Packet Header Designating Cryptographically Protected Data Patents (Class 713/160)
-
Publication number: 20140317402Abstract: Disclosed is a packet processing method in a below binary stack (BBS) structure. A transmission packet processing method includes receiving a packet from a network layer, reassembling a packet for which a first fragmentation has been performed when the received packet is the packet for which the first fragmentation has been performed, encrypting the reassembled packet, performing a second fragmentation for the encrypted packet when the second fragmentation is necessary for the encrypted packet, adding a header to the packet for which the second fragmentation has been performed, and transmitting the packet with the header added thereto through a physical layer. Accordingly, an encryption function can be provided in the BBS structure.Type: ApplicationFiled: October 10, 2013Publication date: October 23, 2014Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Seong MOON, Ho Yong RYU, Ho Sun YOON
-
Publication number: 20140317403Abstract: An integrity record is appended to data slices prior to being sent to multiple slice storage units. Each of the data slices includes a different encoded version of the same data segment. An integrity indicator of each data slice is computed, and the integrity record is generated based on each of the individual integrity indicators, and may be, for example, list or a hash of the combined integrity indicators. When retrieving data slices from storage, the integrity record can be stripped off, a new integrity indicator of the data slice calculated, and a new integrity record created. The new integrity record can be compared to the original integrity record, and used to verify the integrity of the data slices.Type: ApplicationFiled: May 30, 2014Publication date: October 23, 2014Applicant: CLEVERSAFE, INC.Inventor: Jason K. Resch
-
Patent number: 8868905Abstract: Described are computer-based methods and apparatuses, including computer program products, for adaptive document redaction. A container is generated comprising a set of redacted documents corresponding to an original document, each redacted document having a level of redaction corresponding to a viewing location, and a header comprising encryption information for each redacted document in the set of redacted documents. A request to view the original document is received from a requesting device. The container is transmitted to the requesting device. A request for additional encryption information for a redacted document from the set of redacted documents is received from the requesting device, wherein the redacted document comprises a level of redaction for a viewing location that is equal to a location of the requesting device. The additional encryption information is transmitted to the requesting device.Type: GrantFiled: August 7, 2012Date of Patent: October 21, 2014Assignee: Appsense LimitedInventors: Anthony T. Davis, Richard J. Somerfield
-
Patent number: 8868906Abstract: Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.Type: GrantFiled: November 19, 2012Date of Patent: October 21, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Jeffrey A. Aaron, Edgar Vaughan Shrum, Jr.
-
Publication number: 20140310517Abstract: The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information.Type: ApplicationFiled: September 12, 2013Publication date: October 16, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MIHAI CHRISTODORESCU, XIN HU, DOUGLAS L. SCHALES, REINER SAILER, MARC PH. STOECKLIN, TING WANG, ANDREW M. WHITE
-
Patent number: 8863302Abstract: A digital content protection apparatus and method for digital rights management (DRM) are provided in which a content file including a plurality of content parts is imported such that a header is included which stores location information required for decoding each of the content parts. Therefore, the number of content parts constituting the content file can be recognized, and a license that is required for the use of each of the content parts can be acquired by analyzing header information without necessitating the parsing of the transport packets of the content file. Accordingly, preparation time for using content can be reduced.Type: GrantFiled: September 19, 2006Date of Patent: October 14, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Young-sun Yoon, Bong-seon Kim
-
Patent number: 8863230Abstract: Methods of authenticating a combination of a programmable IC and a non-volatile memory device, where the non-volatile memory device stores a configuration data stream implementing a user design in the programmable IC. A first identifier unique to the programmable IC is stored in non-volatile memory in the programmable IC. A second identifier unique to the non-volatile memory device is stored in the non-volatile memory device. As part of the process in which the configuration data stream is used to program the programmable IC with the user design, a function is performed on the two identifiers, producing a key specific to the programmable IC/non-volatile memory device combination. The key is then compared to an expected value. When the key matches the expected value, the user design is enabled. When the key does not match the expected value, at least a portion of the user design is disabled.Type: GrantFiled: June 9, 2006Date of Patent: October 14, 2014Assignee: Xilinx, Inc.Inventors: Steven K. Knapp, James A. Walstrum, Jr., Shalin Umesh Sheth
-
Patent number: 8862866Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.Type: GrantFiled: July 7, 2004Date of Patent: October 14, 2014Assignee: Certicom Corp.Inventor: Marinus Struik
-
