Packet Header Designating Cryptographically Protected Data Patents (Class 713/160)
-
Patent number: 10218516Abstract: The invention relates to a system and method of re-programming memory, and in particular, to wirelessly re-programming software, such as the application code, residing in memory of a trainable transceiver. The wireless re-programming of memory allows for software in the trainable transceiver to be updated or replaced from a remote location, where a direct or wired connection to the product is not otherwise available.Type: GrantFiled: November 13, 2017Date of Patent: February 26, 2019Assignee: GENTEX CORPORATIONInventors: Chris H. Vuyst, Todd R. Witkowski, Carl L. Shearer, Steven L. Geerlings, Thomas D. Klaver
-
Patent number: 10210338Abstract: In a compression processing storage system, using a pool of encryption processing cores, the encryption processing cores are assigned to process either encryption operations, decryption operations, and decryption and encryption operations, that are scheduled for processing. A maximum number of the encryption processing cores are set for processing only the decryption operations, thereby lowering a decryption latency. A minimal number of the encryption processing cores are allocated for processing the encryption operations, thereby increasing encryption latency. The encryption operations, the decryption operations, and the decryption and encryption operations are scheduled between the pool of the plurality of processing cores according to a thread weight value (TWV) that is assigned to each one of the plurality of processing cores having a difference in processing power.Type: GrantFiled: November 22, 2017Date of Patent: February 19, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan Amit, Amir Lidor, Sergey Marenkov, Rostislav Raikhman
-
Patent number: 10206138Abstract: Systems and methods are disclosed for assigning a quality of service to a data packet in a communications network by mapping a Wi-Fi access layer identifier such as an SSID to a value in a datagram header, and subsequently using the datagram header to assign an appropriate data bearer for the datagram, the data bearer having a quality of service class identifier appropriate for the type of traffic expected to be sent over the particular Wi-Fi access layer.Type: GrantFiled: June 20, 2016Date of Patent: February 12, 2019Assignee: Parallel Wireless, Inc.Inventors: Yang Cao, Sumit Garg, Anand Bhaskarwar, Steven Beaudette, Mohit Chugh
-
Patent number: 10193939Abstract: Managing Security Parameter Information (SPIs) to prevent race condition failures begins where a system negotiates SPIs along with associated expiration times, and re-negotiates new SPIs as necessary. The system prevents race conditions that would otherwise occur when both an old SPI and a new SPI are active at the same time. The system accomplishes this by managing the storage and deletion of old SPIs such that only active SPIs are stored on the system for use by a User Equipment (UE) or Proxy Call Session Control Function (P-CSCF).Type: GrantFiled: August 7, 2017Date of Patent: January 29, 2019Assignee: T-Mobile U.S.A., Inc.Inventors: Kalyan Kalepu, Shujaur Mufti
-
Patent number: 10187215Abstract: A system and methods are provided for establishing an authenticated and encrypted communication connection between two devices with at most two round-trip communications. During establishment of an initial authenticated, encrypted communication connection (or afterward), a first device (e.g., a server) provides the second device (e.g., a client) with a token (e.g., a challenge) that lives or persists beyond the current connection. After that connection is terminated and the second device initiates a new connection, it uses the token as part of the handshaking process to reduce the necessary round-trip communications to one.Type: GrantFiled: November 6, 2017Date of Patent: January 22, 2019Assignee: WhatsApp Inc.Inventors: Bryan D O'Connor, Eugene Fooksman
-
Patent number: 10162847Abstract: An apparatus, method, system, and computer-readable medium are provided for maintaining contact information associated with a contact. In some embodiments a request associated with a contact may be received. Contact information may be obtained from one or more external or internal sources. One or more confidence scores may be generated for the obtained contact information and for one or more values received with the request. Based on the confidence score(s), one or more values associated with the contact may be incorporated in one or more data stores. In some embodiments, suggestions for contact related information may be generated. Responses to the suggestions may be used to update the generated confidence score(s).Type: GrantFiled: June 13, 2014Date of Patent: December 25, 2018Assignee: Comcast Interactive Media, LLCInventors: Peter Lester, Justin Miller, Hendrick Lee, Aseem Sharma, Galen Trevor Gattis, Amber Dixon, Huy Tuan Nguyen, Derek McGowan, John McCrea
-
