Particular Node (e.g., Gateway, Bridge, Router, Etc.) For Directing Data And Applying Cryptography Patents (Class 713/153)
-
Patent number: 8214884Abstract: A management server acts as a repository for a plurality of user certificates corresponding to a plurality of users. When a user wishes to access a remote computer such as a secure-enabled host requiring a secure credential, his/her computer sends a request message to the management server. The management server may perform its own validity checking. In response to a request and conditioned on the management server authorizing access to a computing resource that requires an authorization credential, the management server delivers the requested credential and executable code, the authorization credential comprising information that enables access to the computing resource and the delivered executable code manages the lifecycle of the delivered authorization credential by allowing only temporary storage without caching of the delivered authorization credential.Type: GrantFiled: June 25, 2004Date of Patent: July 3, 2012Assignee: Attachmate CorporationInventors: Sharon Xia, Eduardo Muñoz, Dan Brombaugh
-
Patent number: 8209538Abstract: An email policy is applied in a policy manager, running on a mail server in a local area network, to determine whether an outgoing email message should be allowed to be transmitted to a destination address outside the local area network, for example over the internet. A digital signature is used in the policy manager, to determine if the sender is the sender indicated in the message itself. If so, a sender-dependent policy is applied.Type: GrantFiled: August 16, 2004Date of Patent: June 26, 2012Assignee: Clearswift LimitedInventor: Jim Craigie
-
Patent number: 8209537Abstract: In an embodiment, a method of secure information distribution between nodes, includes: performing a handshake process with an adjacent node to determine membership in a secure group; and distributing secure information to the adjacent node, if the adjacent node is a member of the secure group. In another embodiment, an apparatus for secure information distribution between nodes, includes: a node configured to performing a handshake process with an adjacent node to determine membership in a secure group, and distribute secure information to the adjacent node, if the adjacent node is a member of the secure group.Type: GrantFiled: March 30, 2004Date of Patent: June 26, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Michael Roeder, Ponnappa Palecanda
-
Publication number: 20120159151Abstract: A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement procedure are captured on a first interface. Second data packets associated with the authentication and key agreement procedure are captured on a second interface. Individual ones of the first data packets are correlated to individual ones of the second data packets based upon a same parameter. An authentication vector table is created comprising information from the correlated first data packets and second data packets, wherein entries in the table comprise authentication data for a plurality of security contexts. A cipher key is identified to decipher additional packets for the user. The cipher key can also be identified in case of Inter Radio Access Technology Handover by the user equipment.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: TEKTRONIX, INC.Inventors: Vignesh Janakiraman, Antonio Bovo
-
Patent number: 8205073Abstract: An object of the present invention is to enable the configuration tasks needed to form a wireless LAN to be performed using a simple method while increasing security during such configuration. In a wireless network configuration system GH1 including an encryption key setting system LH1, where an access point 20 determines after the power thereto is turned ON that configuration for connection to a wireless LAN has not yet be carried out, the access point 20 activates a restricted receiving mode in which only an initial configuration packet is accepted. A terminal 50 that has sent an initial configuration packet and the access point 20 that has received such initial configuration packet while the restricted receiving mode is active each create an identical WEP key with reference to the data on a CD-ROM 51 or the data in a ROM 12, respectively, and set and register the created WEP key in itself.Type: GrantFiled: November 5, 2004Date of Patent: June 19, 2012Assignee: Buffalo Inc.Inventor: Takashi Ishidoshiro
-
Patent number: 8205072Abstract: A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is created on the untrusted computer that protects the user's applications running in the virtual secure desktop from malicious code and encrypts all data. Data to be written to the hard drive is stored in a secure vault. The secure vault is completely encrypted and erased at the end of the virtual secure desktop session. The virtual secure desktop may be created by creating a separate user session on the untrusted computer and linking the separate user session to the secure vault. Alternatively, the virtual secure desktop may be created by intercepting calls the Native API and redirecting requests from the virtual secure desktop session to the secure vault.Type: GrantFiled: July 22, 2004Date of Patent: June 19, 2012Assignee: Cisco Technology, Inc.Inventors: Gregoire Alexandre Gentil, Alireza Malekzadeh
