Packet Header Designating Cryptographically Protected Data Patents (Class 713/160)
-
Patent number: 9037852Abstract: A computer system storing parameters pertaining to the regulatory restrictions placed on a for-hire vehicle compares the parameters to a current operating environment of the for-hire vehicle. In some embodiments, the computer system acts as the meter (such as a taximeter) of the for-hire vehicle. The operating parameters may include expiration or exclusion parameters that define the scope of operation of the for-hire vehicle stemming from the for-hire vehicle's medallion or certificate of public convenience and necessity. The expiration or exclusion parameters may also correspond to a driver's permit or any general regulation enacted by the regulatory agency. If the current operating environment does not comply with the expiration or exclusion parameters, the computer system shuts down, or enters a standby mode, and may not accept additional passenger fares until the current operating environment complies with the expiration and exclusion parameters.Type: GrantFiled: September 2, 2011Date of Patent: May 19, 2015Assignee: IVSC IP LLCInventors: Michael Collins Pinkus, Mark A. James, James Alan Wisniewski
-
Patent number: 9038145Abstract: A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in communication with a walled garden proxy server (WGPS). The client sends a request to the WGPS to access a service provided by a site in the garden. The site sends the client a message containing code calling a function in the API. The WGPS traps the message from the site and looks up the site in a table to determine the access control list (ACL) for the site. The WGPS includes the ACL in the header of the hypertext transport protocol (HTTP) message to the client. The shell receives the message and extracts the ACL. If the code lacks permission, the shell stops execution.Type: GrantFiled: December 20, 2013Date of Patent: May 19, 2015Assignee: At Home BondHolders' Liquidating TrustInventors: Ralph William Brown, Milo S. Medin, Robert Keller, David Temkin
-
Patent number: 9027110Abstract: The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly.Type: GrantFiled: August 28, 2012Date of Patent: May 5, 2015Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 9026790Abstract: A system for processing packet streams includes a first packet queuing circuitry connected between a first processor and a second processor and operable to queue packets for transfer from the first processor to the second processor. The system includes a second packet queuing circuitry connected between the first processor and the second processor and operable to queue packets for transfer from the second processor to the first processor. The first processor is programmed to transfer secure packets to the second processor via the first queuing circuitry for security processing and the second processor is programmed to return the security-processed packets to the first processor via the second queuing circuitry.Type: GrantFiled: December 30, 2009Date of Patent: May 5, 2015Assignee: STMicroelectronics (Research & Development) LimitedInventors: Martin Bolton, Paul Pearson, Diarmuid Emslie
-
Patent number: 9021272Abstract: The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical address based keys that may also be transferred using dedicated buses. A cryptographic engine translates a logic address to at least one physical address, and processes a corresponding data word based on at least one target key. The target key is selected from a plurality of keys based on the logic or physical address. A universal memory controller stores each processed data word in the corresponding physical address within a memory. Each key is associated with a memory region within the memory, and therefore, the logic or physical address associated with a memory region may be used to automatically identify the corresponding target key. A dedicated secure link may be used to transport key request commands and the plurality of keys.Type: GrantFiled: August 28, 2012Date of Patent: April 28, 2015Assignee: Maxim Integrated Products, Inc.Inventors: Vincent Debout, Frank Lhermet, Yann Yves René Loisel, Grégory Rome, Christophe Tremlet
-
Publication number: 20150113268Abstract: A computational engine may include an input configured to receive a first data packet and a second data packet, a context memory configured to store one or more contexts, and a set of computational elements coupled with the input and coupled with the context memory. The set of computational elements may be configured to generate a first output data packet by executing a first sequence of cryptographic operations on the first data packet, and generate a second output data packet by executing a second sequence of cryptographic operations on the second data packet and on a selected context of the one of the one or more contexts. The selected context may be associated with the second packet of data, and the context may be stored in the context memory prior to the execution of the first sequence of cryptographic operations.Type: ApplicationFiled: October 18, 2013Publication date: April 23, 2015Applicant: Advanced Micro Devices, Inc.Inventor: Winthrop J. Wu
-
