January 7, 2016Date of Patent: August 22, 2017Assignee: Elwha LLCInventors: Roderick A. Hyde, Lowell L. Wood, Jr.
-
Patent number: 9729680Abstract: Methods and systems are disclosed to embed valid-field (VF) bits into classification keys for network packet frames. The embedded VF bits allow for extracted data from existing fields associated with frame data to be distinguished from default data used for missing fields where this extracted data and default data has been included within a frame classification key generated for a network packet frame. In certain embodiments, a valid-field field extraction command (VF-FEC) causes a key generator to embed VF bits into a frame classification key, and the logic state of the VF bits are used to distinguish extracted data from default data. Further, the disclosed embodiments allow VF bits to be selectively cleared based upon a bit mask applied prior to embedding of the VF bits. Still further, users can define VF-FECs and other field extraction commands (FECs) for key generation through one or more programmable key composition rules.Type: GrantFiled: April 23, 2015Date of Patent: August 8, 2017Assignee: NXP USA, Inc.Inventors: Ron Treves, Evgeni Ginzburg, Adi Katz
-
Patent number: 9715505Abstract: A garbage collector scans containers of a storage system, each container containing a plurality of segments referenced by files of the storage system. For each of the containers being scanned constructing a working live segment record (LSR) file in memory, including generating a container LSR for each of the containers being scanned in a sequential order according to container identifiers of the containers, generating segment LSRs associated with the container LSR, each of the segment LSRs corresponding to one of the segments contained in the container, and for each of the segments contained in the container, indicating in a corresponding segment LSR whether the segment is a live segment. The segment LSRs of each container LSR of the working LSR file are translated from the memory into a persistent LSR for each of the containers in a persistent LSR file stored a persistent storage.Type: GrantFiled: September 30, 2014Date of Patent: July 25, 2017Assignee: EMC IP Holding Company LLCInventor: Shishir Mondal
-
Patent number: 9705865Abstract: A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is associated with a service level including at least one of a data type or a data size limit associated with the secure vault, the secure vault being adapted to receive and at least one data entry and securely store the at least one data entry if the at least one of a size or a type of the at least one data entry is consistent with the service level. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device.Type: GrantFiled: April 29, 2015Date of Patent: July 11, 2017Assignee: Intersections, Inc.Inventors: Jonathan Slaton, Ryan B. Johnson, Toan Tran, David Reed, Abhilash Ravindran, George K. Tsantes
-
Patent number: 9703715Abstract: Embodiments of an invention for sharing memory in a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to match an offer to make a page in an enclave page cache shareable to a bid to make the page shareable. The execution unit is to execute the instruction. Execution of the instruction includes making the page shareable.Type: GrantFiled: December 28, 2013Date of Patent: July 11, 2017Assignee: Intel CorporationInventors: Michael A. Goldsmith, Simon P. Johnson, Carlos V. Rozas, Vincent R. Scarlata
-
Patent number: 9672105Abstract: A method of operating a data storage device includes generating at least one pseudo noise (PN) sequence using logical information and physical information for the data storage device. The method also includes converting first data into second data using the at least one PN sequence. The logical information may be a logical address for the data storage device, and the physical information may be a physical address for the data storage device.Type: GrantFiled: March 9, 2015Date of Patent: June 6, 2017Assignee: Samsung Electronics Co., Ltd.Inventors: Jung Soo Chung, Jun Jin Kong, Hongrak Son, Pilsang Yoon, Seong Hyeog Choi
-
Patent number: 9652637Abstract: Aspects of a method and system for allowing no code download in a code download scheme are provided. A system-on-a-chip (SoC) may comprise a security processor, a ROM, and a one-time-programmable (OTP) memory. The security processor may enable fetching code from a restricted function portion of the ROM. The restricted functions may comprise code for booting up the SoC and code that prevents enabling security algorithms within the SoC. The security processor may then enable booting up of at least a portion of the SoC based on the fetched code. The remaining portion of the ROM may comprise code for downloading security code from an external memory, such as a FLASH memory, to an internal memory, such as a RAM, to boot up the SoC. Access to the restricted function portion or the remaining portion of the ROM is based on at least one bit from the OTP memory.Type: GrantFiled: April 26, 2007Date of Patent: May 16, 2017Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.Inventors: Andrew Dellow, Iue-Shuenn Chen, Stephane (Steve) Rodgers, Xuemin (Sherman) Chen
-