-
Patent number: 8205246Abstract: In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of a different node in the network and an authenticated user ID of a user of the different node. Resource profile data is retrieved based on the user ID. The resource profile data indicates all application layer resources on the network that the user is allowed to access. The particular network address is associated at the local node with the resource profile data for the user. A request from the particular network address for a requested application layer resource on the network is blocked based on the resource profile data associated with the particular network address.Type: GrantFiled: May 10, 2007Date of Patent: June 19, 2012Assignee: Cisco Technology, Inc.Inventors: Kevin Shatzkamer, Christopher C. O'Rourke, Richard Alan Galatioto
-
Patent number: 8205076Abstract: This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be embodied in methods that include establishing, based on cryptographic information in a reserved, random-data portion of a handshake communication, a session, receiving parameter values relating to a sub media stream, included in a header of a network communication, storing the parameter values, obtaining state information and a data payload included in a second network communication, identifying, from the state information, a purpose of the second network communication, and whether a header of the second network communication includes one or more new values corresponding to one or more of the parameters, updating one or more of the stored values based on the one or more new values, and processing the data payload based on the identified purpose and the stored parameter values.Type: GrantFiled: November 24, 2011Date of Patent: June 19, 2012Assignee: Adobe Systems IncorporatedInventors: Pritham Shetty, Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Michael Thornburgh
-
Patent number: 8201235Abstract: A system includes first and second firewalls and a controller. The first firewall is configured to perform a firewall function on a first redundant input data packet and output the first input packet as a first redundant output data packet according to the firewall function. The second firewall is configured to perform the firewall function on a second redundant input data packet and output the second input packet as a second redundant output data packet according to the firewall function. The output packets are at least substantially similar when the firewall devices function properly. The controller is configured to receive the output packets from the firewalls, transmit at a given time one of the output packets, transmit the first output packet while the second firewall is failed, and transmit the second output packet while the first firewall is failed.Type: GrantFiled: October 13, 2010Date of Patent: June 12, 2012Assignee: AT&T Intellectual Property I, L.P.Inventors: Thomas H. Adams, Michael T. Raftelis
-
Patent number: 8200986Abstract: Computer related method and apparatus to transmit a logical value (e.g., 1 or 0) between two entities, such as an operating system and application program, in a secure way in an insecure environment. The logical status is sent by in effect encrypting it using two random numbers, one from each entity, before sending it to the other entity. However the encrypting is much “lighter” (requiring much less computer or circuit resources) than any conventional secure cipher and has a built-in verification feature.Type: GrantFiled: April 24, 2008Date of Patent: June 12, 2012Assignee: Apple Inc.Inventors: Mathieu Ciet, Augustin J. Farrugia, Gianpaolo Fasoli
-
Patent number: 8200958Abstract: A system and method for delivering content to end users encrypted within a content delivery network (CDN) for content originators is disclosed. CDNs transport content for content originators to end user systems in a largely opaque manner. Caches and origin servers in the CDN are used to store content. Some or all of the content is encrypted within the CDN. When universal resource indicators (URIs) are received from an end user system, the CDN can determine the key used to decrypt the content object within the CDN before delivery. Where there is a cache miss, an origin server can be queried for the content object, which is encrypted in the CDN.Type: GrantFiled: October 5, 2009Date of Patent: June 12, 2012Assignee: Limelight Networks, Inc.Inventors: Peter Coppola, William P. White, Tamara Monson
-