Patent number: 9015467Abstract: Methods and associated systems are disclosed for providing secured data transmission over a data network. Data to be encrypted and encryption information may be sent to a security processor via a packet network so that the security processor may extract the encryption information and use it to encrypt the data. The encryption information may include flow information, security association and/or other cryptographic information, and/or one or more addresses associated with such information. The encryption information may consist of a tag in a header that is appended to packets to be encrypted before the packets are sent to the security processor. The packet and tag header may be encapsulated into an Ethernet packet and routed via an Ethernet connection to the security processor.Type: GrantFiled: December 4, 2003Date of Patent: April 21, 2015Assignee: Broadcom CorporationInventors: Mark L. Buer, Scott S. McDaniel
-
Patent number: 9015478Abstract: Preventing web crawler access includes receiving a request for a webpage that includes web content that is to be protected from a web crawler, encrypting the web content to be protected to generate encrypted content and responding to the request, including sending the encrypted content and a decryption instruction. The decryption instruction is configured to allow a web browser to decrypt the encrypted content.Type: GrantFiled: February 27, 2014Date of Patent: April 21, 2015Assignee: Alibaba Group Holding LimitedInventor: Ling He
-
Patent number: 9015477Abstract: System and method embodiments are provided for asynchronous event notification and message handling in dynamic adaptive streaming over hypertext transfer protocol (DASH). The embodiments includes sending in a segment file, from a network server to a client, a message box that is configurable for encryption, for scheduling a callback from the client, and with one or more arguments according to a messaging scheme of the message box. The network server further sends a message handling descriptor to the client for reloading a media presentation description (MPD) for obtaining a DASH event. The client then configures a universal resource locator (URL) for the MPD using the message box and the message handling descriptor, and sends the URL back to the network server. After receiving the URL, the network server sends the MPD to the client, which then uses the MPD to request segments of an asynchronous event.Type: GrantFiled: April 5, 2013Date of Patent: April 21, 2015Assignee: FutureWei Technologies, Inc.Inventor: Alexander Giladi
-
Patent number: 9009813Abstract: The present disclosure presents methods, systems and intermediaries which determine an encoding scheme of a uniform resource location (URL) from a plurality of encoding schemes for a clientless secure socket layer virtual private network (SSL VPN) via a proxy. An intermediary may receive a response from a server comprising a URL. The response from the server may be directed to a client via a SSL VPN session and via the intermediary. The intermediary may determine, responsive to an encoding policy, one of a transparent, opaque or encrypted encoding scheme for encoding the URL. The intermediary may rewrite the URL for transmission to the client in accordance with the determined encoding scheme.Type: GrantFiled: February 4, 2014Date of Patent: April 14, 2015Assignee: Citrix Systems, Inc.Inventors: Puneet Agarwal, Ravindra Nath Thakur, Anil Kumar Gavini
-
Patent number: 9009474Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.Type: GrantFiled: April 28, 2014Date of Patent: April 14, 2015Assignee: Trend Micro IncorporatedInventor: Blake Stanton Sutherland
-
Patent number: 9009466Abstract: There are a terminal device capable of link layer encryption and decryption and a data process method thereof, and the terminal device includes a link layer processing module including a control module, a data frame encryption module, a data frame decryption module, a key management module, an algorithm module, a transmission port and a reception port; and the control module is connected with the transmission port through the data frame encryption module, the reception port is connected with the control module through the data frame decryption module, the control module is connected with the key management module, the data frame encryption module is connected with the data frame decryption module through the key management module, and the data frame encryption module is connected with the data frame decryption module through the algorithm module.Type: GrantFiled: June 17, 2011Date of Patent: April 14, 2015Assignee: China IWNCOMM Co., Ltd.Inventors: Qin Li, Jun Cao, Manxia Tie
-
Patent number: 9003182Abstract: A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identity of the pager and attaches a certificate to the message for ongoing transmission. Where the recipient is also a pager, an associated home terminal verifies the transmission and forwards it in a trusted manner without the certificate to the recipient.Type: GrantFiled: July 13, 2012Date of Patent: April 7, 2015Assignees: Certicom Corp., Motorola, Inc.Inventors: Walter Lee Davis, Douglas I. Ayerst, Scott Alexander Vanstone
-