Patent number: 9633219Abstract: Providing an encrypted search index for performing searches on encrypted documents, the method comprising: (i) providing a set of documents, the documents comprising a plurality of unencrypted phrases; (ii) providing a master key; (iii) providing, based on the master key, for each phrase a set of encryption keys comprising one or more encryption keys; (iv) selecting, for each phrase, one encryption key of the set of encryption keys; (v) encrypting each phrase with the selected encryption key; and (vi) building an index based on the encrypted phrases, the index comprising information regarding which encrypted phrase is comprised within a certain document.Type: GrantFiled: August 26, 2015Date of Patent: April 25, 2017Assignee: International Business Machines CorporationInventors: Michael Baessler, Jochen Doerre, Thomas A. P. Hampp-Bahnmueller, Philipp Hoffmann, Daniel Pittner, Werner Schollenberger
-
Patent number: 9633213Abstract: The present disclosure describes systems and methods for controlling access to secure debugging and profiling features of a computer system. Some illustrative embodiments include a system that includes a processor, and a memory coupled to the processor (the memory used to store information and an attribute associated with the stored information). At least one bit of the attribute determines a security level, selected from a plurality of security levels, of the stored information associated with the attribute. Asserting at least one other bit of the attribute enables exportation of the stored information from the computer system if the security level of the stored information is higher than at least one other security level of the plurality of security levels.Type: GrantFiled: February 13, 2014Date of Patent: April 25, 2017Assignee: TEXAS INSTRUMENTS INCORPORATEDInventor: Gary L. Swoboda
-
Patent number: 9619647Abstract: A method provides access to an integrated circuit which may comprise a storage containing an unalterable first security key and a memory containing a second security key. The method may comprise: checking the second security key by comparing the first security key and the second security key, if the second security key is valid, providing access to the integrated circuit, optionally depending on the validity of an access key, and if the second security key is invalid, enabling erasing the memory, and storing in the memory a new second security key which corresponds to the first security key. Erasing the memory may be followed by checking the erasing for completeness.Type: GrantFiled: May 7, 2015Date of Patent: April 11, 2017Assignee: NXP USA, Inc.Inventors: Michael Rohleder, Stefan Doll, Clemens Alfred Roettgermann
-
Patent number: 9619058Abstract: A circuit configuration for touch panel controller IC includes a substrate including electrode pins arranged along four border edges thereof for signal transmission, and a controller mounted on the substrate and surrounded by the electrode pins and including processing units arranged in one same direction in a parallel manner, electric contacts arranged in three rows at three sides around the processing units and respectively electrically connected to the electrode pins of the substrate by respective lead wires and steering wires respectively electrically connected between the processing units and the electric contacts. Arranging the processing units in one same direction in a parallel manner minimizes differences in environmental conditions in exposure graphic definition and etch rate, thereby obtaining better circuit component process uniformity, and thus, the variation among the processing units after fabrication can be insignificant and better sensing accuracy can be achieved.Type: GrantFiled: December 23, 2014Date of Patent: April 11, 2017Assignee: eGalax_eMPIA Technology Inc.Inventor: Po-Chuan Lin
-
Patent number: 9607295Abstract: An application store server may download a license to use a selected software application, after purchase of the license, along with the selected software application. The downloaded software application and license may be stored in the wireless mobile communication device. A user of the wireless mobile communication device may run the downloaded software application. In response, the downloaded software application may send a request for permission to run to an application store client in the wireless mobile communication device. The application store client may not return this permission, unless running is determined to be permitted by the downloaded license. The downloaded software application may in addition or instead seek to determine whether running is permitted by the downloaded license. An application store server may download a license to use a selected software application, after purchase of the license, along with the selected software application.Type: GrantFiled: February 24, 2011Date of Patent: March 28, 2017Assignee: Cellco PartnershipInventors: Ashish Rajkumar Gandhi, Abhishek Sumitra Sheth
-
Patent number: 9594674Abstract: Containers of a storage system are scanned, each container containing segments of files, where each file is represented by a file tree having segments in a hierarchical structure. The container live segment records (LSRs) corresponding to one of the containers are created, each of the container LSRs including segment LSRs corresponding to segments contained therein. After the segment LSRs of the container LSRs have been created for all segments of the containers, the segment LSRs of the container LSRs are sequentially traversed based on levels of segments specified in the corresponding segment LSRs to determine and indicate in the corresponding segment LSRs whether the segments are live segments. After all of the segment LSRs of the container LSRs have been traversed, a garbage collection operation is performed to reclaim storage space of segments that are not live segments indicated in the segment LSRs of the container LSRs.Type: GrantFiled: September 30, 2014Date of Patent: March 14, 2017Assignee: EMC IP Holding Company LLCInventor: Shishir Mondal
