Packet Header Designating Cryptographically Protected Data Patents (Class 713/160)
  • Patent number: 9037852
    Abstract: A computer system storing parameters pertaining to the regulatory restrictions placed on a for-hire vehicle compares the parameters to a current operating environment of the for-hire vehicle. In some embodiments, the computer system acts as the meter (such as a taximeter) of the for-hire vehicle. The operating parameters may include expiration or exclusion parameters that define the scope of operation of the for-hire vehicle stemming from the for-hire vehicle's medallion or certificate of public convenience and necessity. The expiration or exclusion parameters may also correspond to a driver's permit or any general regulation enacted by the regulatory agency. If the current operating environment does not comply with the expiration or exclusion parameters, the computer system shuts down, or enters a standby mode, and may not accept additional passenger fares until the current operating environment complies with the expiration and exclusion parameters.
    Type: Grant
    Filed: September 2, 2011
    Date of Patent: May 19, 2015
    Assignee: IVSC IP LLC
    Inventors: Michael Collins Pinkus, Mark A. James, James Alan Wisniewski
  • Patent number: 9038145
    Abstract: A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in communication with a walled garden proxy server (WGPS). The client sends a request to the WGPS to access a service provided by a site in the garden. The site sends the client a message containing code calling a function in the API. The WGPS traps the message from the site and looks up the site in a table to determine the access control list (ACL) for the site. The WGPS includes the ACL in the header of the hypertext transport protocol (HTTP) message to the client. The shell receives the message and extracts the ACL. If the code lacks permission, the shell stops execution.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: May 19, 2015
    Assignee: At Home BondHolders' Liquidating Trust
    Inventors: Ralph William Brown, Milo S. Medin, Robert Keller, David Temkin
  • Patent number: 9027110
    Abstract: The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: May 5, 2015
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 9026790
    Abstract: A system for processing packet streams includes a first packet queuing circuitry connected between a first processor and a second processor and operable to queue packets for transfer from the first processor to the second processor. The system includes a second packet queuing circuitry connected between the first processor and the second processor and operable to queue packets for transfer from the second processor to the first processor. The first processor is programmed to transfer secure packets to the second processor via the first queuing circuitry for security processing and the second processor is programmed to return the security-processed packets to the first processor via the second queuing circuitry.
    Type: Grant
    Filed: December 30, 2009
    Date of Patent: May 5, 2015
    Assignee: STMicroelectronics (Research & Development) Limited
    Inventors: Martin Bolton, Paul Pearson, Diarmuid Emslie
  • Patent number: 9021272
    Abstract: The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical address based keys that may also be transferred using dedicated buses. A cryptographic engine translates a logic address to at least one physical address, and processes a corresponding data word based on at least one target key. The target key is selected from a plurality of keys based on the logic or physical address. A universal memory controller stores each processed data word in the corresponding physical address within a memory. Each key is associated with a memory region within the memory, and therefore, the logic or physical address associated with a memory region may be used to automatically identify the corresponding target key. A dedicated secure link may be used to transport key request commands and the plurality of keys.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: April 28, 2015
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Vincent Debout, Frank Lhermet, Yann Yves René Loisel, Grégory Rome, Christophe Tremlet
  • Publication number: 20150113268
    Abstract: A computational engine may include an input configured to receive a first data packet and a second data packet, a context memory configured to store one or more contexts, and a set of computational elements coupled with the input and coupled with the context memory. The set of computational elements may be configured to generate a first output data packet by executing a first sequence of cryptographic operations on the first data packet, and generate a second output data packet by executing a second sequence of cryptographic operations on the second data packet and on a selected context of the one of the one or more contexts. The selected context may be associated with the second packet of data, and the context may be stored in the context memory prior to the execution of the first sequence of cryptographic operations.
    Type: Application
    Filed: October 18, 2013
    Publication date: April 23, 2015
    Applicant: Advanced Micro Devices, Inc.