Patent number: 9002016Abstract: In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed, instead of generating a single new security relationship, such as a Security Association or SA, a multiple set (e.g., 10) of new security relationships (e.g., SAs) are generated. An authorized device can then individually use these security relationships (e.g., SAs) as needed to securely communicate with each other. For example, a set of SAs can be efficiently programmed into an 802.1ae protocol ASIC for handling transmitted and received data packets. In the description herein, embodiments of the invention are described with respect to SA's, and this “SA” term is generally defined as any type of security relation that can be formed to allow a particular node to securely transmit packets or frames to another receiving node.Type: GrantFiled: March 30, 2014Date of Patent: April 7, 2015Assignee: Cisco Technology, Inc.Inventor: Chandan Mishra
-
Patent number: 8996858Abstract: Aspects of the present invention provide a mechanism to utilize IMS media security mechanisms in a CS network and, thereby, provide end-to-end media security in the case where the media traffic travels across both a CS network and a PS network.Type: GrantFiled: November 5, 2008Date of Patent: March 31, 2015Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Fredrik Lindholm, Rolf Blom
-
Patent number: 8989376Abstract: A method for authenticating video content includes: receiving a digital signature, an unsecured video fingerprint, and an unsecured video content from a transmitting node at a receiving node in a communication network; determining if the digital signature is consistent with the unsecured video fingerprint at the receiving node to verify the unsecured video fingerprint; and determining if the unsecured video fingerprint is consistent with the unsecured video content at the receiving node to verify the unsecured video content in a manner that tolerates a predetermined measure of loss in the unsecured video content. If the unsecured video fingerprint and the unsecured video content are verified, the unsecured video content is authenticated for subsequent use at the receiving node. A receiving node associated with the method includes an input module, a fingerprint verification module, a content verification module, and a controller module.Type: GrantFiled: March 29, 2012Date of Patent: March 24, 2015Assignee: Alcatel LucentInventors: Yansong Ren, Lawrence O'Gorman, John R. Zhang, Thomas L. Wood
-
Patent number: 8984284Abstract: Aspects include a mechanism of entitling users to transacted-for digital content access, indicating download authorization with discrete authentication URLs, and validating download attempts using each such URL. The authentication mechanism comprises producing an encrypted string included in a URL provided to a user. The encrypted string comprises transaction identifier information, and information about the transacted-for entitlement. When a user wishes to exercise the transacted-for entitlement, the user activates the URL, which is resolved to a location that has/can obtain access to the key(s) used in producing the encrypted string, decrypt the string, and use the information in it to validate the URL and the entitlement. The validation can use data retrieved from a database, using the transaction identifier as a key. The entitlement information included in the now-decrypted string can be compared with the prior download information.Type: GrantFiled: May 10, 2013Date of Patent: March 17, 2015Assignee: Apple Inc.Inventors: Gregor N. Purdy, Sr., Tony F. Kinnis
-
Patent number: 8983065Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.Type: GrantFiled: February 28, 2008Date of Patent: March 17, 2015Assignee: QUALCOMM IncorporatedInventors: Nikolai Konrad Leung, Philip Michael Hawkes, Gregory Gordon Rose
-
Patent number: 8977843Abstract: A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet to the destination network node through at least one router network node. The data packet contains a security signature portion, a routing data portion, and a payload data portion. The security signature portion comprises a listing of at least one network node that the data packet travelled through from the origination network node to the destination network node. In addition, the security signature portion comprises geolocation information, identifier information, and timing information for at least one network node in the listing.Type: GrantFiled: May 23, 2011Date of Patent: March 10, 2015Assignee: The Boeing CompanyInventors: Gregory M. Gutt, Arun Ayyagari, David A. Whelan, David G. Lawrence
-
Publication number: 20150058622Abstract: Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data stream is controlled based on the value of the bit equivalent entropy.Type: ApplicationFiled: August 20, 2013Publication date: February 26, 2015Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Malgorzata M STURGILL, Steven J SIMSKE
-
Patent number: 8964974Abstract: Techniques for injecting encryption keys into a meter as a part of a manufacturing process are discussed. Since various encryption keys injected into meters may be specific to each individual meter, a utility company customer may require a copy of the injected encryption keys associated with each individual meter. The techniques may include providing a copy of keys injected into each meter to a utility company customer. In some instances, the meter manufacturer may not store or persist various encryption keys that are injected into the meters during the manufacturing process.Type: GrantFiled: March 15, 2013Date of Patent: February 24, 2015Assignee: Itron, Inc.Inventor: Bret Gregory Holmdahl
