Multiple Computer Communication Using Cryptography Patents (Class 713/150)
  • Patent number: 9424096
    Abstract: Server computers send requests over a network for an allocation of server tasks and processing tasks, the processing task requests having an associated expiration time. The plurality of server computers process received server tasks provided to the server computers in response to the requests, and process processing tasks within the expiration time in response to the requests for processing tasks. The server computers perform the allocated processing tasks only if there are no pending server tasks.
    Type: Grant
    Filed: June 16, 2011
    Date of Patent: August 23, 2016
    Assignee: Kodak Alaris Inc.
    Inventors: Ron Barzel, Felix S. Hsu, Ronald S. Cok
  • Patent number: 9420608
    Abstract: A Machine Type Communication (MTC) device and method of the MTC device are provided for establishing a connection with a base station in a wireless communication network environment. The method includes receiving, by the MTC device, a broadcast message from a base station over a Machine-to-Machine (M2M) broadcast control channel, wherein the broadcast message includes header information and at least one M2M-Random Access CHannel (mRACH) parameter; determining whether an mRACH message can be sent to the base station, based on the header information in the received broadcast message; sending the mRACH message to the base station using the at least one mRACH parameter to establish an uplink connection with the base station, when the mRACH message can be sent to the base station; and receiving a resource assignment message indicating a successful connection establishment with the base station, in response to the mRACH message.
    Type: Grant
    Filed: April 18, 2011
    Date of Patent: August 16, 2016
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Satish Nanjunda Swamy Jamadagni, Sarvesha Anegundi Ganapathi, Pradeep Krishnamurthy Hirisave
  • Patent number: 9411978
    Abstract: A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: August 9, 2016
    Assignee: Open Text S.A.
    Inventor: Simon Dominic Copsey
  • Patent number: 9407692
    Abstract: Load balancing includes receiving, from a client, a connection request to establish a connection with a server; determining load balancing state information based at least in part on the connection request; synchronizing the determined load balancing state information across a plurality of service engines, including to invoke an atomic read-miss-create (RMC) function on a distributed data store service; and distributing the connection to a selected server among a plurality of servers according to a result of the RMC function.
    Type: Grant
    Filed: November 27, 2013
    Date of Patent: August 2, 2016
    Assignee: Avi Networks
    Inventors: Ranganathan Rajagopalan, Murali Basavaiah, Kiron Haltore, Anand Parthasarthy, Abhijeet Joglekar
  • Patent number: 9402180
    Abstract: The invention relates to a method for initiating an OTA session in a mobile radio communication network at the request of a user of a mobile terminal. The OTA session is established between the mobile terminal and a remote OTA server, the mobile terminal including a security element such as a UICC card. According to the invention, the method comprises: i) entering a special code using the man/machine interface of said mobile terminal; ii) said security element intercepting said special code; and iii) opening said OTA session between said mobile terminal and said remote server in a secure mode.
    Type: Grant
    Filed: December 26, 2012
    Date of Patent: July 26, 2016
    Assignee: GEMALTO SA
    Inventors: Lionel Merrien, Patrice Amiel, Eric Preulier
  • Patent number: 9396259
    Abstract: Disclosed are various embodiments of a system for rendering, in a first browser of a computer, a network page of an electronic commerce system. The system stores, in a first data store, a first capture of a rendering of the network page. The system transmits data associated with the first capture to another computer, where a second browser renders the network page based at least upon the data associated with the first capture. The system stores, in a second data store, a second capture of the network page.
    Type: Grant
    Filed: April 18, 2012
    Date of Patent: July 19, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: John S. Yuhan, Ross V. Korsky
  • Patent number: 9392064
    Abstract: The disclosed subject matter relates to computer implemented methods for providing to a web-based application access at a hardware level to a peripheral device. In one aspect, a method includes establishing a first link between a computing device and a web-based application. The computing device is configured to access the web-based application. The method further includes establishing a second link between the computing device and a peripheral device. The method further includes bridging the first link and the second link to establish a communication channel between the web-based application and the peripheral device. The communication channel is configured to provide to the web-based application access at a hardware level to the peripheral device.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: July 12, 2016
    Assignee: Google Inc.