    Inventor: Winthrop J. Wu
  • Patent number: 9015467
    Abstract: Methods and associated systems are disclosed for providing secured data transmission over a data network. Data to be encrypted and encryption information may be sent to a security processor via a packet network so that the security processor may extract the encryption information and use it to encrypt the data. The encryption information may include flow information, security association and/or other cryptographic information, and/or one or more addresses associated with such information. The encryption information may consist of a tag in a header that is appended to packets to be encrypted before the packets are sent to the security processor. The packet and tag header may be encapsulated into an Ethernet packet and routed via an Ethernet connection to the security processor.
    Type: Grant
    Filed: December 4, 2003
    Date of Patent: April 21, 2015
    Assignee: Broadcom Corporation
    Inventors: Mark L. Buer, Scott S. McDaniel
  • Patent number: 9015478
    Abstract: Preventing web crawler access includes receiving a request for a webpage that includes web content that is to be protected from a web crawler, encrypting the web content to be protected to generate encrypted content and responding to the request, including sending the encrypted content and a decryption instruction. The decryption instruction is configured to allow a web browser to decrypt the encrypted content.
    Type: Grant
    Filed: February 27, 2014
    Date of Patent: April 21, 2015
    Assignee: Alibaba Group Holding Limited
    Inventor: Ling He
  • Patent number: 9015477
    Abstract: System and method embodiments are provided for asynchronous event notification and message handling in dynamic adaptive streaming over hypertext transfer protocol (DASH). The embodiments includes sending in a segment file, from a network server to a client, a message box that is configurable for encryption, for scheduling a callback from the client, and with one or more arguments according to a messaging scheme of the message box. The network server further sends a message handling descriptor to the client for reloading a media presentation description (MPD) for obtaining a DASH event. The client then configures a universal resource locator (URL) for the MPD using the message box and the message handling descriptor, and sends the URL back to the network server. After receiving the URL, the network server sends the MPD to the client, which then uses the MPD to request segments of an asynchronous event.
    Type: Grant
    Filed: April 5, 2013
    Date of Patent: April 21, 2015
    Assignee: FutureWei Technologies, Inc.
    Inventor: Alexander Giladi
  • Patent number: 9009813
    Abstract: The present disclosure presents methods, systems and intermediaries which determine an encoding scheme of a uniform resource location (URL) from a plurality of encoding schemes for a clientless secure socket layer virtual private network (SSL VPN) via a proxy. An intermediary may receive a response from a server comprising a URL. The response from the server may be directed to a client via a SSL VPN session and via the intermediary. The intermediary may determine, responsive to an encoding policy, one of a transparent, opaque or encrypted encoding scheme for encoding the URL. The intermediary may rewrite the URL for transmission to the client in accordance with the determined encoding scheme.
    Type: Grant
    Filed: February 4, 2014
    Date of Patent: April 14, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Puneet Agarwal, Ravindra Nath Thakur, Anil Kumar Gavini
  • Patent number: 9009474
    Abstract: A method and apparatus for detecting data modification in a layered operating system is disclosed. Outbound content indicators at different layers are compared to detect potential outbound data modifications. Likewise, inbound content indicators at different layers are compared to detect potential inbound data modifications. Content indicators include checksum, cryptographic hash, signature, and fingerprint indicators. Embodiments of the present invention enable detection of data modifications across an operating system's kernel and user mode spaces, prevention of modified outbound data from reaching a network, prevention of modified input data from reaching a user application, and detection of malware and faults within an operating system.
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: April 14, 2015
    Assignee: Trend Micro Incorporated
    Inventor: Blake Stanton Sutherland
  • Patent number: 9009466
    Abstract: There are a terminal device capable of link layer encryption and decryption and a data process method thereof, and the terminal device includes a link layer processing module including a control module, a data frame encryption module, a data frame decryption module, a key management module, an algorithm module, a transmission port and a reception port; and the control module is connected with the transmission port through the data frame encryption module, the reception port is connected with the control module through the data frame decryption module, the control module is connected with the key management module, the data frame encryption module is connected with the data frame decryption module through the key management module, and the data frame encryption module is connected with the data frame decryption module through the algorithm module.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: April 14, 2015
    Assignee: China IWNCOMM Co., Ltd.