-
Patent number: 8966240Abstract: Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of packets, data is received from a source device to be sent through a network to a destination device. Packet handling information is inserted in a packet that is to be used to transport the data. The packet handling information is configured to enable controlled handling of the packet in the network and is inserted in an unprotected portion of the packet. Encrypted payload data is generated from the data received from the source device. The encrypted payload data and security information are inserted in a protected portion of the packet and the packet is sent to the network.Type: GrantFiled: October 5, 2011Date of Patent: February 24, 2015Assignee: Cisco Technology, Inc.Inventor: Rakesh Chopra
-
Publication number: 20150046702Abstract: In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and decrypt data received from the peripheral interface. The encryption may be transparent to the device connected to the peripheral interface that is receiving/supplying the data. In an embodiment, the peripheral interface controller is included in a system on a chip (SOC) that also includes a memory controller configured to couple to a memory. The memory may be mounted on the SOC in a chip-on-chip or package-on-package configuration. The unencrypted data may be stored in the memory for use by other parts of the SOC (e.g. processors, on-chip peripherals, etc.). The keys used for the encryption/decryption of data may remain within the SOC.Type: ApplicationFiled: August 9, 2013Publication date: February 12, 2015Applicant: Apple Inc.Inventors: Timothy R. Paaske, David S. Warren, Michael J. Smith, Diarmuid P. Ross, Weihua Mao
-
Patent number: 8953801Abstract: A system and method is provided which allows multicast communications encrypted using IPSec protocol to be received by receivers in a network. In order to allow the receivers to receive the encrypted multicast communication, the address information of the received multicast communication is modified to appear as a unicast communication being transmitted directly to the address of the receiver, such that the receiver may then decrypt the received multicast communication using IPSec decryption capabilities or may, alternatively, forward the received multicast communication in its encrypted state to other devices. The system and method further provide IPSec encryption key delivery to the receiver using an encrypted markup language file. Multiple keys may also be generated for a given IP address of a receiver with each key being generated for a particular multicasting hierarchical classification.Type: GrantFiled: April 18, 2012Date of Patent: February 10, 2015Assignee: Hughes Networks Systems, LLCInventors: John K. Thomasson, Neil R. Terry, Matthew M. Davis, Myron L. Mosbarger
-
Patent number: 8954734Abstract: A DRM technique interoperability system includes an exporter and an importer. The exporter cancels the DRM technique from the contents to which the DRM technique of a DRM device is applied to generate a contents stream, generates a plurality of packets from the contents stream, and transmits the packets to the importer. The importer receives a plurality of packets from the exporter, generates a contents stream from the plurality of packets, applies a DRM technique of a second DRM device to the contents stream, and provides it to the second DRM device.Type: GrantFiled: December 20, 2007Date of Patent: February 10, 2015Assignee: Electronics and Telecommunications Research InstituteInventors: Do-Won Nam, Yeon-Jeong Jeong, Ki-Song Yoon, Jung-Hyun Kim, Jee-Hyun Park, Jung-Soo Lee
-
Publication number: 20150026459Abstract: A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one embodiment, one or more data packets are selected from an incoming multimedia stream. Further, one or more of a header portion and a payload portion are selected within the one or more data packets. Furthermore, one or more regions in the selected one or more of the header portion and the payload portion are encrypted using an encryption algorithm.Type: ApplicationFiled: July 19, 2014Publication date: January 22, 2015Inventors: PAVAN DIVAKAR, RAKSHITH SHANTHARAJU, SHASHANK HEGDE, BHAVANI GOPALAKRISHNA RAO, ABHINANDAN KEDLAYA, PUNEET GUPTA
-
Patent number: 8938619Abstract: Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each encrypted content sample includes multiple encrypted blocks. For a given encrypted content sample, different sets of encrypted blocks in that sample may form different encryption chains. The protected version of the content may further include decryption information for decrypting the encrypted content samples. The decryption information may include at least some initialization vectors generated dependent upon non-content information that is not included in the protected version of the content. The non-content information may be from a different protected version of the content. Embodiments may be configured to use the decryption information to decrypt one or more of the encrypted content samples.Type: GrantFiled: December 29, 2010Date of Patent: January 20, 2015Assignee: Adobe Systems IncorporatedInventor: Viswanathan Swaminathan