-
Patent number: 9575787Abstract: Methods and systems for managing requests for access to devices managed by a hypervisor in virtualized computing environment. A hypervisor receives a request for access to a device from a guest. The hypervisor provides an address hint associated with the device to the guest and an association between the address hint and the device is stored in a reference table. Upon receipt of a subsequent request from the guest including the address hint, the hypervisor performs a look-up in the reference table based on the address hint to identify the device and establishes access to the device by the guest.Type: GrantFiled: May 30, 2012Date of Patent: February 21, 2017Assignee: Red Hat Israel, Ltd.Inventors: Michael Tsirkin, Avi Kivity
-
Patent number: 9575903Abstract: Embodiments of memory devices, computer systems, security apparatus, data handling systems, and the like, and associated methods facilitate security in a system incorporating the concept of a security perimeter which combines cryptographic and physical security. The memory device can comprise a memory operable to store information communicated with a processor, and a logic operable to create at least one cryptographic security perimeter enclosing at least one selected region of the memory and operable to manage information communication between the processor and the at least one selected region of the memory.Type: GrantFiled: August 4, 2011Date of Patent: February 21, 2017Assignee: Elwha LLCInventors: Daniel A. Gerrity, Clarence T. Tegreene
-
Patent number: 9530021Abstract: A technique of the present invention includes a storage section for storing contents data and an encryption flag indicating that any one of an encryption recording mode and a non-encryption recording mode is set, an encrypting engine for encrypting contents data using an encryption key when the encryption recording mode is set, and a control section for controlling a storage section so that the encryption key and the encrypted contents data are stored when the encryption recording mode is set. Further, when the setting is changed from the encryption recording mode into the non-encryption recording mode, the control section controls the storage section so that the encryption flag is changed to indicate the setting of the non-encryption recording mode with the continuous storage of the encryption key.Type: GrantFiled: November 15, 2013Date of Patent: December 27, 2016Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventor: Takeshi Otsuka
-
Patent number: 9524401Abstract: There is provided a method for providing access to data securely stored in memory card. An exemplary method comprises specifying first time information corresponding to a time period and storing the first time information in the memory card. The exemplary method also comprises inserting the memory card into a terminal. The exemplary method additionally comprises determining in a control unit included in the memory card, whether the time period has lapsed. The exemplary method also comprises allowing the terminal to access the data until it is determined that the time period has lapsed.Type: GrantFiled: October 12, 2009Date of Patent: December 20, 2016Assignee: Vodafone Holding GMBHInventors: Najib Koraichi, Sebastiaan Hoeksel
-
Patent number: 9477428Abstract: Provided are a computer program product, system, and method for providing access information to a storage controller to determine a storage tier for storing data. Access information is maintained for each data record in a data store, wherein the access information indicates a level of access to each data record in the data store. A write request directed to a data record in the data store is received. A command is generated identifying the data record and including the access information for the data record. The command is transmitted to the storage controller, wherein the storage controller uses the access information to determine one of the plurality of storage tiers on which to store the data record.Type: GrantFiled: January 20, 2015Date of Patent: October 25, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lawrence Y. Chiu, Paul H. Muench, Sangeetha Seshadri
-
Patent number: 9411600Abstract: Instructions and logic provide memory key protection functionality. Embodiments include a processor having a register to store a memory protection field. A decoder decodes an instruction having an addressing form field for a memory operand to specify one or more memory addresses, and a memory protection key. One or more execution units, responsive to the memory protection field having a first value and to the addressing form field of the decoded instruction having a second value, enforce memory protection according to said first value of the memory protection field, using the specified memory protection key, for accessing the one or more memory addresses, and fault if a portion of the memory protection key specified by the decoded instruction does not match a stored key value associated with the one or more memory addresses.Type: GrantFiled: December 8, 2013Date of Patent: August 9, 2016Assignee: Intel CorporationInventors: H. Peter Anvin, Martin G. Dixon
-