Patent number: 10154014Abstract: One embodiment provides a system for efficiently and securely encrypting, transmitting, and decrypting video data, including selective encryption of image frames. During operation, the system obtains by a content-transmitting device, an image frame which is used to form a video stream. In response to determining that the image frame satisfies a predetermined condition for encryption, the system encrypts the image frame based on an encryption algorithm. The system encapsulates the encrypted image frame based on encapsulation information. The system includes encryption identification information for the image frame in the encapsulation information.Type: GrantFiled: August 18, 2016Date of Patent: December 11, 2018Assignee: Alibaba Group Holding LimitedInventors: Qi Zhang, Didi Yao
-
Patent number: 10091117Abstract: Techniques for code block (CB) segmentation and rate matching in wireless deployments that may use CB-level feedback may provide that a transport block group (TBG) may include one or more CBs from multiple transport blocks (TBs). Such TBGs may support retransmissions of one or more CBs from different TBs within a TBG transmission. In certain examples, a TBG size may be determined, and a retransmission size associated with any CBs to be retransmitted are determined. Based at least in part on the TBG size and retransmission size, it may be determined whether a new TB may be included in the TBG.Type: GrantFiled: June 14, 2016Date of Patent: October 2, 2018Assignee: QUALCOMM IncorporatedInventors: Jing Sun, Taesang Yoo
-
Patent number: 10078736Abstract: Disclosed are systems and methods for improving interactions with and between computers in content communicating, rendering, generating, hosting and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods The disclosed systems and methods enable the seamless, and adaptable implementation of digital rights management technology on a client device despite variations in the version, languages, programs executing on differing linked devices. The disclosed systems and methods enable the rendering of content via encryption and decryption of the content, which protects the digital media content on the client end.Type: GrantFiled: March 30, 2016Date of Patent: September 18, 2018Assignee: ALIBABA GROUP HOLDING LIMITEDInventor: Yusong Wei
-
Patent number: 10075416Abstract: In general, techniques for sharing of network session data are described. The techniques may enable security devices to leverage application classification information in a federated manner. An example security device includes a memory and one or more processors. The processor(s) are configured to receive data representative of an application classification for a first packet flow from a second security device, to receive data of a second packet flow, and, when the second packet flow corresponds to the first packet flow, to monitor the data of the second packet flow based on the application classification for the first packet flow without determining an application classification for the second packet flow.Type: GrantFiled: December 30, 2015Date of Patent: September 11, 2018Assignee: Juniper Networks, Inc.Inventors: Nagendra Singh Yadav, Anil Kumar Reddy Sirigiri
-
Patent number: 10075434Abstract: Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.Type: GrantFiled: June 21, 2016Date of Patent: September 11, 2018Assignee: Intel CorporationInventors: Jim S. Baca, Tobias M. Kohlenberg, Hong Li, David Stanasolovich, Mark H. Price, Steven J. Birkel, Kenneth W. Reese, Ronald Tafoya
-
Patent number: 10044713Abstract: Identity management, user authentication, and/or user access to services on a network may be provided in a secure and/or trustworthy manner, as described herein. For example, trustworthy claims may be used to indicate security and/or trustworthiness of a user or user device on a network. Security and/or trustworthiness of a user or a user device on a network may also be established using OpenID and/or local OpenID, a secure channel between a service and the user device, and/or by including a network layer authentication challenge in an application layer authentication challenge on the user device for example.Type: GrantFiled: August 20, 2012Date of Patent: August 7, 2018Assignee: InterDigital Patent Holdings, Inc.Inventors: Andreas Leicher, Andreas Schmidt, Yogendra Shah
-
Patent number: 10044809Abstract: Provided is a wireless communication device for packet communication. When power is applied, in a case where a packet data is received before receiving a message notifying that packet communication starts, the other party is urged to transmit a message saying that the packet communication starts and a packet number is initialized in accordance with transmission and reception of the message that the packet communication starts.Type: GrantFiled: November 3, 2015Date of Patent: August 7, 2018Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventor: Toshiyuki Sugitani
-