    Inventors: Qin Li, Jun Cao, Manxia Tie
  • Patent number: 9003182
    Abstract: A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identity of the pager and attaches a certificate to the message for ongoing transmission. Where the recipient is also a pager, an associated home terminal verifies the transmission and forwards it in a trusted manner without the certificate to the recipient.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: April 7, 2015
    Assignees: Certicom Corp., Motorola, Inc.
    Inventors: Walter Lee Davis, Douglas I. Ayerst, Scott Alexander Vanstone
  • Patent number: 9002016
    Abstract: In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed, instead of generating a single new security relationship, such as a Security Association or SA, a multiple set (e.g., 10) of new security relationships (e.g., SAs) are generated. An authorized device can then individually use these security relationships (e.g., SAs) as needed to securely communicate with each other. For example, a set of SAs can be efficiently programmed into an 802.1ae protocol ASIC for handling transmitted and received data packets. In the description herein, embodiments of the invention are described with respect to SA's, and this “SA” term is generally defined as any type of security relation that can be formed to allow a particular node to securely transmit packets or frames to another receiving node.
    Type: Grant
    Filed: March 30, 2014
    Date of Patent: April 7, 2015
    Assignee: Cisco Technology, Inc.
    Inventor: Chandan Mishra
  • Patent number: 8996858
    Abstract: Aspects of the present invention provide a mechanism to utilize IMS media security mechanisms in a CS network and, thereby, provide end-to-end media security in the case where the media traffic travels across both a CS network and a PS network.
    Type: Grant
    Filed: November 5, 2008
    Date of Patent: March 31, 2015
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Fredrik Lindholm, Rolf Blom
  • Patent number: 8989376
    Abstract: A method for authenticating video content includes: receiving a digital signature, an unsecured video fingerprint, and an unsecured video content from a transmitting node at a receiving node in a communication network; determining if the digital signature is consistent with the unsecured video fingerprint at the receiving node to verify the unsecured video fingerprint; and determining if the unsecured video fingerprint is consistent with the unsecured video content at the receiving node to verify the unsecured video content in a manner that tolerates a predetermined measure of loss in the unsecured video content. If the unsecured video fingerprint and the unsecured video content are verified, the unsecured video content is authenticated for subsequent use at the receiving node. A receiving node associated with the method includes an input module, a fingerprint verification module, a content verification module, and a controller module.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: March 24, 2015
    Assignee: Alcatel Lucent
    Inventors: Yansong Ren, Lawrence O'Gorman, John R. Zhang, Thomas L. Wood
  • Patent number: 8984284
    Abstract: Aspects include a mechanism of entitling users to transacted-for digital content access, indicating download authorization with discrete authentication URLs, and validating download attempts using each such URL. The authentication mechanism comprises producing an encrypted string included in a URL provided to a user. The encrypted string comprises transaction identifier information, and information about the transacted-for entitlement. When a user wishes to exercise the transacted-for entitlement, the user activates the URL, which is resolved to a location that has/can obtain access to the key(s) used in producing the encrypted string, decrypt the string, and use the information in it to validate the URL and the entitlement. The validation can use data retrieved from a database, using the transaction identifier as a key. The entitlement information included in the now-decrypted string can be compared with the prior download information.
    Type: Grant
    Filed: May 10, 2013
    Date of Patent: March 17, 2015
    Assignee: Apple Inc.