Patent number: 8200957Abstract: A method, apparatus, and system are directed toward managing a Transmission Control Protocol/Internet Protocol (TCP/IP) handshake. A SYN-ACK cookie is determined based on a cryptographic operation using a secret key and at least one network characteristic. The SYN-ACK cookie is provided in a SYN message's field. The SYN message is sent from a client to a server. Another sequence number based on the received SYN-ACK cookie is included in a SYN-ACK message. The SYN-ACK message is sent to and received by the client. The other sequence number is validated based on the secret key to generate at least another network characteristic. A TCP/IP connection is established if the network characteristic matches the other network characteristic. In one embodiment, the component sending the SYN message may be a different component than the component receiving the SYN-ACK message. In this embodiment, the secret key may be shared between the two components.Type: GrantFiled: March 4, 2011Date of Patent: June 12, 2012Assignee: F5 Networks, Inc.Inventors: Arindum Mukerji, Jesse Abraham Rothstein
-
Patent number: 8201224Abstract: A computer-implemented method for temporarily adjusting control settings on computing devices. The method may comprise: 1) receiving a set of permissions for adjusting a set of control settings on a computing device, 2) identifying the set of control settings to be adjusted, and then 3) temporarily adjusting, based on the set of permissions, the set of control settings. The method may further comprise saving a base state of the set of control settings and restoring the set of control settings to the base state. Corresponding systems and computer-readable media are also disclosed.Type: GrantFiled: September 30, 2008Date of Patent: June 12, 2012Assignee: Symantec CorporationInventor: Michael Spertus
-
Patent number: 8200966Abstract: The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An active software agent is utilized to fetch passwords and user identifiers from a user computing system and to use the passwords and identifiers to extract required information from the secure site. The password sites and identifiers are encrypted and an encryption key is stored at a network mode remote from the user's computer and is fetched in order to enable the passwords and identifiers to be decrypted so that the active agent can use them to obtain the required information.Type: GrantFiled: February 14, 2002Date of Patent: June 12, 2012Assignee: Ewise Systems Pty Ltd.Inventors: Alexander Grinberg, Mike Kontorovich, Mark Chazan, Colin Reyburn
-
Patent number: 8201237Abstract: Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer networks that are provided by the configurable network service for use by the users. Secure private access between a computer network provided for a user by the configurable network service and one or more other remote computing systems of the user (e.g., a remote private network) may be enabled in various ways. For example, a user may programmatically invoke an API provided by the configurable network service to obtain assistance in establishing remote access from a remote location to a provided computer network of the configurable network service, such as to establish a VPN connection from the remote location to the provided computer network using hardware and/or software supplied to the remote location in response to the API invocation.Type: GrantFiled: December 10, 2008Date of Patent: June 12, 2012Assignee: Amazon Technologies, Inc.Inventors: Andrew J. Doane, Eric Jason Brandwine
-
Patent number: 8201234Abstract: Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.Type: GrantFiled: May 9, 2007Date of Patent: June 12, 2012Assignee: Microsoft CorporationInventors: Gerardo Diaz-Cuellar, David Abzarian, Lokesh Srinivas Koppolu, Eran Yariv
-
Publication number: 20120144188Abstract: Method for connecting a first computer network and at least a second extended computer network wherein the at least second extended computer network is not connected to the Internet and does not have a routing path to the first computer network, the method comprising: installing a concentration router within an intermediate network and associating the concentration router to a public IP address; interconnecting the intermediate network to the at least second extended computer network through a CPE router, and interconnecting the intermediate network to the first computer network via the Internet passing through the concentration router; implementing an IP tunnel between the at least second extended computer network and the first computer network across the direct intermediate network and the Internet, wherein the IP tunnel is implemented as a first external and encrypted IP tunnel, across the Internet, and a second internal non-encrypted IP tunnel across the intermediate network.Type: ApplicationFiled: July 1, 2009Publication date: June 7, 2012Applicant: SOLAR TURBINES INCORPORATEDInventors: Marco Agostani, Carlo Federico Bolchini, Matteo Valsasna, Joseph Stinson McElhinney, IV, Kevin Scott Orr, Miguel J. Estupinan
-
Patent number: 8196194Abstract: In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server. The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.Type: GrantFiled: September 30, 2010Date of Patent: June 5, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Fredrik Lindholm, Rolf Blom, Karl Norrman, Göran Selander, Mats Näslund
-
Patent number: 8195958Abstract: A telephone conversation between one or several first telecommunication terminals in a packet oriented data network and telecommunication terminals in an analog and/or digital network is encrypted by a module which enables the use of protocols from a LAN network to a TDM network to carry out end-to-end encryption.Type: GrantFiled: November 9, 2004Date of Patent: June 5, 2012Assignee: Siemens AktiengesellschaftInventor: Steffen Fries