Patent number: 9407630Abstract: Resetting a password for a network service account may include redirecting the user to a password reset tool, wherein the user is blocked from network access other than the password reset tool while being redirected. After redirecting the user to the password reset tool, user entry of verification information may be accepted, and the verification information from the user may be compared with known verification information for the user. User entry of a new password may be accepted if the verification information accepted from the user matches the known verification information for the user; and the new password may be stored as the known password for the user. Related systems and computer-program products are also discussed.Type: GrantFiled: September 10, 2014Date of Patent: August 2, 2016Assignee: AT&T Intellectual Property I, L.P.Inventors: Nadia Morris, William J. Conner
-
Patent number: 9386097Abstract: Non-Internet Protocol (IP) centric resources are accessed based on a value in the form of an IP address. This value (represented as the IP address) is converted to a non-IP address, which is to used access one or more non-IP address space resources. This value (represented as the IP address) typically includes an encoding of the non-IP address and/or an indirect reference (e.g., table index, pointer to a memory location) to the non-IP address.Type: GrantFiled: April 23, 2010Date of Patent: July 5, 2016Assignee: Cisco Technology, Inc.Inventors: Landon Curt Noll, Claudio DeSanti
-
Patent number: 9378344Abstract: The present invention discloses a method and apparatus for protecting information based on a data card, and the method comprises: selecting information which needs to be hidden in a terminal device; and storing said information which needs to be hidden in a hidden partition of the data card. The present invention makes attackers not perceive the existence of the information and increases the security of the information in the data card, so as to protect the user's private information better.Type: GrantFiled: May 21, 2010Date of Patent: June 28, 2016Assignee: ZTE CorporationInventor: Qian Shi
-
Physically unclonable function based on programming voltage of magnetoresistive random-access memory
Patent number: 9343135Abstract: One feature pertains to a method of implementing a physically unclonable function. The method includes initializing an array of magnetoresistive random-access memory (MRAM) cells to a first logical state, where each of the MRAM cells have a random transition voltage that is greater than a first voltage and less than a second voltage. The transition voltage represents a voltage level that causes the MRAM cells to transition from the first logical state to a second logical state. The method further includes applying a programming signal voltage to each of the MRAM cells of the array to cause at least a portion of the MRAM cells of the array to randomly change state from the first logical state to the second logical state, where the programming signal voltage is greater than the first voltage and less than the second voltage.Type: GrantFiled: November 5, 2013Date of Patent: May 17, 2016Assignee: QUALCOMM IncorporatedInventors: Xiaochun Zhu, Steven M. Millendorf, Xu Guo, David M. Jacobson, Kangho Lee, Seung H. Kang, Matthew Michael Nowak -
Patent number: 9336413Abstract: A method for accessing shared memory, the method includes loading a private context ID into a private context ID register, where the first private context ID enables a thread to access a private memory region only accessible by the thread. The method further includes receiving, from the thread, a first request to access a shared memory region, loading a shared context ID into a shared context register, permitting, by a memory management unit (MMU), the thread to access the shared memory region using the shared context ID, and receiving, from the thread, a second request to disable access to the shared memory region. The method further includes removing, in response to the second request, the shared context ID from the shared context ID register, where after removing the shared context ID from the shared context ID register the thread is no longer able to access the shared memory region.Type: GrantFiled: November 22, 2013Date of Patent: May 10, 2016Assignee: Oracle International CorporationInventor: Blake Alan Jones
-
Patent number: 9326139Abstract: The present invention provides a method for providing services to a presentation device. The method comprises detecting a service delivery module in a communication system using a communication device and performing an authentication and authorization session between the service delivery module and the communication device, wherein user authentication and authorization is created. The method further comprises connecting to a service information module in said communication system to access services; providing a service request from said communication device to said service information module and initiating a service delivery session with said service information module using said user authentication and authorization information and said service request. Moreover, the method comprises delivering at least one service to said presentation device based on said service request. The present invention further provides a communication system for providing at least one service to a presentation device.Type: GrantFiled: December 19, 2012Date of Patent: April 26, 2016Assignee: Tele2 Sverige ABInventor: Bolin Johan
-
Patent number: 9292710Abstract: Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by violating a design rule provided during a semiconductor manufacturing process. The identification key generating apparatus may include an identification key generator to generate an identification key based on whether a contact or a via used to electrically connect conductive layers in a semiconductor chip shorts the conductive layers, and an identification key reader to read the identification key by reading whether the contact or the via shorts the conductive layers.Type: GrantFiled: January 28, 2011Date of Patent: March 22, 2016Assignee: ICTK CO., LTD.Inventors: Dong Kyue Kim, Byong Deok Choi, Tae Wook Kim