    Inventors: Gregor N. Purdy, Sr., Tony F. Kinnis
  • Patent number: 8983065
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Grant
    Filed: February 28, 2008
    Date of Patent: March 17, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Nikolai Konrad Leung, Philip Michael Hawkes, Gregory Gordon Rose
  • Patent number: 8977843
    Abstract: A system and method for verifying and/or geolocating network nodes in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet to the destination network node through at least one router network node. The data packet contains a security signature portion, a routing data portion, and a payload data portion. The security signature portion comprises a listing of at least one network node that the data packet travelled through from the origination network node to the destination network node. In addition, the security signature portion comprises geolocation information, identifier information, and timing information for at least one network node in the listing.
    Type: Grant
    Filed: May 23, 2011
    Date of Patent: March 10, 2015
    Assignee: The Boeing Company
    Inventors: Gregory M. Gutt, Arun Ayyagari, David A. Whelan, David G. Lawrence
  • Publication number: 20150058622
    Abstract: Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data stream is controlled based on the value of the bit equivalent entropy.
    Type: Application
    Filed: August 20, 2013
    Publication date: February 26, 2015
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Malgorzata M STURGILL, Steven J SIMSKE
  • Patent number: 8964974
    Abstract: Techniques for injecting encryption keys into a meter as a part of a manufacturing process are discussed. Since various encryption keys injected into meters may be specific to each individual meter, a utility company customer may require a copy of the injected encryption keys associated with each individual meter. The techniques may include providing a copy of keys injected into each meter to a utility company customer. In some instances, the meter manufacturer may not store or persist various encryption keys that are injected into the meters during the manufacturing process.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: February 24, 2015
    Assignee: Itron, Inc.
    Inventor: Bret Gregory Holmdahl
  • Patent number: 8966240
    Abstract: Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of packets, data is received from a source device to be sent through a network to a destination device. Packet handling information is inserted in a packet that is to be used to transport the data. The packet handling information is configured to enable controlled handling of the packet in the network and is inserted in an unprotected portion of the packet. Encrypted payload data is generated from the data received from the source device. The encrypted payload data and security information are inserted in a protected portion of the packet and the packet is sent to the network.
    Type: Grant
    Filed: October 5, 2011
    Date of Patent: February 24, 2015
    Assignee: Cisco Technology, Inc.
    Inventor: Rakesh Chopra
  • Publication number: 20150046702
    Abstract: In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and decrypt data received from the peripheral interface. The encryption may be transparent to the device connected to the peripheral interface that is receiving/supplying the data. In an embodiment, the peripheral interface controller is included in a system on a chip (SOC) that also includes a memory controller configured to couple to a memory. The memory may be mounted on the SOC in a chip-on-chip or package-on-package configuration. The unencrypted data may be stored in the memory for use by other parts of the SOC (e.g. processors, on-chip peripherals, etc.). The keys used for the encryption/decryption of data may remain within the SOC.
    Type: Application
    Filed: August 9, 2013
    Publication date: February 12, 2015
    Applicant: Apple Inc.
    Inventors: Timothy R. Paaske, David S. Warren, Michael J. Smith, Diarmuid P. Ross, Weihua Mao
  • Patent number: 8953801
    Abstract: A system and method is provided which allows multicast communications encrypted using IPSec protocol to be received by receivers in a network. In order to allow the receivers to receive the encrypted multicast communication, the address information of the received multicast communication is modified to appear as a unicast communication being transmitted directly to the address of the receiver, such that the receiver may then decrypt the received multicast communication using IPSec decryption capabilities or may, alternatively, forward the received multicast communication in its encrypted state to other devices. The system and method further provide IPSec encryption key delivery to the receiver using an encrypted markup language file. Multiple keys may also be generated for a given IP address of a receiver with each key being generated for a particular multicasting hierarchical classification.
    Type: Grant
    Filed: April 18, 2012
    Date of Patent: February 10, 2015
    Assignee: Hughes Networks Systems, LLC
    Inventors: John K. Thomasson, Neil R. Terry, Matthew M. Davis, Myron L. Mosbarger
  • Patent number: 8954734
    Abstract: A DRM technique interoperability system includes an exporter and an importer. The exporter cancels the DRM technique from the contents to which the DRM technique of a DRM device is applied to generate a contents stream, generates a plurality of packets from the contents stream, and transmits the packets to the importer. The importer receives a plurality of packets from the exporter, generates a contents stream from the plurality of packets, applies a DRM technique of a second DRM device to the contents stream, and provides it to the second DRM device.