-
Publication number: 20120137125Abstract: Devices, methods, and systems capable of an enabling transmission and receipt of secure and non-secure data are discussed in this document. According to some embodiments, a network apparatus can transmit ciphered and unciphered data. The network apparatus transmits a first signal indicating a cipher to be used and transmits a second signal indicating that non-secure data is to be transmitted and received unciphered. The network apparatus can cipher secure data and transmits ciphered-secure data and unciphered-non-secure data. A wireless terminal can receive the first and second signals, the ciphered secure data, and the unciphered non-secure data. The wireless terminal can deciphers the received secure data and does not decipher the received non-secure data. System embodiments can include both network-side and network terminal components. Embodiments of the present invention enable secure transmission of data in concert with efficient processing.Type: ApplicationFiled: November 10, 2011Publication date: May 31, 2012Applicant: QUALCOMM INCORPORATEDInventors: Mungal Singh Dhanda, Simon James Walke, Philip J. Children
-
Publication number: 20120137358Abstract: A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.Type: ApplicationFiled: February 9, 2012Publication date: May 31, 2012Applicant: JUNIPER NETWORKS, INC.Inventors: Changming LIU, Choung-Yaw SHIEH, Yonghui CHENG
-
Patent number: 8190878Abstract: A method is disclosed for sending messages such as emails where the sender and receiver in the exchange remain anonymous to each other. The method uses a service, which may for example be an Internet service provider, which acts as an intermediary between a first party and second party to a message. All exchanges between the first and second parties pass through the service, which masks all true identities while ensuring that the message is routed to the proper recipient(s).Type: GrantFiled: March 23, 2007Date of Patent: May 29, 2012Assignee: Microsoft CorporationInventors: Pablo M. Stern, Arnold N. Blinn
-
Patent number: 8190877Abstract: A cryptographic processor for redundantly-processing cryptographic operations is disclosed. The cryptographic processor includes a number of input ports, a first and second cryptographic engines, comparison logic and a plurality of output ports. The number of input ports is configured to accept both plaintext and ciphertext. Each of the number of input ports is coupled to both the first and second cryptographic engines. The comparison logic is configured to determine if the first and second cryptographic engines produce a result that is different. The number of output ports is configured to produce both plaintext and ciphertext.Type: GrantFiled: July 3, 2006Date of Patent: May 29, 2012Assignee: ViaSat, Inc.Inventors: Sean K. O'Keeffe, John R. Owens, Richard L. Quintana
-
Patent number: 8191143Abstract: Anti-pharming techniques in wireless computer networks at pre-IP state are disclosed. A user computer connecting to a wireless computer network may include an anti-pharming module configured to monitor data communications to and from a wireless access point of the wireless computer network. The anti-pharming module may be configured to determine if data communication going in a direction from the wireless access point to the user computer originated from a wireless station rather than a server configured to dynamically provide network addresses to computers connecting to the wireless computer network. The wireless station may be deemed a malicious computer perpetrating a pharming attack when it originated the data communication and is responding to a request to obtain network address previously sent by the user computer.Type: GrantFiled: November 13, 2007Date of Patent: May 29, 2012Assignee: Trend Micro IncorporatedInventors: Kun-Shan Lin, Pei-Chun Yao, Chia-Chi Chang
-
Patent number: 8190879Abstract: A graceful conversion of a security to a non-security transparent proxy is performed. A security transparent proxy is an intermediary between two end devices, with an established secure connection with each end device using different security keys. In response to a policy decision or other stimulus, the security transparent proxy is gracefully converted to a non-security transparent proxy such that it can forward, without decrypting and encrypting, the information received from a first endpoint on the first connection therewith to the second endpoint on the second connection therewith. This conversion is “graceful” in that it does not drop either of the two original sessions. In one embodiment, this graceful conversion is accomplished by triggering a key renegotiation on both of the two sessions such that the two connections will use the same encryption key.Type: GrantFiled: December 17, 2009Date of Patent: May 29, 2012Assignee: Cisco Technology, Inc.Inventor: Jianxin Wang
-