    Inventors: Trond Thomas Wuellner, Scott James Remnant
  • Patent number: 9392077
    Abstract: Aspects described herein allow multiple devices to function as a coherent whole, allowing each device to take on distinct functions that are complementary to one another. Aspects described herein also allow the devices function as a coherent whole when interconnected devices and their respective applications are configured to operate in various operation modes, when management policies are employed to control the operation of the interconnected devices and their respective applications, when transferring content between the interconnected devices and storing the content at those devices, when obtaining access credentials for the interconnected devices that enable the devices to access enterprise resources, when a policy agent applies management policies to control operation of and interaction between the interconnected devices, and when the interconnected devices are used to access an enterprise application store.
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: July 12, 2016
    Assignee: Citrix Systems, Inc.
    Inventors: Andrew Borzycki, Mallikharjuna Reddy Deva, Uday Nandigam Gajendar, Anil Roychoudhry
  • Patent number: 9392057
    Abstract: In an embodiment, a first client device establishes a P2P connection with a second client device. While the P2P connection is still established, the first client device receives a request to send data to the second client device via the P2P connection, and then sends the data to a server along with an indication of a temporary identifier of the second client device without notifying an operator of the first client device that the data is being sent to the server. In another embodiment, the server receives the data, maps the temporary identifier to a unique network address of the second client device and generates a record of the data transmission between the respective client devices. In another embodiment, the server maintains an association for the temporary identifier after the first and second client devices are disconnected from their P2P connection to permit supplemental communication.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: July 12, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Amit Goel, Mohammed Ataur Rahman Shuman, Sandeep Sharma
  • Patent number: 9380053
    Abstract: A digital certificate incorporated within a communication is received from a server associated with a host name. Resource records associated with the host name are caused to be queried for a list of certificate authorities. In response to causing the resource records to be queried, the list of certificate authorities is received. A certificate authority is identified within the received digital certificate. The identified certificate authority is compared to the received list of certificate authorities. A determination is made, based on the comparison, that the identified certificate authority is included in the received list of certificate authorities.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: June 28, 2016
    Assignee: International Business Machines Corporation
    Inventors: John F. Behnken, Yaser K. Doleh, Mauro Marzorati
  • Patent number: 9372975
    Abstract: According to an aspect of an embodiment, a system for secure recording and sharing of audio data includes a communication interface, a registration module, a microphone, an encryption engine, and a storage device. The registration module is configured to register an attendee device associated with an attendee for a meeting. The microphone is configured to convert sound generated at the meeting to audio data representing the sound. The encryption engine is configured to encrypt the audio data. The storage device is configured to store and associate the encrypted audio data with the attendee device for subsequent access by the attendee.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: June 21, 2016
    Assignee: FUJITSU LIMITED
    Inventor: Hideaki Tanioka
  • Patent number: 9369474
    Abstract: Analytics data validation techniques are described. In one or more implementations, an analytics service collects analytics data from a client device that describes web content and consumption of the web content by the client device. The collected analytics data includes encrypted analytics data that is not accessible by the client device and dynamic analytics data that describes the consumption of the web content by the client device. The encrypted analytics data is decrypted and a determination is made as to whether the collected analytics data is valid using the decrypted analytics data based on whether the decrypted analytics data includes expected parameters or that the dynamic analytics data is consistent with the decrypted analytics data. Responsive to a determination that the collected analytics data is valid, use of the collected analytics data is permitted are part of a web content analysis.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: June 14, 2016
    Assignee: Adobe Systems Incorporated
    Inventors: Jacob D. Lords, Peter R. Fransen, Jeffrey M. Day
  • Patent number: 9356782
    Abstract: A method of storing a file is provided. The method includes splitting the file into a plurality of file chunks and encrypting each file chunk of the plurality of file chunks. The method also includes generating a first security key that decrypts a first encrypted file chunk of the plurality of encrypted file chunks and storing ones of the plurality of encrypted file chunks at a second location separate and distinct from the first location. The method also includes storing a second security key that decrypts a second encrypted file chunk of the plurality of file chunks at the first encrypted file chunk where access is gained to the second security key when the first encrypted file chunk is decrypted using the first security key.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 31, 2016
    Assignee: Unsene, Inc.
    Inventors: Christopher A. Kitze, Vinh H. Vo
  • Patent number: 9356959
    Abstract: Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined. After the classification, a predetermined response is executed based on the classification of the traffic.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: May 31, 2016
    Assignee: AT&T INTELLECTUAL PROPERTY II, L.P.