    Type: Grant
    Filed: December 20, 2007
    Date of Patent: February 10, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Do-Won Nam, Yeon-Jeong Jeong, Ki-Song Yoon, Jung-Hyun Kim, Jee-Hyun Park, Jung-Soo Lee
  • Publication number: 20150026459
    Abstract: A method and system for encrypting data packets in a multimedia stream are disclosed. Each data packet includes a header portion and a payload portion. In one embodiment, one or more data packets are selected from an incoming multimedia stream. Further, one or more of a header portion and a payload portion are selected within the one or more data packets. Furthermore, one or more regions in the selected one or more of the header portion and the payload portion are encrypted using an encryption algorithm.
    Type: Application
    Filed: July 19, 2014
    Publication date: January 22, 2015
    Inventors: PAVAN DIVAKAR, RAKSHITH SHANTHARAJU, SHASHANK HEGDE, BHAVANI GOPALAKRISHNA RAO, ABHINANDAN KEDLAYA, PUNEET GUPTA
  • Patent number: 8938619
    Abstract: Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each encrypted content sample includes multiple encrypted blocks. For a given encrypted content sample, different sets of encrypted blocks in that sample may form different encryption chains. The protected version of the content may further include decryption information for decrypting the encrypted content samples. The decryption information may include at least some initialization vectors generated dependent upon non-content information that is not included in the protected version of the content. The non-content information may be from a different protected version of the content. Embodiments may be configured to use the decryption information to decrypt one or more of the encrypted content samples.
    Type: Grant
    Filed: December 29, 2010
    Date of Patent: January 20, 2015
    Assignee: Adobe Systems Incorporated
    Inventor: Viswanathan Swaminathan
  • Patent number: 8931084
    Abstract: Methods and systems for cross-site scripting (XSS) defense are described herein. An embodiment includes, embedding one or more tags in content at a server to identify executable and non-executable regions in the content and transmitting the content with the tags to a client based on a request from the client. Another embodiment includes receiving content embedded with one or more permission tags from a server, processing the content and the permission tags, and granting permission to a browser to execute executable content in the content based on the permission tags. A method embodiment also includes receiving content embedded with one or more verify tags from a server, performing an integrity check using the verify tags and granting permission to a browser to execute executable content in the content based on the integrity check.
    Type: Grant
    Filed: September 11, 2009
    Date of Patent: January 6, 2015
    Assignee: Google Inc.
    Inventors: Cem Paya, Johann Tomas Sigurdsson, Sumit Gwalani
  • Patent number: 8930697
    Abstract: A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user's device may not open or permit access to the contents if the digital container is transferred to another user's device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
    Type: Grant
    Filed: February 7, 2013
    Date of Patent: January 6, 2015
    Assignee: Digital Reg of Texas, LLC
    Inventors: Eugene B. Phillips, II, Seth Ornstein
  • Patent number: 8930688
    Abstract: An apparatus and method for providing a security service for UI applications in a network system. In a network supporting a user interface, encryption-unneeded data is distinguished from data in which security identifier is specified, that indicates a need for security between a server and a communication device, and the distinguished data is transmitted over a security channel and a general channel separately.
    Type: Grant
    Filed: July 16, 2009
    Date of Patent: January 6, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Seo-Young Hwang, Jae-Yeon Song, Kyung-Mo Park, Kook-Heui Lee
  • Patent number: 8931095
    Abstract: Communications can be processed with multiple countermeasures to identify attacks. Each countermeasure can compute a probability of a communication containing an attack and an accompanying confidence score indicating confidence in the probability. Combining the probabilities can produce a composite probability and associated confidence of the communication containing an attack. The composite probability and confidence scores can be produced from a weighted combination of the individual countermeasure probabilities and confidence scores. Weighting factors can be generated or obtained from a database that stores profiles of confirmed attacks.