Publication number: 20120131330Abstract: Secured transmissions between a client and a server are detected, a policy formulated whether encrypted material needs to be decrypted, and if content is to be decrypted it is, using decrypting information obtained from the client and server. Resulting plain test is then deployed to an entity such as a processor, store or interface. The plain text can be checked or modified. The transmission between client and server could be blocked, delivered without being decrypted, decrypted and then re-encrypted with or without modification. Each transmission is given an ID and a policy tag.Type: ApplicationFiled: January 30, 2012Publication date: May 24, 2012Applicant: Netronome Systems, Inc.Inventors: Johann Heinrich Tönsing, Roelof Nico DuToit, Gysbert Floris van Beek Van Leeuwen
-
Patent number: 8185944Abstract: A server for transferring data between networks. The server is programmed to perform the following steps: (a) creating a receiving process, a filtering process and a forwarding process, the filtering process being dictated by a file that specifies filtering rules, wherein: (b) the receiving process receives data transmitted from a source host; (c) the filtering process filters the transmitted data based on the filtering rules; and (d) the forwarding process forwards only filtered data to a destination host.Type: GrantFiled: February 28, 2006Date of Patent: May 22, 2012Assignee: The Boeing CompanyInventors: Daniel D. Schnackenberg, Janell Schnackenberg, legal representative, Kelly S. Bunn, Thomas E. Donofrio, Steven L. Arnold, Travis S. Reid, Ryan D. Hammond
-
Patent number: 8185933Abstract: In general, the principles of this invention are directed to techniques of locally caching endpoint security information. In particular, a local access module caches endpoint security information maintained by a remote server. When a user attempts to access a network resource through an endpoint device, the endpoint device sends authentication information and health information to the local access module. When the local access module receives the authentication information and the health information, the local access module controls access to the network resource based on the cached endpoint security information, the authentication information, and a security state of the endpoint device described by the health information.Type: GrantFiled: February 1, 2011Date of Patent: May 22, 2012Assignee: Juniper Networks, Inc.Inventor: Matthew Palmer
-
Publication number: 20120124367Abstract: A communications module for facilitating secure communications on a first network and a second network includes: a single transceiver for receiving and transmitting first network messages from and to the first network and at least transmitting second network messages to the second network; at least a first processor connected to the single transceiver for processing one or more first network messages and second network messages; the at least a first processor including first network logic for processing first network messages and second network logic for processing second network messages; and the second network logic including instructions for securing second network messages such that decryption of the second network messages is limited to a particular receiving device on the second network. The second network messages may include commodity pricing and use information.Type: ApplicationFiled: November 15, 2011Publication date: May 17, 2012Applicant: Trilliant Holdings Inc.Inventors: Nathan Ota, Robert Conant, Michel Veillette, Vincent Bemmel, Frederick Enns
-
Publication number: 20120124368Abstract: The present invention is an apparatus and method for the money transactions required in the selling of merchandise or media content on the Internet or other public or private network. It can then track and maintain digital rights to merchandise or media. Methods of access to digitally protected content are disclosed. License metadata and credentials from multiple types of digital rights management systems may be used to grant access through a home based or other end-user custodial digital rights “place-chaser” to content protected by different types of serial copy management systems. Content security using a non-audible or invisible code signal sequence(s) can provide traceability as well as absolute anonymity for the purchaser. This apparatus can be used to conduct transactions off the web so that business can be done on the web.Type: ApplicationFiled: November 15, 2011Publication date: May 17, 2012Inventor: James Leonard Driessen
-
Patent number: 8181012Abstract: An information processing apparatus transmits an encrypted document to a destination that is received as the destination of the encrypted document, stores the received destination, and determines whether the stored destination is a correct destination or not. If it is determined to be the correct destination, it transmits a decryption key of the encrypted document to the relevant destination.Type: GrantFiled: May 22, 2006Date of Patent: May 15, 2012Assignee: Konica Minolta Business Technologies, Inc.Inventor: Tomomi Ono
-