Patent number: 10015542Abstract: A method and system are provided for securely storing and retrieving live off-disk media programs. Events delineate media segments, each of which are encrypted with a different key so as to be streamable to a remote device via digital living network alliance (DLNA) or HTTP live streaming protocols. Media segments and identifiers for managing the storage and retrieval of such media segments are compatible with live streaming data structures, obviating the need to re-encrypt data streams.Type: GrantFiled: March 14, 2014Date of Patent: July 3, 2018Assignee: ARRIS Enterprises LLCInventors: Rafie Shamsaasef, William P Franks, Geetha Mangalore, Paul Moroney
-
Patent number: 9992019Abstract: A method includes affiliating an authentication token with user information of a user. The method further includes generating a private/public key pairing associated with the user information. The method further includes applying a share encoding function on a private key of the private/public key pairing to produce a set of encoded shares. The method further includes generating a set of random numbers and generating a set of hidden passwords based on the user information. The method further includes generating a set of encryption keys based on the set of hidden passwords and the set of random numbers. The method further includes encrypting the set of encoded shares utilizing the set of encryption keys to produce a set of encrypted shares. The method further includes outputting the set of encrypted shares to the authentication token for storage therein and outputting the set of random numbers to a set of authenticating units.Type: GrantFiled: November 30, 2015Date of Patent: June 5, 2018Assignee: International Business Machines CorporationInventors: Jason K. Resch, S. Christopher Gladwin, Andrew Baptist, Thomas Franklin Shirley, Jr.
-
Patent number: 9992202Abstract: Certain aspects and features of the present disclosure relate to providing access control using groups that can be dynamically controlled by group owners, such access control hereinafter referred to as group access control. Group access control can be used to control the transmission of packets on a network layer, or for other access control. A network administrator can provide users with permissions, such as using user roles. Users can then establish groups to share permissions with other users. A group is established by a group owner, who can modify the member list of that group and modify what permissions will be passed on to group members all without the involvement of a network administrator. Members of a group can include users, devices, and network resources. Additionally, data path entities (e.g. routers and access points) can facilitate delivery of packets between group members across multiple logical networks.Type: GrantFiled: April 30, 2015Date of Patent: June 5, 2018Assignee: ARUBA NETWORKS, INCInventors: Edward Vajravelu, Partha Narasimhan, Sachin Shamrao Sanap, Gopal Agarwal
-
Patent number: 9961057Abstract: Methods of securing a cryptographic device against implementation attacks, are described. A disclosed method comprises the steps of obtaining a key (230) from memory of the cryptographic device; providing the key and a constant input (210) to an encryption module (240); deriving an output (250) of encrypted data bits using the encryption module (240); providing the output (250), the key (230) and an input vector (270) to a key update module (260); and using said key update module (260) to modify the key based on at least a part (270a) of the input vector (270) to derive an updated key (230a). This prevents the value of the key from being derived using the updated key or by using side-channel attacks because the input is constant for all keys. Additionally, by altering the input vector, the updated key is also altered.Type: GrantFiled: September 10, 2015Date of Patent: May 1, 2018Assignee: NXP B.V.Inventors: Marcel Medwed, Martin Feldhofer, Ventzislav Nikov
-
Patent number: 9942159Abstract: A node in a first network domain and a method performed thereby for transmitting a data packet to a VPN client in a second network domain, the node and the VPN client being part of a VPN, wherein the first and second network domain are connected by means of a third network domain are provided. The method comprises receiving, from an application server, a first packet comprising a first IP header and a payload; and determining a DCSP. The method further comprises adding a second header comprising the determined DCSP and an IP address of a VPN client resulting in a second packet and encrypting the second packet. Further the method comprises adding a third header to the encrypted second packet resulting in a third packet, the third header comprising a destination address of a node in the second network domain, and transmitting the third packet in an IP tunnel terminating at the node in the second network domain.Type: GrantFiled: January 28, 2014Date of Patent: April 10, 2018Assignee: TELEFONAKTIEBOLAGET LM ERICSSONInventors: Henrik Basilier, Göran Eneroth, Michael Liljenstam, Linus Andersson, Björn Bodén, Kyösti Toivanen