    Inventors: Edward Amoroso, Albert Greenberg, Balachander Krishnamurthy
  • Patent number: 9356777
    Abstract: Apparatus and associated methods relate to securely transmitting, directly between two mobile devices, AES-256 encrypted file attachments which are decrypted within an application program (APP) using a decryption key that is available only to the APP. In an illustrative embodiment, the encrypted file may be attached to an e-mail. The e-mail may be transmitted directly to another mobile device via direct Wi-Fi, for example. The e-mail may be transmitted directly to another mobile device using Bluetooth, for example. In encrypted attachment may be deciphered only within the APP running on the receiving mobile device using a private key accessible to only the APP.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: May 31, 2016
    Assignee: Q-Up Technologies LLC
    Inventor: Douglas Denny
  • Patent number: 9348977
    Abstract: Disclosed are various systems, methods, and other embodiments directed to detection of malware in content items. To detect the malware, for example, one or more content items are identified in association with the rendering of a network page in a simulated environment. A plurality of tests are applied to the one or more content items to detect an existence of malware associated with the content items.
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: May 24, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Jon A. McClintock, Eric J. Martin, Karl A. McCabe, Thibault Candebat, Adam J. Cecchetti, David Erdmann
  • Patent number: 9350744
    Abstract: A method for applying a security policy to an application session, includes recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: May 24, 2016
    Assignee: A10 Networks, Inc.
    Inventors: Lee Chen, John Chiong, Dennis Oshiba
  • Patent number: 9344339
    Abstract: Techniques for discovering and/or advertising services are described herein. A first bitmask is received from a remote device over a wireless network, the first bitmask having one or more bits that have a predetermined logical value. Each bit represents a particular service provided by the remote device. A logical operation is performed between the first bitmask and a second bitmask locally generated within a local device, where the second bitmask represents a service being searched by the local device. It is determined whether the remote device is potentially capable of providing the service being searched by the local device based on a result of the logical operation.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: May 17, 2016
    Assignee: APPLE INC.
    Inventors: Rory L. P. McGuire, Michael Van Milligan, Jason Conn, Joshua Graessley, Sr., Augustin Prats, Brian Tucker
  • Patent number: 9344957
    Abstract: A communication apparatus identifies an access point with which the communication apparatus can perform wireless communication and transmits information indicating the identified access point to a communication partner apparatus by way of the wireless communication. In response to this, an access point designated by the communication partner apparatus is registered as a relay access point.
    Type: Grant
    Filed: July 15, 2014
    Date of Patent: May 17, 2016
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kenichiro Suga
  • Patent number: 9332438
    Abstract: Embodiments of the present invention disclose a method for updating a group temporal key, a related apparatus and system. A method includes: An access point AP sets an updating period of a group temporal key GTK; the access point updates the GTK whenever the updating period of the GTK arrives; the access point receives a GTK request that is sent by a mobile station STA in an association list within a preset delay time period after arrival of the updating period of the GTK, where the association list records all mobile stations communicating with the access point, and the preset delay time period is shorter than the updating period of the GTK; and when the preset delay time period after the arrival of the updating period of the GTK arrives, the access point sends the updated GTK to the mobile station in the association list according to the GTK request.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: May 3, 2016
    Assignee: HUAWEI DEVICE CO., LTD.
    Inventors: Kecheng Yu, Zhiming Ding, Ping Fang
  • Patent number: 9325742
    Abstract: A plurality of processing elements may include a first processing element having a first stream operator configured to transmit at least a portion of the tuples to a second stream operator. A first rule of an encryption policy may be determined to require encrypting at least a first value of a first attribute. The first value may be within a first tuple of the portion of the tuples. Each tuple of the portion of the tuples may include the first attribute and a second attribute. A first connection may be established for transmitting from the first stream operator to the second stream operator. The first connection may be an encrypted connection. The first value may be extracted from the first tuple and transmitted to the second stream operator via the first connection. The first stream operator may perform the extracting and transmitting.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: April 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Eric L. Barsness, Michael J. Branson, John M. Santosuosso
  • Patent number: 9306915
    Abstract: Embodiments of the disclosure can include systems and methods for secure file transfers. The onsite monitoring system secure file transfer solution can allow for transferring operational data by an onsite system behind a firewall to a central monitoring and diagnostic infrastructure by sending asynchronous, concurrent, parallel files over a port using a previously opened connection.