    Type: Grant
    Filed: October 4, 2013
    Date of Patent: January 6, 2015
    Assignee: Dell Products, LP
    Inventors: Jon R. Ramsey, Jyotish S. Varma, Ashley Thomas, Kevin J. Schmidt, Joseph Neal Stewart, Rudy Alexander Ristich, Joan Pepin
  • Patent number: 8924709
    Abstract: A method for encrypting print jobs that includes receiving output data, encrypting the output data with a randomly-generated symmetric session key, generating a session key header by encrypting the randomly-generated symmetric session key using an asymmetric user public key, and encrypting the session key header using a server public key.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: December 30, 2014
    Assignee: Lexmark International, Inc.
    Inventors: Forrest Steely, Albert Tyler Barnett
  • Patent number: 8924718
    Abstract: Systems and methods for deciphering Internet Protocol (IP) security in an IP Multimedia Subsystem (IMS) using a monitoring system are described. In some embodiments, a method may include identifying a Security Association (SA) between a User Equipment (UE) and a Proxy Call Session Control Function (P-CSCF) of an Internet Protocol (IP) Multimedia Subsystem (IMS) over a Gm interface during a registration procedure, correlating the SA with a ciphering key (CK) exchanged between the P-CSCF and a Serving CSCF (S-CSCF) of the IMS over an Mw interface during the registration procedure, and storing an indication of the correlated SA and CK in a deciphering record.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: December 30, 2014
    Assignee: Tektronix, Inc.
    Inventors: Vignesh Janakiraman, John P. Curtin
  • Publication number: 20140380043
    Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
    Type: Application
    Filed: June 16, 2014
    Publication date: December 25, 2014
    Applicant: LUMINAL, INC.
    Inventors: JOSHA STELLA, DOMINIC ZIPPILLI, MATTHEW BRINKMAN
  • Patent number: 8913747
    Abstract: A method for secure configuration of a sensor system involves identifying a new sensor not activated within the sensor system, the new sensor including a new sensor identifier, establishing a first transmission link between the new sensor and a sensor controller, transmitting the new sensor identifier between the sensor and the sensor controller, generating a key pair for the sensor controller, the key pair including a controller public key and a controller private key, generating a key pair for the new sensor, the key pair including a sensor public key and a sensor private key, transmitting the controller public key to the new sensor and the sensor public key to the sensor controller, and generating a pairwise key within the sensor controller and the new sensor.
    Type: Grant
    Filed: September 22, 2011
    Date of Patent: December 16, 2014
    Assignee: Oracle America, Inc.
    Inventor: Gabriel E. Montenegro
  • Patent number: 8914842
    Abstract: A user can access data from an ERP system, through a handheld mobile device, using claims-based authentication information. An authentication service authenticates the user, using an appropriate authenticator, given the claims-based authentication information. New users can register, and once registered, they can receive business data from ERP mobile data accessing system and push service.
    Type: Grant
    Filed: January 23, 2012
    Date of Patent: December 16, 2014
    Assignee: Microsoft Corporation
    Inventors: Mugunthan Mani, Vetrivel Chandranath, Ramalingam Kothandam
  • Patent number: 8913748
    Abstract: An expanded sequence number is added to PDUs in a Bluetooth® low energy system. The expanded sequence number provides more accurate identification of the PDUs and allows the system to avoid delaying transmission of PDUs while retransmitting other PDUs. A PDU security sequence number may also be added to the PDUs. The security sequence number is used to create a unique nonce for use in encrypting or decrypting and authenticating the PDU. Using the security sequence number, a failed connection can be reestablished between two devices without the need of generating an encryption key. The security sequence number allows the devices to perform encryption or decryption and authentication using an existing key and a nonce generated from the security sequence number.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: December 16, 2014
    Assignee: Texas Instruments Incorporated
    Inventors: Jin-Meng Ho, Ariton E. Xhafa, Gangadhar Burra
  • Patent number: 8914631
    Abstract: A packet processing type determiner includes a non-secure packet processing module configured to process packets received over a single socket using a non-secure protocol. The packet processing type determiner also includes a data indicator checking module configured to check the packets for a first indicator denoting a beginning of a secure data record. The packet processing type determiner further includes a secure packet processing module configured to use a secure protocol to process the packets when a packet with the first indicator is detected until a packet with a second indicator denoting an end of the secure data record is detected.