Patent number: 8180059Abstract: A management apparatus reduces the number of pieces of unique information each not generated from another piece of unique information, among unique information being bases of keys assigned to managed apparatuses. The management apparatus calculates, for nodes in layers other than tree structure leaves, subsets of apparatus identifiers subordinate to the nodes, searches for a subset wholly containing another subset in the lowermost layer other than a leaf layer from an immediately-upper layer and mutually associates these subsets, searches for another subset wholly containing the containing subset from a same or an immediately-upper layer and mutually associates these subsets, controls this processing to repeat up to the uppermost layer, controls these processings to repeat on all subsets in the lowermost layer, makes unique information correspond to subsets in the lowermost layer, and makes information derivatively obtained from the unique information correspond to subsets connected due to the associating.Type: GrantFiled: November 25, 2004Date of Patent: May 15, 2012Assignee: Panasonic CorporationInventors: Toshihisa Nakano, Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
-
Patent number: 8181014Abstract: A method and apparatus for protecting the routing of data packets in a packet data network. When a first end-host sends an address query to a DNS server system regarding a second end-host, the DNS server system responds by providing a destination parameter containing an encrypted destination address associated with the second end-host. Thereby, the first end-host is able to get across data packets to the second end-host by attaching the destination parameter to each transmitted data packet. A router in the packet data network admits a received packet if a destination parameter is attached to the packet including a valid destination address encrypted by a key dependent on a distributed master encryption key. Otherwise, the router discards the packet if no such valid destination address can be derived from the packet by applying decryption to the destination parameter.Type: GrantFiled: May 9, 2008Date of Patent: May 15, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Andras Csaszar, Lars Westberg, Mats Naslund
-
Patent number: 8180053Abstract: A secure communications system has at least one processor and a control bus. A number of ports, each having a different fixed address, are coupled to the control bus. The processor assigns each port the address of another port whose data the port is permitted to receive when placed on a system data bus by the other port. A time slot generator outputs each fixed port address sequentially during corresponding time slots in a recurring manner, and a time slot bus is coupled to the time slot generator and to each of the ports. The ports are configured so that (a) when a given port detects its fixed address on the time slot bus, it writes desired outbound data on the data bus, and (b) when the given port detects its assigned port address on the time slot bus, the given port reads data off the data bus.Type: GrantFiled: May 20, 2010Date of Patent: May 15, 2012Assignee: BAE Systems Information and Electronic Systems Integration Inc.Inventor: Jeffrey B. Canter
-
Patent number: 8180888Abstract: In various embodiments, a method for managing edge processors includes providing an interface that allows a user to define a network operation associated with a edge processor. A network operation is generated based on input received via the interface. An action defined by the network operation is then performed at one or more edge processors.Type: GrantFiled: December 30, 2008Date of Patent: May 15, 2012Assignee: Oracle International CorporationInventors: Samuelson Rehman, Gregory Grisco, Anit Chakroborty, Prabhat Dalmia, Jun Mao
-
Patent number: 8181022Abstract: A method and apparatus for controlling access restrictions for media resource playback may include defining a user-specific content control profile authorizing one or more classes of content to be delivered to a client device, generating a media resource request identifying a first media resource associated with a first class of content and one or more attributes of the content control profile, determining whether the first class of content has been authorized for delivery to the client device based at least in part upon the one or more attributes of the content control profile, and delivering the first media resource to the client device if the first class of content has been authorized for delivery to the client device.Type: GrantFiled: June 24, 2004Date of Patent: May 15, 2012Assignee: RealNetworks, Inc.Inventor: Randy Meyerson
-
Patent number: 8180828Abstract: A method and apparatus for providing a plug-in architecture in a real-time web application framework is described. In one embodiment, the method includes receiving an application to be installed on a hub of a real-time web application framework. The method may also include installing the application on an entry point of the hub, the application one of a plurality of different types of applications to be automatically run by the hub.Type: GrantFiled: November 25, 2009Date of Patent: May 15, 2012Assignee: Red Hat, Inc.Inventor: Luke J. Macken
-