-
Patent number: 8931084Abstract: Methods and systems for cross-site scripting (XSS) defense are described herein. An embodiment includes, embedding one or more tags in content at a server to identify executable and non-executable regions in the content and transmitting the content with the tags to a client based on a request from the client. Another embodiment includes receiving content embedded with one or more permission tags from a server, processing the content and the permission tags, and granting permission to a browser to execute executable content in the content based on the permission tags. A method embodiment also includes receiving content embedded with one or more verify tags from a server, performing an integrity check using the verify tags and granting permission to a browser to execute executable content in the content based on the integrity check.Type: GrantFiled: September 11, 2009Date of Patent: January 6, 2015Assignee: Google Inc.Inventors: Cem Paya, Johann Tomas Sigurdsson, Sumit Gwalani
-
Patent number: 8930697Abstract: A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.Type: GrantFiled: February 7, 2013Date of Patent: January 6, 2015Assignee: Digital Reg of Texas, LLCInventors: Eugene B. Phillips, II, Seth Ornstein
-
Patent number: 8930688Abstract: An apparatus and method for providing a security service for UI applications in a network system. In a network supporting a user interface, encryption-unneeded data is distinguished from data in which security identifier is specified, that indicates a need for security between a server and a communication device, and the distinguished data is transmitted over a security channel and a general channel separately.Type: GrantFiled: July 16, 2009Date of Patent: January 6, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Seo-Young Hwang, Jae-Yeon Song, Kyung-Mo Park, Kook-Heui Lee
-
Patent number: 8931095Abstract: Communications can be processed with multiple countermeasures to identify attacks. Each countermeasure can compute a probability of a communication containing an attack and an accompanying confidence score indicating confidence in the probability. Combining the probabilities can produce a composite probability and associated confidence of the communication containing an attack. The composite probability and confidence scores can be produced from a weighted combination of the individual countermeasure probabilities and confidence scores. Weighting factors can be generated or obtained from a database that stores profiles of confirmed attacks.Type: GrantFiled: October 4, 2013Date of Patent: January 6, 2015Assignee: Dell Products, LPInventors: Jon R. Ramsey, Jyotish S. Varma, Ashley Thomas, Kevin J. Schmidt, Joseph Neal Stewart, Rudy Alexander Ristich, Joan Pepin
-
Patent number: 8924709Abstract: A method for encrypting print jobs that includes receiving output data, encrypting the output data with a randomly-generated symmetric session key, generating a session key header by encrypting the randomly-generated symmetric session key using an asymmetric user public key, and encrypting the session key header using a server public key.Type: GrantFiled: December 31, 2012Date of Patent: December 30, 2014Assignee: Lexmark International, Inc.Inventors: Forrest Steely, Albert Tyler Barnett
-
Patent number: 8924718Abstract: Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include identifying a Security Association (SA) between a User Equipment (UE) and a Proxy Call Session Control Function (P-CSCF) of an Internet Protocol (IP) Multimedia Subsystem (IMS) over a Gm interface during a registration procedure, correlating the SA with a ciphering key (CK) exchanged between the P-CSCF and a Serving CSCF (S-CSCF) of the IMS over an Mw interface during the registration procedure, and storing an indication of the correlated SA and CK in a deciphering record.Type: GrantFiled: October 29, 2012Date of Patent: December 30, 2014Assignee: Tektronix, Inc.Inventors: Vignesh Janakiraman, John P. Curtin
-
Publication number: 20140380043Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.Type: ApplicationFiled: June 16, 2014Publication date: December 25, 2014Applicant: LUMINAL, INC.Inventors: JOSHA STELLA, DOMINIC ZIPPILLI, MATTHEW BRINKMAN
-
Patent number: 8913747Abstract: A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.Type: GrantFiled: September 22, 2011Date of Patent: December 16, 2014Assignee: Oracle America, Inc.Inventor: Gabriel E. Montenegro
-
Patent number: 8914842Abstract: A user can access data from an ERP system, through a handheld mobile device, using claims-based authentication information. An authentication service authenticates the user, using an appropriate authenticator, given the claims-based authentication information. New users can register, and once registered, they can receive business data from ERP mobile data accessing system and push service.Type: GrantFiled: January 23, 2012Date of Patent: December 16, 2014Assignee: Microsoft CorporationInventors: Mugunthan Mani, Vetrivel Chandranath, Ramalingam Kothandam
-