    Type: Grant
    Filed: November 5, 2013
    Date of Patent: April 5, 2016
    Assignee: General Electric Company
    Inventor: Youcef Atamna
  • Patent number: 9298935
    Abstract: An apparatus, program product and method for managing access to a secure, encrypted webserver. A user computer may communicate through a cloud server with the secure webserver via an End-To-End encrypted connection. The webserver being able to run applications, receive and distribute data with similarly secured webservers and receive and distribute data between the webserver and the client computer. The End-To-End Encrypted connection may remain open until the client computer disconnects and the identity of the user is authenticated by a cloud server.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: March 29, 2016
    Inventor: Piyush Kumar
  • Patent number: 9300690
    Abstract: Implementations for secure network labeling to control inter-process communications in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes initializing, by a processing device of a node, a gear of an application on the node, wherein the node hosts a plurality of gears for a plurality of applications of a multi-tenant Platform-as-a-Service (PaaS) system, and wherein the plurality of applications comprising multi-tenant applications having different owners. The method further includes determining a user identifier (UID) of the gear, generating a custom network security label (NSL) of the gear, assigning the custom NSL to the gear, and applying the custom NSL to an outgoing network packet sent from the gear to another gear within the PaaS system.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: March 29, 2016
    Assignee: Red Hat, Inc.
    Inventors: Daniel Walsh, Paul Moore
  • Patent number: 9298540
    Abstract: Embodiments of the present invention provide systems, methods, and computer storage media for detecting and restoring erroneous data. In cases that a data entry within a data matrix is determined to be erroneous, the data entry can be restored using a replacement value calculated in accordance with other data from the data matrix. In particular, the number of dimensions used to calculate the replacement value can be reduced from the complete set of dimensions to avoid unnecessary noise data that may impact corrected data values.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: March 29, 2016
    Assignee: ADOBE SYSTEMS INCORPORATED
    Inventor: Kourosh Modarresi
  • Patent number: 9270469
    Abstract: One approach for authenticating data includes storing a plurality of combinations of representations of public keys and session key IDs in a non-volatile memory. A payload and accompanying public key, session key ID, and signature of the payload are input. The signature is a function of the payload and a private key of a key pair that includes the accompanying public key and the private key. Authenticity of the payload is determined based on the accompanying public key and session key ID and the combinations stored in the non-volatile memory, and from the signature and the payload. In response to determining that the payload is authentic, the payload is processed, and in response to determining that the payload is not authentic, processing of the payload is disabled.
    Type: Grant
    Filed: February 20, 2014
    Date of Patent: February 23, 2016
    Assignee: XILINX, INC.
    Inventors: Jason J. Moore, Steven E. McNeil, Stephen M. Trimberger
  • Patent number: 9251360
    Abstract: In embodiments of the present invention improved capabilities are described for securely viewing computer data content, such as documents, presentations, spreadsheets, emails, blog entries, texts, and the like, through a secure viewing facility, where the secure viewing facility utilizes a camera or other biometric sensor to monitor an authorized user's actions in the determination of whether the secure viewing facility will permit the computer data content to be viewed on the computer's display, and/or in the control of the viewing process itself.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: February 2, 2016
    Assignee: Intralinks, Inc.
    Inventors: Jerry Lee Meyer, Sudhakar Durairaj, Mushegh Hakhinian
  • Patent number: 9253176
    Abstract: In embodiments of the present invention improved capabilities are described for securely sharing computer data content that allows for the secure un-sharing of the content. The facility to un-share content may be implemented through a secure exchange server, where the content is being shared along with a secure protection feature that when altered results in the un-sharing of the content. This secure un-sharing facility may be used to securely share content beyond the secure protective facilities of an enterprise, out to users in other companies, into the public space, to users not intended to get the content, and the like, where the sender maintains control to access of the content no matter where or to who the content has been distributed. In this way, the secure sharing of content is made to be easy across corporate boundaries at the user level and at the individual document level.
    Type: Grant
    Filed: August 6, 2013
    Date of Patent: February 2, 2016
    Assignee: Intralinks, Inc.