-
Patent number: 9864850Abstract: A method of relicensing digital encrypted radio media content transmitted via a network and received by a user electronic device includes receiving a request to relicense an encrypted digital media data file included within digital encrypted radio media content. The encrypted digital media data file is retrieved from the digital encrypted radio media content stored in a memory of the user electronic device. The encrypted digital media data file is decrypted using a radio encryption key to generate an unbound digital media data file. The unbound digital media data file is bound with the user electronic device to generate, a bound encrypted digital media data file. The bound encrypted digital media data file is stored in the memory of the user electronic device.Type: GrantFiled: February 11, 2014Date of Patent: January 9, 2018Assignee: Intel CorporationInventor: Joshua D. Hug
-
Patent number: 9858396Abstract: Media content is delivered to a variety of mobile devices in a protected manner based on client-server architecture with a symmetric (private-key) encryption scheme. A media preparation server (MPS) encrypts media content and publishes and stores it on a content delivery server (CDS), such as a server in a content distribution network (CDN). Client devices can freely obtain the media content from the CDS and can also freely distribute the media content further. They cannot, however, play the content without first obtaining a decryption key and license. Access to decryption keys is via a centralized rights manager, providing a desired level of DRM control.Type: GrantFiled: December 8, 2014Date of Patent: January 2, 2018Assignee: ERICSSON ABInventors: Raj Nair, Mikhail Mikhailov
-
Patent number: 9846773Abstract: A technique for enabling a client to provide a server entity is disclosed. In method aspects, a first method is performed in the client and comprises the steps of providing the client with a secure trusted environment, the environment being trusted by the client and by at least one third party, and accommodating, in the secure trusted environment, at least a local portion of the server entity, the server entity being configured to handle one or more server requests from the client, and data required by the server entity so as to handle the server request. A second method is performed in a server and comprises the steps of providing, for the secure trusted environment of the client, the environment being trusted by the client and by the at least one third party the at least local portion of the server entity, and the data.Type: GrantFiled: December 20, 2012Date of Patent: December 19, 2017Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventor: Bernard Smeets
-
Patent number: 9813337Abstract: Techniques for securing name resolution technologies and for ensuring that name resolution technologies can function in modern networks that have a plurality of overlay networks accessible via a single network interface. In accordance with some of the principles described herein, a set of resolution parameters may be implemented by a user to be used during a name resolution process. In some implementations, when an identifier is obtained for a network resource, the identifier may be stored in a cache with resolution parameters that were used in obtaining the identifier. When a new name resolution request is received, the cache may be examined to determine whether a corresponding second identifier is in the cache, and whether resolution parameters used to retrieve the second identifier in the cache match the resolution parameters for the new resolution request. If so, the second identifier may be returned from the cache.Type: GrantFiled: March 14, 2013Date of Patent: November 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Rob M. Trace, Libby Meren
-
Patent number: 9774631Abstract: A network-based appliance includes a mechanism to enable the appliance to extract itself from man-in-the-middle (MITM) processing during a client-server handshake and without interrupting that connection. The mechanism enables the appliance to decide (e.g., based on a rule match against a received server certificate) to stop performing MITM during the handshake and thus to de-insert itself transparently, i.e., without interfering or signaling to either end of the session that this operation is occurring. Once the connection is abandoned in the manner, the appliance ignores additional traffic flow and thus can free up processing resources (CPU, memory, and the like) that would otherwise be required to decrypt the connection (even if no further inspection or rewrite processing would be expected to occur).Type: GrantFiled: October 29, 2014Date of Patent: September 26, 2017Assignee: International Business Machines CorporationInventors: Steven Ashley Mazur, Matthew Joseph Kubilus, Jr.