Patent number: 8862880Abstract: A two-stage anonymization process is applied to monitored network traffic in which unique user identifiers, such as the MSISDN (Mobile Station International Subscriber Directory Number), are extracted from the traffic and anonymized to generate an ASI (anonymized subscriber identifier). A strictly random RSI (random subscriber identifier) is generated and used to replace the ASI. The RSI is generated upon a first occurrence of an ASI and stored in a lookup table for utilization upon subsequent ASI occurrences. Use of the strictly random RSI enables various studies and analysis of user behavior to be performed at a heightened level of privacy protection as compared with conventional anonymization schemes that do not utilize strictly random identifiers.Type: GrantFiled: September 23, 2011Date of Patent: October 14, 2014Assignee: GfK Holding Inc.Inventors: Jacques Combet, Yves-Marie LeMaitre, Antero Kivi
-
Patent number: 8862877Abstract: A method and system for providing data anonymously is provided. The method involves receiving an encrypted operator match ID by a client device from a first entity, where the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending the client device usage information with the re-encrypted operator match ID by the client device to a second entity through an anonymous channel, where the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID.Type: GrantFiled: August 12, 2008Date of Patent: October 14, 2014Assignee: TiVo Inc.Inventor: David C. Platt
-
Patent number: 8856920Abstract: A system and method are provided for supporting storage and analysis by law enforcement agency premises equipment of intercepted network traffic. The system and method provide integrity of the intercepted network traffic stored in an archive in accordance with lawful intercept requirements by storing all of the intercepted traffic, both benign and malicious, in the archive in its original form. The system and method furthermore provide for security from any malicious data packets of the archive by separating the malicious packets from the benign packets and forwarding only the benign packets to analysis applications of the law enforcement agency premises equipment.Type: GrantFiled: September 18, 2006Date of Patent: October 7, 2014Assignee: Alcatel LucentInventors: Faud Ahmad Khan, Dmitri Vinokurov, Vinod Kumar Choyi
-
Patent number: 8856910Abstract: Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.Type: GrantFiled: August 31, 2011Date of Patent: October 7, 2014Assignee: Palo Alto Networks, Inc.Inventors: Shadi Rostami-Hesarsorkh, Michael Jacobsen
-
Patent number: 8855317Abstract: This invention relates to system for securing an information unit and applications thereof. The system comprising at least one encrypting means for applying a first encryption key to the information unit thus provided an encrypted information unit, wherein said at least one encryption means is adapted to apply at least two second information encryption keys to the encrypted information unit, said at least two second encryption keys being calculated so as to decrypt the encrypted information unit when all of said first and second encryption keys have been applied to the information unit, the encryption keys being distributed to chosen users of the system.Type: GrantFiled: October 28, 2010Date of Patent: October 7, 2014Assignee: Universitetet i StavangerInventors: Chunming Rong, Gansen Zhao
-
Patent number: 8850044Abstract: A computationally implemented method includes, but is not limited to: receiving a first communiqué that is affiliated with a source entity and that is directed to a receiving entity; and transmitting to the receiving entity, in lieu of the first communiqué, a second communiqué that is provided in accordance with one or more conditional directives to conditionally obfuscate identity of the source entity, the one or more conditional directives provided by the receiving entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.Type: GrantFiled: May 28, 2010Date of Patent: September 30, 2014Assignee: The Invention Science Fund I, LLCInventors: Alexander J. Cohen, Edward K. Y. Jung, Royce A. Levien, Robert W. Lord, Mark A. Malamud, William H. Mangione-Smith, John D. Rinaldo, Jr., Clarence T. Tegreene
-
Patent number: 8850204Abstract: A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.Type: GrantFiled: December 23, 2009Date of Patent: September 30, 2014Assignee: Intel CorporationInventors: Robert Stacey, Jesse Walker, Emily H. Qi
-
Patent number: 8850179Abstract: Sensitive, Type 1 KIV-encrypted data is encapsulated into IP packets in a remotely deployed, secure communication system. The IP packets are addressed to a matching IP encapsulator/decapsulator device over the public Internet or other IP protocol network, that then passes it to a similar Type 1 KIV device for decryption. Thus, sensitive, encrypted data is made to appear as if it were any other commercial network data, cloaking it in the vast and busy world of the Internet. The present invention is embodied in a system that provides secure Voice-Over-IP (VoIP), video and data network functionality in a single, small size deployable case, to a remote user. Most importantly, the embodiment allows for the routing of bulk encrypted (i.e., secure) data over a public network, e.g., the Internet.Type: GrantFiled: September 14, 2007Date of Patent: September 30, 2014Assignee: TeleCommunication Systems, Inc.Inventors: Steve Anspach, Salazar Luke, Brian Heyliger, Greg Kasson, Jeff West
-