    Inventors: Christopher Ford, Wade Callison, Fahim Siddiqui, Mushegh Hakhinian
  • Patent number: 9246678
    Abstract: An embodiment of the invention allows a user to back-up/store data to a cloud-based storage system and synchronize that data on the user's devices coupled to the storage system. The devices have secure out-of-band cryptoprocessors that conceal a private key. The private key corresponds to a public key that is used to encrypt a session key and information, both of which are passed to and through cloud based storage, all while remaining encrypted. The encrypted material is communicated from the cloud to another of the user's devices where the encrypted material is decrypted within a secure out-of-band cryptoprocessor (using the private key that corresponds to the aforementioned public key) located within the device. The embodiment allows for secure provisioning of the private key to the devices. The private key is only decrypted within the cryptoprocessor so the private key is not “in the open”. Other embodiments are described herein.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: January 26, 2016
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Edward V. Jimison, Omer Ben-Shalom, Michael Raziel
  • Patent number: 9246885
    Abstract: A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: January 26, 2016
    Assignee: International Business Machines Corporation
    Inventors: Paul C Castro, Marco Pistoia, John J. Ponzo, Gregory L. Truty
  • Patent number: 9246681
    Abstract: A method of enciphering information includes generating five index values by performing modulo division on a 32-bit binary input value, identifying five 8-bit output patterns based on the five index values, and enciphering or deciphering five bytes of text using the five 8-bit output patterns.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: January 26, 2016
    Assignee: TEC SOLUTIONS, INC.
    Inventors: Todd Alan Carper, Hampton Miller
  • Patent number: 9245154
    Abstract: A system and method for securing input signals when using input interfaces such as touch-screens and other input interfaces that are suitable for handheld, mobile, computing and other devices, by generating fake signals. In accordance with an embodiment, the technique can be used to protect input signals from, e.g. a touch-screen keyboard, and make it more difficult for malicious software applications to intercept and understand such input signals. The technique can also be implemented without requiring significant changes to the underlying operating system (OS) or graphical user interface (GUI). In accordance with an embodiment, a security enhancer or security enhancing application injects fake signals into the OS/GUI input signals queue. The security enhancer or security enhancing application is also associated with a communication channel that allows it to establish a cryptographic signature or key with authorized or sensitive application receivers that are authorized to receive the input signals.
    Type: Grant
    Filed: February 25, 2011
    Date of Patent: January 26, 2016
    Inventor: Eva Andreasson
  • Patent number: 9240881
    Abstract: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.
    Type: Grant
    Filed: April 30, 2012
    Date of Patent: January 19, 2016
    Assignee: Alcatel Lucent
    Inventors: Ioannis Broustis, Violeta Cakulev
  • Patent number: 9229687
    Abstract: A product of prime numbers and a quadratic non-residue of one of the prime numbers are received as a public key from a first party. The product of prime numbers comprises a first group and the prime numbers respectively comprise a first sub-group and a second sub-group of the first group. Data of the first party is automatically encrypted bit-wise using a computerized device by encrypting first bit values of the data of the first party as quadratic residue and encrypting second bit values of the data of the first party as quadratic non-residue to produce a first intermediate number. The first intermediate number is automatically multiplied by the quadratic non-residue of the public key using the computerized device to complete encryption of the data of the first party. A square root of a value is received from a second party. The second party does not have the quadratic residue and the quadratic non-residue.
    Type: Grant
    Filed: September 5, 2013
    Date of Patent: January 5, 2016
    Assignee: Xerox Corporation
    Inventor: Shailesh Vaya
  • Patent number: 9232398
    Abstract: A method for link setup includes sending a first authentication message including a user identifier to an access point (AP). A second authentication message sent by the AP according to the user identifier is received and includes an EAP method request message and a ANonce of the AP. A first PTK is generated according to the ANonce, an SNonce, and a first MSK. A third authentication message is sent to the AP. The third authentication message includes an EAP method response message, the SNonce, and a first MIC that is generated according to the first PTK. A fourth authentication message is sent by the AP when it authenticates, according to a second PTK, that the first MIC is correct. The fourth authentication message includes an EAP-Success message, configuration information configured by the AP for the terminal, and a second MIC. The second MIC is authenticated according to the first PTK.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: January 5, 2016
    Assignee: HUAWEI DEVICE CO., LTD.
    Inventors: Zhiming Ding, Xinghua Li
  • Patent number: 9215218
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split or share a data set into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting an original data set into portions of data that may be communicated using one or more communications paths. Secure workgroup communication is supported through the secure distribution and management of a workgroup key for use with the secure data parser.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: December 15, 2015
    Assignee: Security First Corp.