-
Patent number: 9769119Abstract: Methods and systems for selectively blocking, allowing and/or reformatting IPv6 headers by traversing devices are provided. According to one embodiment, reputation information regarding observed senders of Internet Protocol (IP) version 6 (IPv6) packets and packet fragments is maintained by a traversing device based on conformity or nonconformity of extension headers contained within the IPv6 packets with respect to a set of security checks performed by the traversing device. When an IPv6 packet or packet fragment is received from a particular source IP address indicated by the reputation information to be associated with one or more nonconformity issues, then dropping, rate limiting or quarantining, by the traversing device, the IPv6 packet or the packet fragment.Type: GrantFiled: December 30, 2016Date of Patent: September 19, 2017Assignee: Fortinet, Inc.Inventor: Thorsten Jäger
-
Patent number: 9742743Abstract: A management server (110) encrypts storage target data and transmits the encrypted storage target data to mobile terminals (120a, 120b). Thereafter, the management server (110) receives and decrypts the encrypted storage target data stored in the mobile terminals (120a, 120b).Type: GrantFiled: February 21, 2014Date of Patent: August 22, 2017Assignee: NS SOLUTIONS CORPORATIONInventors: Munehiko Sawafuji, Yasuhiro Okada
-
Patent number: 9733980Abstract: Techniques are described for managing virtual machines using input/output (I/O) device logging. For example, a system bus or other interface to a device may be monitored for traffic data elements. The traffic data elements may include, for example, transaction layer packets (TLPs) for communication across a PCI Express interface, or TCP/IP packets for communication over a network. These traffic data elements may be logged in an I/O device logging buffer. The I/O device logging buffer can then be used to ensure that all memory relating to a virtual machine is copied when transferring the virtual machine to another computing device. In addition, the I/O device logging buffer can be used to stop a virtual machine without waiting for the virtual machine to complete I/O processing.Type: GrantFiled: December 5, 2014Date of Patent: August 15, 2017Assignee: Amazon Technologies, Inc.Inventors: Asif Khan, Anthony Nicholas Liguori, Mark Bradley Davis
-
Patent number: 9729588Abstract: Managing Security Parameter Information (SPIs) to prevent race condition failures begins where a system negotiates SPIs along with associated expiration times, and re-negotiates new SPIs as necessary. The system prevents race conditions that would otherwise occur when both an old SPI and a new SPI are active at the same time. The system accomplishes this by managing the storage and deletion of old SPIs such that only active SPIs are stored on the system for use by a User Equipment (UE) or Proxy Call Session Control Function (P-CSCF).Type: GrantFiled: June 2, 2015Date of Patent: August 8, 2017Assignee: T-Mobile USA, Inc.Inventors: Kalyan Kalepu, Shujaur Mufti
-
Patent number: 9729325Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.Type: GrantFiled: March 16, 2015Date of Patent: August 8, 2017Assignee: QUALCOMM IncorporatedInventors: David Jacobson, Billy Brumley
-
Patent number: 9705675Abstract: A method and system for testing the cryptographic integrity of data m comprises at least the following elements: a module transmitting a message M, said module comprising a memory for storing the parameters used to execute the steps of the method, such as the key, the public data, a transmission medium, a receiver module also comprising storage means for storing at least the same parameters as in transmission. The system may comprise storage means for storing confidential data such as the secret keys, a processor suitable for executing the steps.Type: GrantFiled: December 22, 2011Date of Patent: July 11, 2017Assignee: ThalesInventors: Philippe Painchault, Eric Garrido, Sandra Marcello
-
Patent number: 9660811Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.Type: GrantFiled: March 16, 2015Date of Patent: May 23, 2017Assignee: QUALCOMM IncorporatedInventors: David Jacobson, Billy Brumley
-
Patent number: 9660863Abstract: A first electronic device transmits first configuration information of the first electronic device collected by a tamper-resistant chip mounted thereon and approved by a third-party device to a second electronic device over a short-distance network. The second electronic device transmits second configuration information of the second electronic device collected by a tamper-resistant chip mounted thereon and approved by the third-party device to the first electronic device over the short-distance network. The first electronic device transmits the first configuration information and the second configuration information to the second electronic device over a network. The second electronic device controls connection between the first electronic device and the second electronic device over the network based on the first configuration information and the second configuration information received from the first electronic device.Type: GrantFiled: August 7, 2013Date of Patent: May 23, 2017Assignees: FUJITSU FSAS INC., FUJITSU LIMITEDInventors: Kouji Sakai, Seigo Kotani