Patent number: 8181011Abstract: An iSCSI name forwarding technique allows a security appliance to assume iSCSI names of one or more clients and one or more storage systems in a network. The security appliance is coupled between each client and storage system, and is configured to intercept a data access request issued by the client that is destined for the storage system. Each iSCSI name of the storage system is an iSCSI target name associated with secure storage, i.e., a cryptainer, served by the storage system, whereas the iSCSI name of the client is an iSCSI initiator name of the network entity, i.e., the client, which initiates the data access request to access data stored on the cryptainer.Type: GrantFiled: August 23, 2006Date of Patent: May 15, 2012Assignee: NetApp, Inc.Inventor: Ian Chang
-
Patent number: 8181013Abstract: A method for transmitting content in a call established via media gateway control protocol includes: encrypting an RFC, Request for Comment, 2833 message with a first key; and sending out the encrypted RFC2833 message. The key used for encryption and decryption may be configured in advance on a calling and a called media gateways, or be sent from a soft switch device once and for all, or be sent from the soft switch device every time when a call is initiated. The key sent from the soft switch device may be in clear text or be encrypted. The technical scheme of the present invention greatly improves the security of the content in the RFC2833 protocol transmission.Type: GrantFiled: December 28, 2007Date of Patent: May 15, 2012Assignee: Huawei Technologies Co., Ltd.Inventor: Ning Zhu
-
Patent number: 8181240Abstract: A method of protecting a data network from denial of service (DOS) attacks is described. The method may use various network tools to selectively block or disable portions of a data trunk experiencing a DOS attack, thereby preventing the DOS attack from reaching at least some resources on the network. In one embodiment, a network switch identifies a virtual LAN (VLAN) carrying suspect data on a data trunk. The network switch then adjusts a spanning tree for the network so that one or more ports on the compromised VLAN are blocked or disabled, while non-compromised VLANs are allowed to continue carrying data. Other approaches are also presented for avoiding the loss of valid data when a network blocks one or more VLANs or other portions of a network in response to a DOS attack or other intrusion.Type: GrantFiled: June 14, 2005Date of Patent: May 15, 2012Assignee: Cisco Technology, Inc.Inventors: Premkumar Jonnala, Neha M. Shah, Sivakumar Narayanan, Adam J. Sweeney, Silviu Dobrota
-
Publication number: 20120117378Abstract: A Personal Computer Memory Card International Association (PCMCIA) card is disclosed. The PCMCIA card may include a cryptographic module, a communications interface, and a processor. The cryptographic module may perform Type 1 encryption of data received from a computer into which the card is inserted. The cryptographic module may support High Assurance Internet Protocol Encryption (HAIPE). The communications interface may provide connectivity to a network adapter. The communications interface may include a Universal Serial Bus (USB) interface. The processor may detect whether a network adapter is coupled to the communications interface, identify a device driver that corresponds to the network adapter, and employ the device driver to provide operative communication between the cryptographic module and the network adapter. The PCMCIA card may contain a datastore that maintains a plurality device drivers. For example, the plurality of device drivers support any one of IEEE 802.x, Ethernet, V.Type: ApplicationFiled: October 4, 2011Publication date: May 10, 2012Applicant: L3 COMMUNICATIONS CORPORATIONInventors: John A. Modica, Kenneth White
-
Publication number: 20120117377Abstract: A security gateway/home agent controller HAC is used to assign one home agent HA from a plurality of HAs and to identify at least one security protocol that is common between a mobile node MN and the assigned HA. Establishment of a security association between the MN and the assigned HA is enabled according to the identified security protocol and utilizing bootstrapping parameters provided over a secure connection between the security gateway/HAC and the MN. The bootstrapping parameters include at least a home address for the MN, an address of the assigned HA and security credentials and security parameters for the identified at least one security protocol. In an exemplary embodiment the home address for the MN may be an IPv6 home address and the MN may have certain capabilities with respect to security protocols and ciphering suites which the MN sends to the security gateway.Type: ApplicationFiled: November 5, 2010Publication date: May 10, 2012Inventors: Basavaraj Patil, Gabor Bajko
-