    Inventors: Mark S. O'Hare, Rick L. Orsini, Stephen C. Bono, Matthew D. Green, Gabriel D. Landau, Roger S. Davenport
  • Patent number: 9215219
    Abstract: A method for protection of cloud computing includes homomorphic encryption of data. Partially or fully homomorphic encryption allows for data within the cloud to be processed without decryption. A partially or fully homomorphic encryption is provided. The proposed scheme can be used with both an algebraic and analytical approaches. A cloud service is implemented on a server. A client encrypts data using fully homomorphic encryption and sends it to the server. The cloud server performs computations without decryption of the data and returns the encrypted calculation result to the client. The client decrypts the result, and the result coincides with the result of the same calculation performed on the initial plaintext data.
    Type: Grant
    Filed: December 9, 2014
    Date of Patent: December 15, 2015
    Assignee: Parallels IP Holdings GmbH
    Inventors: Sergey Krendelev, Alexander G. Tormasov
  • Patent number: 9204305
    Abstract: A method for transmitting data in a sensor network, which comprises at least one sensor node and a central processor, is provided. The at least one sensor node repeatedly transmits a status message comprising at least one unique identifier associated with the sensor node and a data value determined by the sensor node to the central processor. Furthermore, at least one secure value range message is provided to the central processor for the at least one sensor node, which message is valid for a particular time span and comprises at least bounds for valid data values. The value contained in the status message is further processed by the central processor only if the data value is within the bounds indicated in the value range message.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: December 1, 2015
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Rainer Falk, Hans-Joachim Hof
  • Patent number: 9183008
    Abstract: A method for starting an application program in a Linux container and a corresponding Linux system are provided, where the method includes: creating, by a container start process, a container according to a command entered by a user, creating a first application start process, and putting the first application start process into the container for execution; obtaining, by the first application start process, according to the command entered by the user, the number N of application programs to be started, and creating N?1 second application start processes, where N is a positive integer not less than 2; and starting, in the container, by the first application start process and the N?1 second application start processes, the N application programs to be started. By using technical solutions of the present invention, when the container is created, a plurality of application programs can be started simultaneously.
    Type: Grant
    Filed: April 22, 2014
    Date of Patent: November 10, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Honghui Zhang
  • Patent number: 9185088
    Abstract: Techniques are disclosed for secure and efficient communication from a source to a destination through an intermediary. The disclosed techniques employ a source-to-intermediary encryption algorithm to encrypt the communication from the source to the intermediary. The disclosed techniques also employ an intermediary-to-destination encryption algorithm to encrypt the communication from the intermediary to the destination. Thus, a more optimal encryption algorithm may be employed for communication between the intermediary and the destination, even if the more optimal encryption algorithm is not supported by the source. Also, a more optimal encryption algorithm may be employed for communication between the source and the intermediary, even if the more optimal encryption algorithm is not supported by the destination.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: November 10, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Peter Zachary Bowen
  • Patent number: 9178856
    Abstract: A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data.
    Type: Grant
    Filed: September 4, 2013
    Date of Patent: November 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Paul C. Castro, Marco Pistoia, John J. Ponzo, Gregory L. Truty
  • Patent number: 9179019
    Abstract: A microform imaging apparatus comprising a chassis including a microform media support structure configured to support a microform media within a plane substantially orthogonal to a first optical axis, a fold mirror supported along the first optical axis to reflect light along a second optical axis that is angled with respect to the first optical axis, a lens supported along one of the first and second optical axis, an area sensor supported along the second optical axis, a first adjuster for moving the area sensor along at least a portion of the second optical axis and a second adjuster for moving the lens along at least a portion of the one of the first and second optical axis.
    Type: Grant
    Filed: August 15, 2013
    Date of Patent: November 3, 2015
    Assignee: E-IMAGEDATA CORP.
    Inventor: Todd A Kahle
  • Patent number: 9165121
    Abstract: A device for controlling a service access authorization for a user device with regard to an access-restricted service includes a service access authorization provider, the service access authorization provider being configured to set a period of time in which the service access authorization is valid, responsive to an authorization message provided with a service-dependent user identifier, and the service access authorization provider being configured to disable an authorization allowing the service access authorization to be extended or reactivated using the previous service-dependent user identifier when at least a predetermined duration has passed since an end of a last authorization time interval for which a service access authorization was determined by the device.