-
Patent number: 9646292Abstract: A method and system for distributing digital content to customers at a plurality of points of transaction that allows each content provider to use its own method of digital rights management. A master digital catalog is used to load product data from a plurality of different content providers. The catalog contents are provided to retailers and other points of transaction. A digital activation broker processes customer orders from the points of transaction and provides information that allows the customer access to the content. The content may be provided by the digital activation broker or through a third-party website. In some embodiments, a payment processor is used to process payments submitted by the customers. The digital activation broker may also void transactions and look up lost authorization codes.Type: GrantFiled: July 27, 2012Date of Patent: May 9, 2017Assignee: FOLLETT CORPORATIONInventors: Doug Thompson, Donald Peterson, Steve Holstad, Terry Mainiero
-
Patent number: 9641551Abstract: A method for routing IP packets with IPSec AH authentication is disclosed. The method includes locating overlay edge routers between private domains and their associated NAT routers. Outbound packets from a source private domain are modified by its overlay edge router to include IPSec AH authorization data computed using IP source and destination addresses that match a packet's final source and destination IP address upon final NAT translation immediately prior to delivery to a host of a destination private domain.Type: GrantFiled: August 13, 2013Date of Patent: May 2, 2017Assignee: vIPtela Inc.Inventor: Praveen Raju Kariyanahalli
-
Patent number: 9602403Abstract: A method and an apparatus for transmitting and receiving packets in a broadcasting system are provided. The present disclosure allocates a padding size field by using padding octets, and thus can increase transmission efficiency. Also, the present disclosure does not restrict the number of padding octets while maintaining compatibility with existing disclosures, and thus can carry out as much padding as desired and as necessary. In addition, the present disclosure variably allocates the padding size field depending on the number P of padding octets, and thus can increase header efficiency. Furthermore, since the number of padded octets in a header is immediately known, the size of an actual payload is known in advance, and thus rapid transmission is possible.Type: GrantFiled: January 31, 2013Date of Patent: March 21, 2017Assignee: Samsung Electronics Co., Ltd.Inventors: Sung-Hee Hwang, Kyung-Mo Park, Hyun-Koo Yang, Seho Myung, Sung-Oh Hwang
-
Patent number: 9584328Abstract: A network address includes a predefined portion that identifies a hostname, where the predefined portion is less than all of the network address. A request is received for a secure session at the network address. The hostname is identified from the predefined portion of the network address and a secure session negotiation is made including returning a digital certificate for the identified hostname.Type: GrantFiled: October 5, 2015Date of Patent: February 28, 2017Assignee: CLOUDFLARE, INC.Inventor: John Graham-Cumming
-
Patent number: 9584478Abstract: Methods and systems for selectively blocking, allowing and/or reformatting IPv6 headers by traversing devices are provided. According to one embodiment, reputation information regarding observed senders of Internet Protocol (IP) version 6 (IPv6) packets and packet fragments is maintained by a traversing device based on conformity or nonconformity of extension headers contained within the IPv6 packets with respect to a set of security checks performed by the traversing device. When an IPv6 packet or packet fragment is received from a particular source IP address indicated by the reputation information to be associated with one or more nonconformity issues, then dropping, rate limiting or quarantining, by the traversing device, the IPv6 packet or the packet fragment.Type: GrantFiled: January 25, 2016Date of Patent: February 28, 2017Assignee: Fortinet, Inc.Inventor: Thorsten Jäger
-
