Protection At A Particular Protocol Layer Patents (Class 713/151)
-
Patent number: 8869276Abstract: To improve network reliability and management in today's high-speed communication networks, we propose an intelligent system using adaptive statistical approaches. The system learns the normal behavior of the network. Deviations from the norm are detected and the information is combined in the probabilistic framework of a Bayesian network. The proposed system is thereby able to detect unknown or unseen faults. As demonstrated on real network data, this method can detect abnormal behavior before a fault actually occurs, giving the network management system (human or automated) the ability to avoid a potentially serious problem.Type: GrantFiled: June 29, 2006Date of Patent: October 21, 2014Assignee: Trustees of Boston UniversityInventors: Mark Crovella, Anukool Lakhina
-
Publication number: 20140310512Abstract: The present disclosure presents a system, method and apparatus herein enabling secure coupling of a computing device, such as a mobile device with an endpoint, such as an application server. The computing device can include any electronic device such as a computer, a server, an application server, a mobile device or tablet. The endpoint can be any electronic device as well that is located within an enterprise network. In at least one embodiment, the secure coupling of the mobile device with a computing device can include a security gateway server. In one example, the security gateway server can be a tunnel service server. In another embodiment, an application server can include a tunnel service module to provide the secure coupling with the mobile device.Type: ApplicationFiled: April 12, 2013Publication date: October 16, 2014Applicant: RESEARCH IN MOTION LIMITEDInventors: Jonathan Hong-Man SAU, Graham RUSSELL, Bruno Richard PREISS, Ronesh PURI
-
Patent number: 8862867Abstract: The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an authentication server; after the authentication is passed, obtaining a shared key material by both the terminal and the authentication server; generating, by the terminal and the authentication server, a mobility data security key according to the shared key material; transmitting, by the authentication server, the generated mobility data security key to a mobility data transmission module; protecting security of the layer-3 mobility user plane data, by the terminal and the mobility data transmission module, by using the mobility data security key. The disclosure also discloses a system for protecting security of layer-3 mobility user plane data in NGN.Type: GrantFiled: March 22, 2010Date of Patent: October 14, 2014Assignee: ZTE CorporationInventors: Hongyan Wang, Yinxing Wei
-
Patent number: 8862866Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.Type: GrantFiled: July 7, 2004Date of Patent: October 14, 2014Assignee: Certicom Corp.Inventor: Marinus Struik
-
Patent number: 8863270Abstract: According to one embodiment, a computer system executing a computer program is coupled to multiple secure network domains configured in a multi-level security architecture. The computer program simultaneously establishes a voice connection with a first terminal configured on a first secure network domain and a second terminal configured on a second secure network domain. The computer program may then selectively couple an electroacoustical transducer to the first terminal or the second terminal, and generate an indicator on a user interface indicating the security level of the selected terminal.Type: GrantFiled: January 13, 2010Date of Patent: October 14, 2014Assignee: Raytheon CompanyInventors: John F. Masiyowski, Raymond A. Magon, Michael O. Tierney, Robert L. Marchant
-
Patent number: 8863232Abstract: A system includes an application access manager driver and an operating system (OS) kernel module in a kernel-mode address space of an OS. The system also includes application modules, a public application whitelist, a public application whitelist manager, a user/group application whitelist, and a user/group application whitelist manager in a user-mode address space of the OS. A method includes receiving a request to launch an application, calling a “create process” function in the OS kernel module, calling a pre-registered “create process” callback function to the application access manager driver, and determining whether the application is allowed to execute based on whether the application access manager driver identifies the application as an allowable process in either public application whitelist or user/group application whitelist.Type: GrantFiled: February 6, 2012Date of Patent: October 14, 2014Assignee: hopTo Inc.Inventor: William Tidd
-
Patent number: 8862883Abstract: An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.Type: GrantFiled: May 16, 2012Date of Patent: October 14, 2014Assignee: Cisco Technology, Inc.Inventors: Sunil Cherukuri, Mohamed Khalid, Brian Cinque
-