    Type: Grant
    Filed: April 21, 2009
    Date of Patent: October 20, 2015
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventors: Birgit Bartel-Kurz, Stefan Kraegeloh, Markus Prosch, Rinat Zeh
  • Patent number: 9167040
    Abstract: Systems, methods and computer readable memory devices for delivering a presentation are provided. In one example, a method includes communicatively coupling the host computing device to an external router, and establishing the closed wireless network using the router. An encrypted communication session is established via the closed wireless network with a plurality of client computing devices that each comprises a display. Each of the client computing devices is communicatively coupled to a virtual network server on the host computing device. Frame buffer data is retrieved from a storage subsystem of the host computing device. The frame buffer data is sent to each of the client computing devices to modify the display of each device.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: October 20, 2015
    Assignee: Circle Technology, Inc.
    Inventors: Steven Robert Hix, Edward Winslow King, Iranpour Khormaei, Paul Lewis
  • Patent number: 9158942
    Abstract: Systems, apparatus and methods are described including operations for securing display output data against malicious software attacks.
    Type: Grant
    Filed: February 11, 2013
    Date of Patent: October 13, 2015
    Assignee: INTEL CORPORATION
    Inventors: Ravi L. Sahita, Vinay Phegade, David J. Cowperthwaite
  • Patent number: 9160713
    Abstract: Aspects of this disclosure relate to filtering network data transfers. In some variations, multiple packets may be received. A determination may be made that a portion of the packets have packet header field values corresponding to a packet filtering rule. Responsive to such a determination, an operator specified by the packet filtering rule may be applied to the portion of packets having the packet header field values corresponding to the packet filtering rule. A further determination may be made that one or more of the portion of the packets have one or more application header field values corresponding to one or more application header field criteria specified by the operator. Responsive to such a determination, at least one packet transformation function specified by the operator may be applied to the one or more of the portion of the packets.
    Type: Grant
    Filed: May 3, 2015
    Date of Patent: October 13, 2015
    Assignee: Centripetal Networks, Inc.
    Inventor: Sean Moore
  • Patent number: 9154469
    Abstract: A system and method of protecting data on a communication device are provided. Data received when the communication device is in a first operational state is encrypted using a first cryptographic key and algorithm. When the communication device is in a second operational state, received data is encrypted using a second cryptographic key and algorithm. Received data is stored on the communication device in encrypted form.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: October 6, 2015
    Assignee: BLACKBERRY LIMITED
    Inventors: Neil Patrick Adams, Herbert Anthony Little
  • Patent number: 9155062
    Abstract: In one aspect, a method of determining a geographical location of a base station is provided. The base station is within a coverage area of a master base station and requests geographical location information from the master base station through a first Precision Time Protocol (PTP) management message. The base station receives the geographical location information from the master base station through a second PTP management message. In addition, the base station determines the geographical location of the base station from the geographical location information included in the second PTP management message.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: October 6, 2015
    Assignee: MICROSEMI FREQUENCY AND TIME CORPORATION
    Inventors: Karim Traore, Samer H. Darras
  • Patent number: 9154493
    Abstract: A method and a system for managing login using a cookie are described. The method includes receiving from a respective client system a request for document information, and receiving from the respective client system a cookie that identifies a plurality of user names logged into the server system from the respective client system. The plurality of logged-in user names includes a first user name and a second user name distinct from the first user name. The method also includes redirecting the received request to a location associated with a selected user name of the plurality of logged-in user names, and receiving the redirected request. The method furthermore includes, in response to the redirected request, processing the request as a request from the selected user name and sending to the respective client system document information corresponding to the request from the selected user name.
    Type: Grant
    Filed: August 1, 2014
    Date of Patent: October 6, 2015
    Assignee: GOOGLE INC.
    Inventors: Valerie Blechar, Micah Lemonik, Michael Wayne Crosby, Robert Eugene Wyrick, Ronald Ho
  • Patent number: 9148417
    Abstract: In embodiments of the present invention improved capabilities are described for managing amendment voting in a networked secure collaborative computer data exchange environment, the method comprising establishing a secure exchange server-based environment between users of at least two business entities, the secure exchange server environment managed by an intermediate business entity, the users exchanging content, and providing an amendment voting facility when the content relates to a proposed amendment to an agreement wherein the amendment voting facility enables users to vote on the proposed amendment.
    Type: Grant
    Filed: April 26, 2013
    Date of Patent: September 29, 2015
    Assignee: Intralinks, Inc.
    Inventor: James Andrew Fieweger