Patent number: 9571283Abstract: Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of packets, data is received from a source device to be sent through a network to a destination device. Packet handling information is inserted in a packet that is to be used to transport the data. The packet handling information is configured to enable controlled handling of the packet in the network and is inserted in an unprotected portion of the packet. Encrypted payload data is generated from the data received from the source device. The encrypted payload data and security information are inserted in a protected portion of the packet and the packet is sent to the network.Type: GrantFiled: January 12, 2015Date of Patent: February 14, 2017Assignee: Cisco Technology, Inc.Inventor: Rakesh Chopra
-
Patent number: 9565056Abstract: An Ethernet packet switch configured to manage one or more packet tunnels includes one or more ports; forwarding circuitry communicatively coupled to the one or more ports; and processing circuitry communicatively coupled to the forwarding circuitry, wherein the one or more packet tunnels are configured over the one or more ports, wherein each of the one or more packet tunnels has an associated maintenance endpoint (MEP), and wherein the processing circuitry is configured to manage the one or more packet tunnels based on performance characteristics determined through one or more of the associated MEP, intermediate switches, and a Network Management System.Type: GrantFiled: July 22, 2015Date of Patent: February 7, 2017Assignee: Ciena CorporationInventors: Eric Stewart Davison, Dackary Ronald Busch
-
Patent number: 9558218Abstract: An exemplary embodiment of a multi-tenant database system is provided. The system includes a multi-tenant database, an entity definition table, and a data processing engine. The database has database objects for multiple tenants, including an existing object for a designated tenant. Each entry in the existing object has a respective entity identifier. The definition table has metadata entries for the database objects, including a metadata entry for the existing object. This metadata entry has a tenant identifier for the designated tenant, an entity name for the existing object, and an old key prefix for the existing object. Each entity identifier of the existing object begins with the old key prefix. The engine performs a data truncation operation on the existing object by updating the metadata entry to replace the old key prefix with a new key prefix. This results in an updated object that is identified by the new key prefix and the tenant identifier.Type: GrantFiled: May 18, 2015Date of Patent: January 31, 2017Assignee: salesforce.com, inc.Inventors: Arup Dutta, Simon Wong, Dan Soble, Nathanael Black, Walter Macklem
-
Patent number: 9547777Abstract: An apparatus and a method for validating compressed encrypted archive keys is described. In one embodiment, a pseudo-stream is generated for an archive. The pseudo-stream is made of a small amount of random text. The pseudo-stream is attached to a stream of the archive. The pseudo-stream and stream are compressed using the compression algorithm that includes validation data. The compressed pseudo-stream is then enciphered with an archive key.Type: GrantFiled: August 29, 2008Date of Patent: January 17, 2017Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 9544276Abstract: A method for transmitting and receiving multimedia content having cryptoperiods scrambled by a control word includes a sender using an operating key and an encryption algorithm in a first virtual mother card to encrypt the control word to obtain a cryptogram, using a syntax constructor also in the first virtual mother card to generate an ECM that incorporates the cryptogram, and transmitting it to a terminal. The terminal receives the ECM and using a syntax analyzer contained in a first virtual daughter card associated with the mother card and uses it to locate a position of the cryptogram CW*t in the ECM. Using an operating key of a decryption algorithm in the daughter card, it then decrypts the cryptogram. Then, using the decrypted control word, it proceeds to descramble the cryptoperiod. Meanwhile, the sender occasionally changes the virtual mother card into a different virtual mother card.Type: GrantFiled: December 16, 2011Date of Patent: January 10, 2017Assignee: ViaccessInventors: Vincent Hamon, Gilles Dubroeucq
-
Patent number: 9537650Abstract: A digital escrow pattern for data services can include selective access for obscured data at a remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise. Based on the pattern, a “trustworthy envelope” for any kind of payload enables curtained access through a variety of decorations or seals placed on the envelope that allow for a gamut of trust ranging with guarantees such as, but not limited to, confidentiality, privacy, anonymity, tamper detection, integrity, etc. Verifiable trust is provided through families of techniques that are referred to as wrapper composition. Multiple concentric and/or lateral transform wrappers or layers can wholly or partially transform data, metadata or both to mathematical transform (e.g., encrypt, distribute across storage, obscure) or otherwise introduce lack of visibility to some or all of the data, metadata or both.Type: GrantFiled: July 8, 2010Date of Patent: January 3, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Rahul V. Auradkar, Roy Peter D'Souza