Publication number: 20140304499Abstract: The present invention is directed towards systems and methods for managing one or more SSL sessions. A first node from a cluster of nodes intermediary between a client and a server may receive a first request from the client to use a first session established with the server. The first request may include a session identifier of the first session. The first node may determine that the first session is not identified in a cache of the first node. The first node may identify, via a hash table responsive to the determination, an owner node of the first session from the cluster using a key. The key may be determined based on the session identifier. The first node may send a second request to the identified owner node for session data of the first session. The session data may be for establishing a second session with the server.Type: ApplicationFiled: April 4, 2014Publication date: October 9, 2014Applicant: Citrix Systems, Inc.Inventors: Sikha Gopinath, Ashoke Saha, Tushar Kanekar
-
Publication number: 20140304498Abstract: This disclosure is directed to systems and methods for handling the processing of a next protocol negotiation extension for a transport layer security (TLS) session. A device, intermediary to a client and a server, may receive a client hello message from the client in a handshake to establish a transport layer security (TLS) session with the server. The client hello message may include a next protocol negotiation extension. The device may include a first TLS processor that is software based and a second TLS processor that is hardware based. The device may determine that the client hello message includes the next protocol negotiation extension. The device may establish, responsive to the determination, the TLS session using the first TLS processor. The device may process, upon establishment of the TLS session using the first TLS processor, encrypted data for the TLS session using the second TLS processor.Type: ApplicationFiled: April 6, 2013Publication date: October 9, 2014Applicant: Citrix Systems, Inc.Inventors: Swarupa Gonuguntla, Ashoke Saha, Tushar Kanekar
-
Patent number: 8856911Abstract: Recommending a security policy to a firewall, includes receiving a request from a firewall for a recommendation as to whether the firewall should allow or block a detected present communication for which the firewall does not have an existing security policy. Information about past blocked and allowed communications at other firewalls on a network is searched to identify past communications that are similar to the present communication. The identified past communications are assigned a respective positive or negative vote. A positive vote indicates a past communication was allowed and a negative vote indicates a past communication was not allowed. A positive recommendation is sent to the requesting firewall to allow the present communication if the positive votes outnumber the negative votes, and a negative recommendation is sent to the requesting firewall to block the present communication if the negative votes outnumber the positive votes.Type: GrantFiled: July 26, 2012Date of Patent: October 7, 2014Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey Aaron
-
Patent number: 8856507Abstract: The invention presented herein consists of systems and methods of secure storage for sensitive and confidential data, such as personal identity data, along with methods of securely accessing that data, and transferring information from that data, as necessary.Type: GrantFiled: December 10, 2007Date of Patent: October 7, 2014Assignee: IMS Health Inc.Inventors: Salah E Machani, John M Couse, Hussam Mahgoub
-
Patent number: 8856864Abstract: Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented.Type: GrantFiled: September 27, 2012Date of Patent: October 7, 2014Assignee: Intel CorporationInventors: Hong Li, Tobias M. Kohlenberg, Rita H. Wouhaybi, Alan D. Ross
-
Patent number: 8856509Abstract: A method of authentication and authorization over a communications system is provided. Disclosed herein are systems and methods for creating a cryptographic evidence, called authentication/authorization evidence, AE, when a successful authentication/authorization between a client and an authentication server is complete. There are a variety of methods for generating AE. For instance, the AE can be data that is exchanged during the authentication signaling or data that results from it. A distinctive point being that AE results from the authentication process and is used as prior state for the following TLS exchange. An example for creation of AE, is as follows: EAP authentications typically result in an Extended Master Session Key (EMSK). The EMSK can be used to create an Evidence Master Key (EMK) that can then be used to create AE for a variety of servers.Type: GrantFiled: August 10, 2011Date of Patent: October 7, 2014Assignee: Motorola Mobility LLCInventors: Madjid F. Nakhjiri, Tat Keung Chan, Alexander Medvinsky
-
Patent number: 8856917Abstract: A mechanism is provided for automatically logging into a cloud based system that does not accept token log-on credentials generated by a single sign-on service. In an embodiment, a one-time password is automatically generated and persisted. The generated password is used to log in automatically to a cloud based system that does not accept tokens generated by the web-ID providers and for connecting to other services. Examples of such systems may include Windows, Linux, and iOS.Type: GrantFiled: April 30, 2013Date of Patent: October 7, 2014Assignee: Microsoft CorporationInventors: Manuvir Das, Sudarshan Yadav, Arvind Kandhare, Shivesh Ranjan, Jimmy Narang
-