Publication number: 20140289513Abstract: A new efficient framework based on a Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) approach. CCP-CABE assists lightweight mobile devices and storing privacy-sensitive sensitive data into cloudbased storage by offloading major cryptography-computation overhead into the cloud without exposing data content to the cloud. CCP-CABE extends existing attribute-based data access control solutions by incorporating comparable attributes to incorporate more flexible security access control policies. CCP-CABE generates constant-size ciphertext regardless of the number of involved attributes, which is suitable for mobile devices considering their limited communication and storage capacities.Type: ApplicationFiled: March 17, 2014Publication date: September 25, 2014Applicant: Arizona Board of Regents on behalf of Arizona State UniversityInventors: Dijiang HUANG, Zhijie WANG
-
Publication number: 20140289514Abstract: A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.Type: ApplicationFiled: June 4, 2014Publication date: September 25, 2014Inventors: Robert D. Widergren, Martin Paul Boliek
-
Patent number: 8843915Abstract: A computing device to determine whether to update using a computer file by generating a file signature for that computer file based on its file header information and comparing the file signature to a collection of file signatures for updates already applied for matches.Type: GrantFiled: July 28, 2011Date of Patent: September 23, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventor: Fletcher Liverance
-
Patent number: 8826001Abstract: Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle encryption/decryption of information for all users in the Cloud computing environment. Typically, the encryption service is implemented between Cloud portals and a storage Cloud. Through the use of a browser/portal plug-in (or the like), the configuration and processing of the security process is managed for the Cloud computing environment user by pointing all traffic for which security is desired to this encryption service so that it can perform encryption (or decryption in the case of document retrieval) as needed (e.g., on the fly) between the user and the Cloud.Type: GrantFiled: April 27, 2010Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Linda N. Betz, Wesley J. Ho, Charkes S. Lingafelt, David P. Merrill
-
Patent number: 8826011Abstract: A method and device for selectively protecting a control signal. The method includes: configuring, at a transmission end, a header comprising indication information representing whether the control signal is encrypted; performing, at the transmitting end, protection of the control signal by selecting one of schemes for protecting the control signal; and transmitting, by the transmission end to the reception end, the control signal comprising the header. The schemes for protecting the control signal include: a first scheme that protects confidentiality and integrity of the control signal, a second scheme that protects only the integrity of the control signal, and a third scheme providing no protection of the control signal.Type: GrantFiled: May 29, 2009Date of Patent: September 2, 2014Assignee: LG Electronics Inc.Inventors: Gene Beck Hahn, Ki Seon Ryu
-
Publication number: 20140245001Abstract: Embodiments may include receiving a protected version of content that includes multiple encryption chains each including encrypted blocks of content. The protected version of content may include one or more initialization vectors for decrypting the encrypted blocks of content and discard information that specifies non-content portions of one or more data blocks to be discarded after decryption. Embodiments may also include performing chained decryption on the multiple encryption chains using the initialization vectors specified by the decryption information. The chained decryption may result in a sequence of decrypted data blocks. Embodiments may also include, based on the discard information, locating and removing the non-content portions of one or more data blocks in the sequence of decrypted data blocks. Embodiments may also include generating the protected version of content. Embodiments may also include performing any of the aforesaid techniques on one or more computers.Type: ApplicationFiled: May 8, 2014Publication date: August 28, 2014Applicant: ADOBE SYSTEMS INCORPORATEDInventors: Viswanathan Swaminathan, Saayan Mitra
-
Publication number: 20140236839Abstract: Methods, systems and apparatuses for a user-mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a user-mediator server of the user-mediator, a second share SKG2 from an owner server, wherein a first share SKG1 is provided to a member server of a member of a group by the owner. Further, the user-mediator receives a request from the member for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content. Further, the mediator receives a request for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content from the member. Further, the user-mediator determines whether the member is eligible to decrypt the electronic content, if eligible, the user-mediator responds to the request for mediation with a member accessible header, wherein the member accessible header includes the header after application of SKG2.Type: ApplicationFiled: April 30, 2014Publication date: August 21, 2014Applicant: ALEPHCLOUD SYSTEMS, INC.Inventor: Roy Peter D'Souza
-
Patent number: 8812839Abstract: Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information. Embodiments may also include receiving a hint track including packet header information for a stream of media packets from which the media content was sourced, and offset information identifying locations of encrypted media content within the encrypted content samples. Embodiments may include generating a second version of the encrypted content for streaming, which may include, based on the information of the hint track, identifying the location of media content within the encrypted content samples.Type: GrantFiled: July 31, 2012Date of Patent: August 19, 2014Assignee: Adobe Systems IncorporatedInventors: Viswanathan Swaminathan, Sheng Wei