Publication number: 20120117376Abstract: Methods, apparatus, system and computer program are provided for concealing the identity of a network device transmitting a datagram having a network layer header. A unique local identifier and broadcast address are determined in accordance with a next-hop address. A partially encrypted network layer header is determined by encrypting a plurality of identifying portions of the network layer header, where one portion of the network layer header is the unique local identifier. The datagram is encapsulated with another network layer header whose address is set to the broadcast address. The encapsulated datagram can be received and detunneled, and an address of a recipient can be extracted from the network layer header. The datagram is then admitted into a network domain.Type: ApplicationFiled: June 14, 2010Publication date: May 10, 2012Applicants: RAYTHEON BBN TECHNOLOGIES CORP., VERIZON CORPORATE SERVICES GROUP INC.Inventors: Russell Andrew FINK, Edward A. BUBNIS, JR., Thomas E. KELLER
-
Gateway device, controlling method of the same, and program record medium storing controlling method
Patent number: 8176315Abstract: A method of controlling a gateway device includes the steps of converting a plain text mail received from a client device to an encrypted mail; transmitting the encrypted mail to a mail transmission server; and notifying a transmission error to the client device when the transmission error occurs between the gateway device and the mail transmission server is provided.Type: GrantFiled: May 7, 2008Date of Patent: May 8, 2012Assignee: Murata Machinery, Ltd.Inventors: Kazuhiro Okada, Shigeki Takeuchi, Katsunori Ishiyama -
Patent number: 8176544Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: February 3, 2011Date of Patent: May 8, 2012Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 8176539Abstract: The present invention discloses methods, media, and gateways for protecting against cookie-poisoning attacks in networked-communication applications. Methods include the steps of: creating a protected gateway cookie, generated by a gateway, for a server cookie, generated by a server, wherein the server cookie is received by the gateway in an HTTP response message; and validating, by the gateway, that a client cookie from a client request has a corresponding gateway cookie with expected field values. Preferably, the field values include at least one field value selected from the group consisting of: a name, a hash value computed over the server cookie, a hash-function index, a timestamp, a nonce, a hash value computed over newly-generated values, a path, a domain, an expiration, and an HTTP-only value. Preferably, the gateway cookie is signed with a secret key. Most preferably, the secret key is generated by a secret seed.Type: GrantFiled: October 28, 2008Date of Patent: May 8, 2012Assignee: Check Point Software Technologies Ltd.Inventors: Ori Aldor, Neta Solomon
-
Publication number: 20120110323Abstract: According to one aspect of the invention, a file received from a first user is stored in a storage device, where the file includes private metadata encrypted by a secret key associated with a second user. A private metadata identifier is stored in a predetermined storage location, indicating that private metadata of the file has not been decrypted and indexed. In response to an inquiry subsequently received from the second user, the predetermined storage location is scanned to identify the private metadata identifier based on the inquiry. The encrypted metadata identified by the private metadata identifier is transmitted to the second user for decryption. In response to the metadata that has been decrypted by the second user, the decrypted metadata is indexed for the purpose of subsequent searches of at least one of the metadata and the file.Type: ApplicationFiled: October 27, 2010Publication date: May 3, 2012Applicant: APPLE INC.Inventors: Kaelin L. Colclasure, John M. Hörnkvist, Braden J. Thomas
-
Patent number: 8171549Abstract: Apparatus, methods and articles of manufacture are disclosed for analyzing code. A valuation component, which provides a value for analyzed code is comprised of a tokenization component, hashing component and numerical valuation component. As code is transferred through the components, a numerical value for the code is generated. The valuation may occur through hashing, probability analysis and comparison against a proscribed code indicator.Type: GrantFiled: April 26, 2004Date of Patent: May 1, 2012Assignee: Cybersoft, Inc.Inventors: Peter V. Radatti, Richard J. Perry
-
Patent number: 8171280Abstract: Two or more distinct operating systems (OSs) are loaded simultaneously and run on an x86 computer system. Each OS is booted serially and in such a way that the OS resides in a separate memory footprint than the other OSs by partitioning the memory map. The partition of the memory map includes a low memory region, dedicated memory partitions for storing each OS, and dedicated regions for storing shadows of the low memory region and the ACPI for each OS. Switching between the two or more resident OSs is performed by sleeping the current OS and then resuming the desired OS using the shadow previously stored for the desired OS. None of the resident OSs require any modification in order to run in this fashion.Type: GrantFiled: August 21, 2009Date of Patent: May 1, 2012Inventor: Matthew Laue
-
Patent number: 8171539Abstract: Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.Type: GrantFiled: January 7, 2009Date of Patent: May 1, 2012Assignee: Symbol Technologies, Inc.Inventor: Trevor Miranda