Patent number: 8856382Abstract: A system in a cloud services environment comprises one or more service offerings, one or more service instances and one or more service support utilities. Each of the one or more service offerings is described by at least one service descriptor. Each of the one or more service instances is obtained from at least one of the one or more service offerings. Each of the one or more service support utilities is customized by at least one service descriptor. A service comprises at least one component and a service descriptor comprises one or more models.Type: GrantFiled: July 30, 2012Date of Patent: October 7, 2014Assignee: International Business Machines CorporationInventors: Rahul P. Akolkar, Paula K. Austel, Thomas A. Mikalsen, Isabelle M. Rouvellou, Alla Segal, Hidayatullah H. Shaikh, Ignacio Silva-Lepe, Revathi Subramanian
-
Patent number: 8850544Abstract: The present invention provides a new method for user centered privacy which works across all 3rd party sites where users post content, or even for encryption of emails. Users have an identity with a Hyde-It Identity provider (HIP) which authenticates the user to a Hyde-It Service (HITS) which performs key distribution. The functionality can be invoked through a user toolbar, built into the browser or be downloaded on demand via a bookmarklet.Type: GrantFiled: April 23, 2009Date of Patent: September 30, 2014Inventor: Ravi Ganesan
-
Patent number: 8850188Abstract: A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device. Selected certificates may be downloaded to the computing device for storage, and the downloaded certificates are tracked by the data server. This facilitates the automatic updating of the status of one or more certificates stored on the computing device by the data server, in which updated status data is pushed from the data server to the computing device.Type: GrantFiled: September 13, 2012Date of Patent: September 30, 2014Assignee: BlackBerry LimitedInventors: Neil P. Adams, Herbert A. Little, Michael K. Brown, Michael S. Brown, Michael G. Kirkup
-
Patent number: 8850229Abstract: An apparatus for generating a decryption key for use to decrypt a block of encrypted instruction data being fetched from an instruction cache in a microprocessor at a fetch address includes a first multiplexer that selects a first key value from a plurality of key values based on a first portion of the fetch address. A second multiplexer selects a second key value from the plurality of key values based on the first portion of the fetch address. A rotater rotates the first key value based on a second portion of the fetch address. An arithmetic unit selectively adds or subtracts the rotated first key value to or from the second key value based on a third portion of the fetch address to generate the decryption key.Type: GrantFiled: October 29, 2013Date of Patent: September 30, 2014Assignee: VIA Technologies, Inc.Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
-
Patent number: 8850204Abstract: A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.Type: GrantFiled: December 23, 2009Date of Patent: September 30, 2014Assignee: Intel CorporationInventors: Robert Stacey, Jesse Walker, Emily H. Qi
-
Patent number: 8850212Abstract: A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers (PCRs) for the device and the current values of the listed PCRs and an integrity value identifying the integrity measurement into a policy register, verify a signature over the integrity value extended into the policy register, and, if verification succeeds, extend a verification key of the trusted platform, plus an indication that it is a verification key, into the policy register, compare the integrity value extended into the policy register with a value stored in the trusted platform, and, if they are the same: extend the stored value, plus an indication that it is a stored value, into the policy register, and extend the integrity measurement in the trusted device if the value in the policy register matches a value stored with the integrity measurement.Type: GrantFiled: May 12, 2011Date of Patent: September 30, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Graeme John Proudler, Liqun Chen
-
Patent number: 8850516Abstract: Techniques to enforce policies with respect to managed files and/or endpoints are disclosed. A policy to be applied with respect to one or more files included in a synchronization set and/or an endpoint associated with the synchronization set is received. Compliance with the policy is ensured across a plurality of heterogeneous endpoints associated with the synchronization set.Type: GrantFiled: June 22, 2012Date of Patent: September 30, 2014Assignee: EMC CorporationInventors: Ondrej Hrebicek, Leonard Chung
-
Patent number: 8850552Abstract: A method of ensuring secure and cost effective communication of aeronautical data to and from an aircraft is provided. The method includes uplinking air-ground aircraft data communications via an aeronautical safety data link and downlinking air-ground aircraft data communications via a consumer data link separated from the aeronautical safety data link by a one-way firewall.Type: GrantFiled: October 17, 2008Date of Patent: September 30, 2014Assignee: Honeywell International Inc.Inventors: Donald C. Kauffman, Thomas D. Judd, Michael L. Olive
-