    Type: Grant
    Filed: July 1, 2009
    Date of Patent: December 16, 2014
    Assignee: Oracle International Corporation
    Inventor: Amitabh Shukla
  • Patent number: 8909921
    Abstract: A signature management apparatus and method of cutting-out streaming data. The signature management apparatus includes a signature-related information preparing device which prepares signature-related information for streaming data, a signature-related information storage device which partitions a sequence header of the streaming data into stream header information needed for reproduction of the streaming data and user header information which a user can freely use for storage, and stores the signature-related information within the user header information in a form that allows no start code to emerge.
    Type: Grant
    Filed: November 12, 2008
    Date of Patent: December 9, 2014
    Assignee: Fujitsu Limited
    Inventor: Takashi Yoshioka
  • Patent number: 8909922
    Abstract: Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: December 9, 2014
    Assignee: Sonic IP, Inc.
    Inventors: Michael George Kiefer, Eric William Grab, Jason Braness
  • Patent number: 8898451
    Abstract: A method for efficiently decrypting asymmetric SSL pre-master keys is divided into a key agent component that runs in user mode, and an SSL driver running in kernel mode. The key agent can take advantage of multiple threads for decoding keys in a multi-processor environment, while the SSL driver handles the task of symmetric decryption of the SSL encrypted data stream. The method is of advantage in applications such as firewalls with deep packet inspection in which all encrypted data traffic passing through the firewall must be decrypted for inspection.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: November 25, 2014
    Assignee: Trend Micro Incorporated
    Inventors: Dale Sabo, Gerrard Eric Rosenquist
  • Patent number: 8897441
    Abstract: When being triggered by a call setting request that has been made, dummy information that is different from information to be transmitted and is information used for creating a path on which encrypted communication is to be performed is generated. The path on which the encrypted communication is to be performed is established by using the generated dummy information. A responding process of responding to the call setting request is performed after the path on which the encrypted communication is to be performed has been established. Thus, in the case where information that is obtained after the responding process of responding to the call setting request is encrypted and transmitted, it is possible to transmit the information while maintaining the real-time characteristics of the information to be transmitted.
    Type: Grant
    Filed: May 17, 2010
    Date of Patent: November 25, 2014
    Assignee: Fujitsu Limited
    Inventors: Toshifumi Inoue, Isamu Fukuda, Kenji Fukuda, Kiyohisa Hoshino, Nobuyuki Fukuda, Yoshiaki Fukunaga, Satoru Hirasawa
  • Patent number: 8892872
    Abstract: Described are computer-based methods and apparatuses, including computer program products, for secure redacted document access. A viewing application for viewing documents is executed, the viewing application comprising standard code for the viewing application that can not process the container data type, and custom code configured to allow the viewing application to process a container data type. A container of the container data type is received from a remote computing device comprising a set of redacted documents corresponding to an original document, each redacted document having a level of redaction corresponding to a viewing location, and a header comprising encryption information for each redacted document in the set of redacted documents. The container is processed based on a location of the computing device and the custom code.
    Type: Grant
    Filed: August 7, 2012
    Date of Patent: November 18, 2014
    Assignee: Appsense Limited
    Inventor: Anthony T. Davis
  • Patent number: 8892894
    Abstract: A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed.