-
Patent number: 9519808Abstract: Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.Type: GrantFiled: September 18, 2014Date of Patent: December 13, 2016Assignee: APPLIED MINDS, LLCInventors: Bran Ferren, W. Daniel Hillis
-
Patent number: 9512659Abstract: An access system includes a transmitter and a receiver for exchange of secure data wherein the system uses an encryption and a decryption algorithm to exchange a secure data packet. The secure data packet may include an unencrypted data packet and an encrypted data packet. The encrypted data packet may include first data encrypted by the encryption algorithm, and data decrypted by the decryption algorithm, wherein the data decrypted by the decryption algorithm includes a combination of a secure signature and second data encrypted by the encryption algorithm.Type: GrantFiled: September 11, 2012Date of Patent: December 6, 2016Assignee: MICROCHIP TECHNOLOGY INCORPORATEDInventors: Vivien Delport, Michael A. Stuckey, Enrique Aleman
-
Patent number: 9509673Abstract: Content stored on a server may be selected using a user device and enabled on a central device. The identity of the central device may be authenticated without transmitting user credentials corresponding to the user, user device, user account, etc. A central device identifier can be sent to the server via the user device. An encrypted version of the central device identifier may be returned to the user device and to the central device. The central device can send the encrypted and unencrypted version of the identifier to the server, and the server can transmit the desired content to the remote device based on a comparison of the encrypted and unencrypted identifier.Type: GrantFiled: August 25, 2014Date of Patent: November 29, 2016Assignee: Google Inc.Inventors: Jason Parks, Timothy Kilbourn, Jeremy Ellington, Cyrus Phiroze Master, Joe Freeman Britt, Jr., Jeremy Lyon, Eugene Koh, Owen Daniel Otto, Michael Jonathon Chen, Jason Simmons, Dmitry Dolinsky, Jeffrey David Yaksick, Manuel Roman
-
Patent number: 9490937Abstract: Disclosed is a broadcast signal transmitting apparatus, a broadcast signal receiving apparatus, and a broadcast signal transceiving method in a broadcast signal transceiving apparatus.Type: GrantFiled: June 17, 2015Date of Patent: November 8, 2016Assignee: LG ELECTRONICS INC.Inventors: Hotaek Hong, Sangchul Moon, Joonhui Lee, Woosuk Ko
-
Patent number: 9444819Abstract: A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.Type: GrantFiled: January 16, 2014Date of Patent: September 13, 2016Assignee: International Business Machines CorporationInventors: Sridhar R. Muppidi, William Alexander Bird, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam
-
Patent number: 9444820Abstract: A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.Type: GrantFiled: September 30, 2014Date of Patent: September 13, 2016Assignee: International Business Machines CorporationInventors: Sridhar R. Muppidi, William Alexander Bird, Sreekanth Ramakrishna Iyer, Archana Kumar, Nataraj Nagaratnam
-
Patent number: 9436835Abstract: A transformation function that satisfies at least linearity and convolution can be used to encrypt data. The transformation function can, for example, be a DFT with one or more evaluation points that can be kept secret for encryption. The transformation function can effectively serve as a transform map and can be used to achieve fully homographic encryption in a system where encrypted data can be manipulated by applying one or more operations and the resulting encrypted data can be decrypted by applying the inverse of the transformation function and/or transformation map. A transformation function that satisfies at least linearity and convolution can be used for various applications, including, for example, private/public key decryption schemes, a signature schemes, database query and search schemes, as well as various applications of homomorphic operations.Type: GrantFiled: January 5, 2013Date of Patent: September 6, 2016Inventor: Gokay Saldamli
-
Patent number: 9426163Abstract: Protecting sensitivity of information in a shared collaborative space on a computer network includes associating a set of sensitivity levels to sets of users and to sets of data elements. Access by each user to the shared collaborative space may be restricted to those data elements that have the same sensitivity level as of the user. Where multiple users join a single session, only data elements having a lowest common sensitivity level are made accessible by the users of the session.Type: GrantFiled: March 11, 2014Date of Patent: August 23, 2016Assignee: International Business Machines CorporationInventors: Lisa Seacat DeLuca, Geetika T. Lakshmanan, Michael Muller