Patent number: 8843735Abstract: An apparatus for providing link layer security in a Physical Layer Transceiver (PHY) is disclosed. In one embodiment, the apparatus may comprise analog circuitry configured to interface with a data transmission medium, digital circuitry configured to interface with a Media Access Controller (MAC); and a crypto engine coupled to the digital circuitry. Single interface and multiple interface schemes are provided to control both PHY and crypto functions. Embodiments are disclosed where the PHY controls the crypto device, and where the crypto device controls the PHY.Type: GrantFiled: April 1, 2010Date of Patent: September 23, 2014Assignee: Cisco Technology, Inc.Inventors: Li-Jau Yang, Daniel C. Biederman
-
Patent number: 8843737Abstract: A network element supports Transmission Control Protocol Authentication Option (TCP-AO) with a Key Management Protocol (KMP) to authenticate TCP segments over a TCP session. The network element negotiates multiple traffic keys to authenticate TCP segments over a TCP session with a peer network element, and protects the TCP session with the negotiated traffic keys.Type: GrantFiled: August 26, 2011Date of Patent: September 23, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Uma S. Chunduri, Albert Jining Tian
-
Patent number: 8844040Abstract: The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.Type: GrantFiled: March 23, 2009Date of Patent: September 23, 2014Assignee: Citrix Systems, Inc.Inventors: James Harris, Rui Li, Arkesh Kumar, Ravindranath Thakur, Puneet Agarwal, Akshat Choudhary, Punit Gupta
-
Patent number: 8843736Abstract: A device is enabled to display Internet TV by accessing a management server with a secret unique ID and receiving back from the server, assuming the ID is approved, a user token and a service list of content servers with knowledge of the user token. A user can select a content server which causes the device to upload its user token and in response receive a content list from the content server, from which content can be selected for display. Neither list may be modified by the device and the device can access only content on a content list.Type: GrantFiled: May 18, 2010Date of Patent: September 23, 2014Assignee: Sony CorporationInventors: Leo Pedlow, Brant Candelore
-
Patent number: 8843738Abstract: A method, system and computer program product related to an authentication security protocol, which associates a unique Abbreviated Session Identifier (ASI) with some application data packets transmitted, for example, from a client to a server. The present technology can be a modified version of the Transport Layer Security (TLS) protocol. A method of authentication comprises an initial setup comprising negotiating a secure network connection between client and server using TLS, providing a unique ASI by the server, associating the ASI with a TLS protocol session identifier, transmitting the unique ASI and the TLS protocol session identifier to the client, and establishing the secure network connection between the client and server. Subsequent data packets transferred between the client and server may include the unique ASI.Type: GrantFiled: May 14, 2012Date of Patent: September 23, 2014Assignee: Sierra Wireless, Inc.Inventor: Gustav Gerald Vos
-
Publication number: 20140281482Abstract: Information objects model real-world objects or concepts that may be associated with users, such as vehicles, homes, people, animals, accounts, places, and the like. The objects have a set of associated properties, which have corresponding required protection levels indicating a level of permission that another user must have to the object in order to be able to receive and access the value of that property in the object. Objects are stored by a framework using techniques that reduce or eliminate the possibility of unauthorized access. For example, an object is durably stored in encrypted form in device storage, with the values of properties encrypted in different manners according to the different corresponding protection levels. When sharing an object with another user or other entity, the required protection levels of the object properties are respected in order to prohibit the other entity from obtaining access to unauthorized portions of an object.Type: ApplicationFiled: March 17, 2014Publication date: September 18, 2014Applicant: LOW GRAVITY INNOVATION, INC.Inventors: Jeffrey M. Diamond, Nathaniel R. Diamond
-
Publication number: 20140281481Abstract: A process for converting a DTCP-IP transport stream into HLS format, comprising receiving an encrypted DTCP-IP transport stream comprising DTCP frames at a secondary device from a source device, with each of the plurality of DTCP frames comprising encrypted 16-byte portions, forming chunks from the DTCP frames by grouping encrypted 16-byte portions into a chunk, adding HLS padding bytes to the end of each chunk and encrypting the HLS padding bytes to form an encrypted chunk, loading each of the encrypted chunks and a playlist to a media proxy server at the secondary device, loading a DTCP key onto a security proxy server, and providing the playlist, each of the encrypted chunks, and the DTCP key to a native media player on the secondary device, such that the native media player follows the playlist to decrypt the encrypted chunks using the DTCP key and plays back the chunks.Type: ApplicationFiled: March 17, 2014Publication date: September 18, 2014Applicant: General Instrument CorporationInventor: Paul Moroney
-