Patent number: 8913748Abstract: An expanded sequence number is added to PDUs in a Bluetooth® low energy system. The expanded sequence number provides more accurate identification of the PDUs and allows the system to avoid delaying transmission of PDUs while retransmitting other PDUs. A PDU security sequence number may also be added to the PDUs. The security sequence number is used to create a unique nonce for use in encrypting or decrypting and authenticating the PDU. Using the security sequence number, a failed connection can be reestablished between two devices without the need of generating an encryption key. The security sequence number allows the devices to perform encryption or decryption and authentication using an existing key and a nonce generated from the security sequence number.Type: GrantFiled: July 3, 2012Date of Patent: December 16, 2014Assignee: Texas Instruments IncorporatedInventors: Jin-Meng Ho, Ariton E. Xhafa, Gangadhar Burra
-
Patent number: 8914631Abstract: A packet processing type determiner includes a non-secure packet processing module configured to process packets received over a single socket using a non-secure protocol. The packet processing type determiner also includes a data indicator checking module configured to check the packets for a first indicator denoting a beginning of a secure data record. The packet processing type determiner further includes a secure packet processing module configured to use a secure protocol to process the packets when a packet with the first indicator is detected until a packet with a second indicator denoting an end of the secure data record is detected.Type: GrantFiled: July 1, 2009Date of Patent: December 16, 2014Assignee: Oracle International CorporationInventor: Amitabh Shukla
-
Patent number: 8909921Abstract: A signature management apparatus and method of cutting-out streaming data. The signature management apparatus includes a signature-related information preparing device which prepares signature-related information for streaming data, a signature-related information storage device which partitions a sequence header of the streaming data into stream header information needed for reproduction of the streaming data and user header information which a user can freely use for storage, and stores the signature-related information within the user header information in a form that allows no start code to emerge.Type: GrantFiled: November 12, 2008Date of Patent: December 9, 2014Assignee: Fujitsu LimitedInventor: Takashi Yoshioka
-
Patent number: 8909922Abstract: Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.Type: GrantFiled: December 29, 2011Date of Patent: December 9, 2014Assignee: Sonic IP, Inc.Inventors: Michael George Kiefer, Eric William Grab, Jason Braness
-
Patent number: 8898451Abstract: A method for efficiently decrypting asymmetric SSL pre-master keys is divided into a key agent component that runs in user mode, and an SSL driver running in kernel mode. The key agent can take advantage of multiple threads for decoding keys in a multi-processor environment, while the SSL driver handles the task of symmetric decryption of the SSL encrypted data stream. The method is of advantage in applications such as firewalls with deep packet inspection in which all encrypted data traffic passing through the firewall must be decrypted for inspection.Type: GrantFiled: August 21, 2013Date of Patent: November 25, 2014Assignee: Trend Micro IncorporatedInventors: Dale Sabo, Gerrard Eric Rosenquist
-
Patent number: 8897441Abstract: When being triggered by a call setting request that has been made, dummy information that is different from information to be transmitted and is information used for creating a path on which encrypted communication is to be performed is generated. The path on which the encrypted communication is to be performed is established by using the generated dummy information. A responding process of responding to the call setting request is performed after the path on which the encrypted communication is to be performed has been established. Thus, in the case where information that is obtained after the responding process of responding to the call setting request is encrypted and transmitted, it is possible to transmit the information while maintaining the real-time characteristics of the information to be transmitted.Type: GrantFiled: May 17, 2010Date of Patent: November 25, 2014Assignee: Fujitsu LimitedInventors: Toshifumi Inoue, Isamu Fukuda, Kenji Fukuda, Kiyohisa Hoshino, Nobuyuki Fukuda, Yoshiaki Fukunaga, Satoru Hirasawa
-
Patent number: 8892872Abstract: Described are computer-based methods and apparatuses, including computer program products, for secure redacted document access. A viewing application for viewing documents is executed, the viewing application comprising standard code for the viewing application that can not process the container data type, and custom code configured to allow the viewing application to process a container data type. A container of the container data type is received from a remote computing device comprising a set of redacted documents corresponding to an original document, each redacted document having a level of redaction corresponding to a viewing location, and a header comprising encryption information for each redacted document in the set of redacted documents. The container is processed based on a location of the computing device and the custom code.Type: GrantFiled: August 7, 2012Date of Patent: November 18, 2014Assignee: Appsense LimitedInventor: Anthony T. Davis
-