    Type: Grant
    Filed: June 7, 2013
    Date of Patent: November 18, 2014
    Assignee: Rovi Solutions Corporation
    Inventors: Andres M Torrubia, Jordi Salvat
  • Publication number: 20140337620
    Abstract: Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information. Embodiments may also include receiving a hint track including packet header information for a stream of media packets from which the media content was sourced, and offset information identifying locations of encrypted media content within the encrypted content samples. Embodiments may include generating a second version of the encrypted content for streaming, which may include, based on the information of the hint track, identifying the location of media content within the encrypted content samples.
    Type: Application
    Filed: July 25, 2014
    Publication date: November 13, 2014
    Inventors: Viswanathan Swaminathan, Sheng Wei
  • Patent number: 8885823
    Abstract: A method for delivering encrypted content to a subscriber terminal on-demand through a communication network is provided. The method begins when SRM receives a request for content from the subscriber terminal. In response to the request, the SRM directs a video server to transmit the content as an unencrypted transport stream to an encryptor. The packets in the unencrypted transport stream include a header with a destination address associated with the subscriber terminal. The encryptor encrypts the content in the unencrypted transport stream to generate an encrypted transport stream. The encryptor also inserts in the packet headers of the packets in the encrypted transport stream the destination address associated with the subscriber terminal obtained from the packet headers in the unencrypted transport stream. Finally, the encrypted transport stream is transmitted to the subscriber terminal over the communication network.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: November 11, 2014
    Assignee: General Instrument Corporation
    Inventors: Christopher Poli, Joseph M. Amorese, Robert Mack, Lawrence D. Vince, Charles A. Zimmerman
  • Patent number: 8885830
    Abstract: A system for establishing an encrypted multicast communication session over a communications network can include a client means (e.g., a radio, laptop, workstation, phone, PDA) and a server means. The client means can transmit a request for a first user to join a pre-defined collaborative group, including at least the first user and a second user. The client means can transmit a request for a first user to create or select a collaborative group based on specified criteria. The system can also include a server means that can retrieve, select or generate an encryption key for the collaborative group and transmit the encryption key to the first user via the client means. The server can transmit the encryption key to the second user via a second client means. The client means can communicate via multicast, encrypting end-to-end above the network layer using the encryption key received from the server means.
    Type: Grant
    Filed: May 4, 2009
    Date of Patent: November 11, 2014
    Assignee: Mitre Corporation
    Inventors: Thomas Tahan, Steven Leonard Cox, Weilin Wang, Martin Woscek
  • Publication number: 20140331042
    Abstract: A method and apparatus where network-layer devices use host-provided, detailed, per-packet, semantic information (DPPS information), which describes the content, meaning, importance, and/or other attributes of particular application data and is associated with each packet, to provide enhanced network services. In some embodiments of the above method, network-layer devices use DPPS information that includes QoS-related information to provide fine-grained, content-aware, and/or complex QoS assurances or similar services. In some embodiments, network-layer devices use DPPS information to provide network-based, application-protocol-independent, rate-adaptation services. In some embodiments, network-layer devices use DPPS information to provide highly efficient, application-protocol-independent, publish/subscribe dissemination services.
    Type: Application
    Filed: June 3, 2014
    Publication date: November 6, 2014
    Inventor: Timothy J. Salo
  • Patent number: 8880906
    Abstract: A digital archive for storing encrypted content includes a header section and a body. The header section includes real headers, wherein at least a portion of each real headers is encrypted, and fake headers, wherein each of the fake headers is filled with cryptographically random bytes, wherein the fake headers are substantially more than the real headers. The body includes real contents, wherein at least a portion of each real content is encrypted, and fake contents in the rest of the body, wherein the fake content contains additional cryptographically random bytes, wherein the amount of the fake content is substantially greater than the amount of the real contents, wherein each of the real headers refers to a corresponding real content in the body and contains decryption information for the corresponding real content.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: November 4, 2014
    Assignee: Appsense Limited
    Inventor: James Tupper
  • Patent number: 8880897
    Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: November 4, 2014
    Assignee: Apple Inc.
    Inventors: Peter Kiehtreiber, Michael Brouwer