Publication number: 20140281480Abstract: A client includes a security agent configured to create a client certificate that corresponds to one or more client identifiers. A server includes a server certificate and is in communication with the security agent. The server is configured to facilitate establishing an initial mutually authenticated transport layer security (TLS) session with the client based on the client certificate and the server certificate. The server is also configured to extract the client certificate from the security agent once the TLS session is established. The server is configured to store the certificate as being associated with only the corresponding client identifier(s) and to categorize the association between the client certificate and the corresponding client identifier(s) as being secure but not trusted for the client until the identity of the client has been verified. Moreover, the server is configured to receive an indication that the identity of the client has been verified.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: VMWARE, INC.Inventor: Darin PETTY
-
Patent number: 8838957Abstract: According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and passing control of an authentication handshaking protocol. The first phase is commenced for establishing a secure communication path by a data path processor within a first network device. The first phrase comprises an exchange of data during an authentication handshaking protocol. The passing of control for authentication handshaking protocol by the data path processor to a control path processor is conducted to complete the authentication handshaking protocol.Type: GrantFiled: February 28, 2013Date of Patent: September 16, 2014Assignee: Aruba Networks, Inc.Inventors: Randy Chou, Brijesh Nambiar
-
Patent number: 8838953Abstract: A provisioning device is provided that communicates over a trusted out-of-band communications channel to digital electronic devices in order to exchange security data such as passwords and private or public keys, thereby establishing a secure communications network between the devices.Type: GrantFiled: June 5, 2008Date of Patent: September 16, 2014Assignee: STMicroelectronics, Inc.Inventor: Oleg Logvinov
-
Patent number: 8832814Abstract: System and method configured to provide an access management system configuration that provides the benefits of single sign-on while reducing internal hardware and administration maintenance costs. The system is reconfigured to provide an access control module that directs authentication network traffic such that access management agents are not required to be installed on the application server for each protected application. The system provides a redirection of a login request from the application server to an external security gateway that authenticates the user via policy and sends authenticated user credentials on a back channel to the access control module to obtain a session cookie which is redirected back to the user so the user can establish a session with the application. The solution reduces the plethora of agents to be maintained and upgraded in order to remain compatible with the evolving hosting software, reducing both hardware and administration maintenance costs.Type: GrantFiled: July 2, 2013Date of Patent: September 9, 2014Assignee: FMR LLCInventors: Michael Timothy Coletta, Kevin W. Park, Jon Alexander Lenzer
-
Patent number: 8832445Abstract: Systems and methods are provided for handling electronic messages. An electronic message is examined as to whether the message contains one or more encoding properties. A visual indication is generated for use in a display to a user wherein the visual indication is displayed to the extent to which the encoding property applies to a displayed portion of the message.Type: GrantFiled: February 25, 2005Date of Patent: September 9, 2014Assignee: BlackBerry LimitedInventor: Michael S. Brown
-
Patent number: 8832830Abstract: Blind attacks on a protocol connection, such as a TCP connection, are prevented by inserting checksums computed during protocol connection establishment handshake into data sent through the connection and invalidating data sent through the connection that lacks the protocol setup information checksums. Reset attacks are prevented by invalidating reset requests unless a master checksum computed from the protocol setup information checksums is included with the reset request. Checksums computed from protocol setup information have improved robustness by including a random number with the protocol setup information.Type: GrantFiled: November 28, 2011Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventors: Prashant A. Paranjape, David R. Marquardt
-
Publication number: 20140250296Abstract: Strict transport security controls are arranged to detect a first navigation command of a network-enabled application to navigate from a secure connection established with a first network address and to navigate to a second network address using an unsecure reference. A filter is used to filter, in response to the detection of the first navigation command, referring information in a second navigation command used to establish a second address secure connection with a device having the second network address. The strict transport security controls service is optionally arranged to provide a warning signal upon detecting formation of the second navigation command.Type: ApplicationFiled: February 4, 2014Publication date: September 4, 2014Inventor: Robert Hansen
-