Patent number: 8892894Abstract: A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed.Type: GrantFiled: June 7, 2013Date of Patent: November 18, 2014Assignee: Rovi Solutions CorporationInventors: Andres M Torrubia, Jordi Salvat
-
Publication number: 20140337620Abstract: Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information. Embodiments may also include receiving a hint track including packet header information for a stream of media packets from which the media content was sourced, and offset information identifying locations of encrypted media content within the encrypted content samples. Embodiments may include generating a second version of the encrypted content for streaming, which may include, based on the information of the hint track, identifying the location of media content within the encrypted content samples.Type: ApplicationFiled: July 25, 2014Publication date: November 13, 2014Inventors: Viswanathan Swaminathan, Sheng Wei
-
Patent number: 8885823Abstract: A method for delivering encrypted content to a subscriber terminal on-demand through a communication network is provided. The method begins when SRM receives a request for content from the subscriber terminal. In response to the request, the SRM directs a video server to transmit the content as an unencrypted transport stream to an encryptor. The packets in the unencrypted transport stream include a header with a destination address associated with the subscriber terminal. The encryptor encrypts the content in the unencrypted transport stream to generate an encrypted transport stream. The encryptor also inserts in the packet headers of the packets in the encrypted transport stream the destination address associated with the subscriber terminal obtained from the packet headers in the unencrypted transport stream. Finally, the encrypted transport stream is transmitted to the subscriber terminal over the communication network.Type: GrantFiled: September 24, 2007Date of Patent: November 11, 2014Assignee: General Instrument CorporationInventors: Christopher Poli, Joseph M. Amorese, Robert Mack, Lawrence D. Vince, Charles A. Zimmerman
-
Patent number: 8885830Abstract: A system for establishing an encrypted multicast communication session over a communications network can include a client means (e.g., a radio, laptop, workstation, phone, PDA) and a server means. The client means can transmit a request for a first user to join a pre-defined collaborative group, including at least the first user and a second user. The client means can transmit a request for a first user to create or select a collaborative group based on specified criteria. The system can also include a server means that can retrieve, select or generate an encryption key for the collaborative group and transmit the encryption key to the first user via the client means. The server can transmit the encryption key to the second user via a second client means. The client means can communicate via multicast, encrypting end-to-end above the network layer using the encryption key received from the server means.Type: GrantFiled: May 4, 2009Date of Patent: November 11, 2014Assignee: Mitre CorporationInventors: Thomas Tahan, Steven Leonard Cox, Weilin Wang, Martin Woscek
-
Publication number: 20140331042Abstract: A method and apparatus where network-layer devices use host-provided, detailed, per-packet, semantic information (DPPS information), which describes the content, meaning, importance, and/or other attributes of particular application data and is associated with each packet, to provide enhanced network services. In some embodiments of the above method, network-layer devices use DPPS information that includes QoS-related information to provide fine-grained, content-aware, and/or complex QoS assurances or similar services. In some embodiments, network-layer devices use DPPS information to provide network-based, application-protocol-independent, rate-adaptation services. In some embodiments, network-layer devices use DPPS information to provide highly efficient, application-protocol-independent, publish/subscribe dissemination services.Type: ApplicationFiled: June 3, 2014Publication date: November 6, 2014Inventor: Timothy J. Salo
-
Patent number: 8880906Abstract: A digital archive for storing encrypted content includes a header section and a body. The header section includes real headers, wherein at least a portion of each real headers is encrypted, and fake headers, wherein each of the fake headers is filled with cryptographically random bytes, wherein the fake headers are substantially more than the real headers. The body includes real contents, wherein at least a portion of each real content is encrypted, and fake contents in the rest of the body, wherein the fake content contains additional cryptographically random bytes, wherein the amount of the fake content is substantially greater than the amount of the real contents, wherein each of the real headers refers to a corresponding real content in the body and contains decryption information for the corresponding real content.Type: GrantFiled: March 14, 2013Date of Patent: November 4, 2014Assignee: Appsense LimitedInventor: James Tupper
-
Patent number: 8880897Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array.Type: GrantFiled: December 21, 2012Date of Patent: November 4, 2014Assignee: Apple Inc.Inventors: Peter Kiehtreiber, Michael Brouwer