-
Patent number: 9292992Abstract: The invention relates to a method for personalizing an electronic device using an encryption device adaptable to standard certified apparatuses. The encryption device makes it possible to ensure the confidentiality of the transfer of a secret code from the user to a possible personalization server.Type: GrantFiled: August 10, 2011Date of Patent: March 22, 2016Assignee: GEMALTO SAInventors: Pierre Girard, Hamid Choukri
-
Patent number: 9288195Abstract: The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary one of the multiple resources. A second set of login credentials is also transmitted, and access to the secondary one of the multiple resources is granted on the basis of a validated token and second set of login credentials.Type: GrantFiled: December 13, 2013Date of Patent: March 15, 2016Assignee: SecureAuth CorporationInventors: Mark V. Lambiase, Garret Florian Grajek, Jeffrey Chiwai Lo, Tommy Ching Hsiang Wu
-
Patent number: 9268931Abstract: A method for sign-on and sign-out for a computer system. The method includes receiving a first sign-on request for the computer system and obtaining, from the first sign-on request, a first user identifier where the first user identifier corresponds to a first user for the computer system. The method then includes obtaining, from the first sign-on request, a first uniform resource locator (URL) and determining whether the first URL includes a first root name for the computer system. When a determination is made that the first URL includes the first root name for the computer system a first cookie associated with the first user is issued and a first sub-domain name is obtained from the first URL. Also, a second cookie may be issued associated with the first sub-domain name and, when the first cookie and the second cookie are issued, the first user may sign-on to the computer system. In one or more embodiments, the method may include receiving a sign-out request.Type: GrantFiled: August 28, 2012Date of Patent: February 23, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Sarat Chandra Subramaniam, Christian Roy, Venkatesh Veeraraghavan, Nicholas Carl Sturm, Titus Constantin Miron, Matthew Taylor Cohen
-
Patent number: 9262340Abstract: A system can include a processor coupled to a bus; a first memory coupled to the bus, configured to limit access to a privileged portion according to at least protection values; a second memory coupled to the bus and having a privileged supervisory portion configured to be section erasable, access to the second memory being limited according to at least the protection values; and a boot sequence stored in the privileged portion that configures the processor to decode values stored in the supervisory portion into the protection values for storage in protection value registers.Type: GrantFiled: December 29, 2011Date of Patent: February 16, 2016Assignee: Cypress Semiconductor CorporationInventor: Hans van Antwerpen
-
Patent number: 9262620Abstract: A secure communication kit is disclosed. The secure communication kit may include a plurality of tangible security tokens; each security token storing one or more cryptographic keys and a group identifier. A first cryptographic key stored on each security token may correspond to one of the cryptographic key(s) stored on every of the other security tokens. The group identifier stored on each security token may correspond to each group identifier stored on every of the other security tokens. A client device for securely communicating using the secure communication kit is also disclosed.Type: GrantFiled: March 13, 2013Date of Patent: February 16, 2016Inventors: Brian Eli Berl Illion, Leslie-Ann Dominy Kirijian
-
Patent number: 9252949Abstract: Provided are techniques for verifying, by a first device, that a management key block of a second device is valid. A management key block that includes a plurality of verification data, each of the plurality associated with a plurality of security classes ranked from a high to low, is generated. The first device, which is associated with a security class that is higher than a security class associated with the second device, verifies a management key block of the second device by calculating a management key precursor associated with the higher security class and verifying verification data associated with the higher security class. In this manner, the second device is unable to pass an unauthorized, or “spoofed,” management key block.Type: GrantFiled: March 13, 2012Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventor: Matthew F. Rutkowski
-
Patent number: 9252948Abstract: Provided are techniques for verifying, by a first device, that a management key block of a second device is valid. A management key block that includes a plurality of verification data, each of the plurality associated with a plurality of security classes ranked from a high to low, is generated. The first device, which is associated with a security class that is higher than a security class associated with the second device, verifies a management key block of the second device by calculating a management key precursor associated with the higher security class and verifying verification data associated with the higher security class. In this manner, the second device is unable to pass an unauthorized, or “spoofed,” management key block.Type: GrantFiled: November 19, 2010Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventor: Matthew F. Rutkowski