Patent number: 8826384Abstract: A device that includes a first processor, a second processor, and an encryption module in communication with the first processor and the second processor may be used to accept conditions for access to the network. The first processor may receive condition data, and in response, may send an acceptance signal via the encryption module to the second processor. The second processor may receive the acceptance signal and, in response, may send acceptance data to a gatekeeper. The encryption module may block unencrypted data other than the acceptance signal from being communicated from the first processor to the second processor. The encryption module may support type 1 encryption.Type: GrantFiled: July 13, 2007Date of Patent: September 2, 2014Assignee: L-3 Communications CorporationInventor: Richard Norman Winslow
-
Patent number: 8819411Abstract: An information processing apparatus connected to a network via a network interface device and capable of performing encrypted communication with an external apparatus on the network. When the information processing apparatus is operating in a normal power mode, a sleep control module thereof detects whether a condition under which the apparatus shifts to an energy saving mode in which power consumption is smaller than in the normal power mode is satisfied. When the condition is detected to be satisfied, a proxy response registration module of the apparatus instructs an IPSec module of the same to request the external apparatus not to perform encrypted communication.Type: GrantFiled: March 11, 2010Date of Patent: August 26, 2014Assignee: Canon Kabushiki KaishaInventor: Go Inoue
-
Patent number: 8819413Abstract: A method and apparatus for providing collaborative claim verification using an identification management (IDM) system. The IDM system collaborates with at least one trusted authority that provides information to a validity database within the IDM system. The database information collected from the at least one trusted authority is used to verify a user's entered identification information i.e., a user's identity claim. Such validation through a plurality of trusted authorities can provide a statistical truth to the identity claims provided by a user.Type: GrantFiled: December 22, 2006Date of Patent: August 26, 2014Assignee: Symantec CorporationInventors: Brian Hernacki, Sourabh Satish
-
Patent number: 8812833Abstract: A network device includes a first physical layer (PHY) module, a second physical layer (PHY) module, and a security module. The first PHY module is configured to operate in a first frequency band. The second PHY module is configured to operate in a second frequency band. The security module is configured to establish security for the first frequency band responsive to the network device operating in the first frequency band. The security module is further configured to establish security for the second frequency band prior to the network device switching operation from the first frequency band to the second frequency band.Type: GrantFiled: May 20, 2010Date of Patent: August 19, 2014Assignee: Marvell World Trade Ltd.Inventors: Yong Liu, Paul A. Lambert
-
Patent number: 8811223Abstract: The present invention is directed towards systems and methods for distributed operation of a plurality of cryptographic cards in a multi-core system. In various embodiments, a plurality of cryptographic cards providing encryption/decryption resources are assigned to a plurality of packet processing engines in operation on a multi-core processing system. The packet processing engines can be configured to operate in user space of a system, and can access cryptographic resources via memory allocations mapped from kernel space to user space.Type: GrantFiled: June 22, 2009Date of Patent: August 19, 2014Assignee: Citrix Systems, Inc.Inventors: Tushar Kanekar, Swarupa Gonuguntla
-
Patent number: 8812643Abstract: Encoding and/or decoding of messages. On the encoding end, a composite encoder encodes message from an internal format that is used by internal system components into an external format. However, the composite encoder may encode the outgoing messages into different external formats on a per-message basis. For incoming message, a composite decoder decodes incoming messages from any one of a plurality of external formats into the internal format also on a per-message basis. A per-message report mechanism permits internal system components and the encoding/decoding components to communicate information regarding the encoding or decoding on a per message basis. XML messages can be converted automatically into Binary messages.Type: GrantFiled: July 5, 2011Date of Patent: August 19, 2014Assignee: Microsoft CorporationInventors: Stephen Jared Maine, Michael J. Coulson, Tirunelveli R. Vishwanath, Erik B. Christensen
-
Patent number: 8813216Abstract: A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The second NJE node conducts a security check of NJE packets traveling between the first and third NJE nodes. The security check performed by the second NJE node includes checking the userid of the person or job that sent the NJE packet, as well as the NJE data type. The NJE data type may be classified by the type of operation being performed, such as a batch job, sysout, command, message, as well as what application is being used. In one preferred embodiment, the security check includes checking the security level of the source of the data being transferred, such as a sensitive application. The security check can be based on the size of the data packet, such that excessively large data packets from a particular user are not permitted to be transmitted outside a secure NJE network.Type: GrantFiled: December 16, 2004Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: William Joseph Bloemeke, Reid Anthony Cashion
-
Patent number: 8806577Abstract: A system that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium operating in a mobile device server that has computer instructions to execute a web server application at the mobile device server. The web server application can be operable to detect a media resource center while roaming in a communication zone of the media resource center and to transmit a pairing key to the media resource center responsive to acquiring communication access to the communication zone. The web server application can be further operable to receive from the media resource center an indication that a roaming charge will be applied to a subscriber account associated with the mobile device responsive to the media resource center identifying from the pairing key that the mobile device server is a guest device. Other embodiments are disclosed.Type: GrantFiled: April 16, 2013Date of Patent: August 12, 2014Assignee: AT&T Intellectual Property I, LPInventors: William A. Brown, Troy Meuninck
-
Patent number: 8806602Abstract: According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may receive a first token indicating that a first form of encryption has been performed and determine, based at least in part upon the first token, at least one token-based rule. The apparatus may determine, based at least in part upon the token-based rule, that a second form of encryption should be performed. The apparatus may receive a second token indicating that the second form of encryption has been performed and determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed. The apparatus may then generate a decision token representing the determination that access to the resource should be granted and transmit the decision token.Type: GrantFiled: May 24, 2012Date of Patent: August 12, 2014Assignee: Bank of America CorporationInventor: Rakesh Radhakrishnan
-
Patent number: 8806189Abstract: An apparatus for analyzing traffic is provided. The apparatus may precisely identify and analyze web traffic through 5 tuple-, HTTP-, and request/response pair-based packet analysis by monitoring the correlation between sessions.Type: GrantFiled: December 21, 2011Date of Patent: August 12, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Dong-Won Kang, Joon-Kyung Lee, Sang-Sik Yoon, Wang-Bong Lee
-
Patent number: 8804153Abstract: A method for printing a print ready file transmitted by a print client on an imaging device includes creating a print data file associated with the print ready file, where the print data file includes information pertaining to the print ready file and the imaging device. In the method, the print data file is encrypted and transmitted to the imaging device. In addition, the print data file is authenticated in the imaging device and printing of the print ready file is enabled if the print data file is determined to be authentic and the print ready file is invalidated if the print data file is determined to be inauthentic. Also disclosed is an imaging device configured to perform the aforementioned method.Type: GrantFiled: April 16, 2007Date of Patent: August 12, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Tukun Chakraborty, Zakir Ahmed, Debjit Roy, Kah Kit Cheong, Kok Mun Stephen Cheng
-
Patent number: 8806191Abstract: An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer protocol relay for causing the e-mail messages to be transmitted between the first site and selected ones of the second sites. Policy managers enforce-administrator selectable policies relative to one or more of encryption and decryption, signature, source/destination, content and viruses.Type: GrantFiled: August 27, 2012Date of Patent: August 12, 2014Assignee: Axway Inc.Inventors: Robert D. Dickinson, III, Sathvik Krishnamurthy
-
Patent number: 8806206Abstract: The present invention provides a cooperation method of a mobile hardware secure unit and a fixed hardware secure unit, comprising: providing user's identification information of a mobile hardware secure unit; providing platform's identification information of a computer-based or other-device-based fixed hardware secure unit; establishing a bidirectional communication pipe between the mobile and fixed hardware secure unit; and binding the mobile and fixed hardware secure units through interaction of the user's identification information and the platform's identification information. The present invention further provides a cooperation system of a mobile hardware secure unit and a fixed hardware secure unit as well as a computer device, with which the security solution based on a fixed hardware secure unit can be combined with a mobile hardware secure unit securing a user's identity.Type: GrantFiled: December 19, 2008Date of Patent: August 12, 2014Assignees: Beijing Lenovo Software Ltd., Lenovo (Beijing) LimitedInventors: Xizhe Li, Hongping Tian, Wei Xie, Yun Gu, Xingzhong Mao, Chentao Yu
-
Patent number: 8806608Abstract: The present invention discloses an authentication server and a method for controlling a mobile communication terminal access to a virtual private network (VPN).Type: GrantFiled: July 6, 2009Date of Patent: August 12, 2014Assignee: ZTE CorporationInventor: Jingwang Ma