-
Patent number: 8813216Abstract: A method and system for providing security to a Network Job Entry (NJE) network. A first NJE node and a third NJE node are connected by a second NJE node. The second NJE node conducts a security check of NJE packets traveling between the first and third NJE nodes. The security check performed by the second NJE node includes checking the userid of the person or job that sent the NJE packet, as well as the NJE data type. The NJE data type may be classified by the type of operation being performed, such as a batch job, sysout, command, message, as well as what application is being used. In one preferred embodiment, the security check includes checking the security level of the source of the data being transferred, such as a sensitive application. The security check can be based on the size of the data packet, such that excessively large data packets from a particular user are not permitted to be transmitted outside a secure NJE network.Type: GrantFiled: December 16, 2004Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: William Joseph Bloemeke, Reid Anthony Cashion
-
Patent number: 8806621Abstract: A computer system for managing security information for an organization includes a scanner execution module configured to automatically execute at least two scanners in a predetermined interval to analyze potential vulnerabilities of a computer environment. A vulnerability is acquired from the at least two scanners and stored in a data store. A user associated with the analyzed computer environment is determined based on the vulnerability stored in the data store, the user is notified of the vulnerability.Type: GrantFiled: November 15, 2010Date of Patent: August 12, 2014Assignee: Noblis, Inc.Inventor: John R. Maguire
-
Patent number: 8804953Abstract: Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of bits with a length equal to a number of ciphertext blocks in an output stream of the block cipher. The method may further include pre-processing a current plaintext block based on the stream of bits and the number of ciphertext blocks in the output stream of the block cipher. Then the block cipher may encipher the pre-processed block to generate a current ciphertext block.Type: GrantFiled: November 18, 2008Date of Patent: August 12, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8806650Abstract: A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.Type: GrantFiled: July 23, 2013Date of Patent: August 12, 2014Assignee: Cisco Technology, Inc.Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy, Philip J. S. Gladstone
-
Patent number: 8799505Abstract: A more secure TCP/IP protocol stack is provided having an enhanced transport layer. Encryption and decryption logic is arranged on the transmission side and on the reception side for processing a payload of a transport layer protocol, such as TCP or UDP. By employing this enhanced transport layer, a cryptograph process communication can be realized by dissolving various kinds of restrictions which a conventional IPsec or SSL possesses without affecting upper layer processing, and, at the same time, maintaining compatibility with the IP layer.Type: GrantFiled: September 12, 2011Date of Patent: August 5, 2014Assignee: INTO Co., Ltd.Inventors: Hirotsugu Ozaki, Keiko Ogawa
-
Patent number: 8798687Abstract: A cellular phone includes a telephone line communication part, a telephone functional part for making a telephone call via the telephone line communication part, an entry qualification holding part for holding fixed-term entry qualification information in which an entry target is specified, which is received via the telephone line communication part, and an entry communication part for transmitting the fixed-term entry qualification information held by the entry qualification holding part.Type: GrantFiled: September 12, 2008Date of Patent: August 5, 2014Assignee: Rohm Co., Ltd.Inventor: Masahide Tanaka
-
Patent number: 8799641Abstract: Methods and apparatus for secure proxying using network intermediaries. A system may include one or more servers and a network intermediary. The network intermediary may generate security metadata associated with a client request, comprising an identification of a source of the client request, and transmit an encoded version of the security metadata and a backend request to a server. The server may determine whether the security metadata is valid. If the security metadata is validated, the server may perform one or more operations in accordance with the backend request and the security metadata.Type: GrantFiled: December 16, 2011Date of Patent: August 5, 2014Assignee: Amazon Technologies, Inc.Inventors: Benjamin E. Seidenberg, Gregory B. Roth, Graeme D. Baer
-
Patent number: 8799365Abstract: An authorized blocker application is installed on a user device to monitor application usage and enforce usage restrictions. A network device receives, from the user device, information identifying a list of applications installed on the user device and receives from a customer terminal, configuration settings including usage restrictions for at least one application from the list of applications. The network device receives, from the user device, application usage data for the at least one application from the list of applications and compares the configuration settings received from the customer terminal and the application usage data received from the user device. When the application usage data includes times exceeding the configurations settings, the network device sends, to the user device, a blocking instruction to prevent use of the at least one application.Type: GrantFiled: September 28, 2011Date of Patent: August 5, 2014Assignee: Verizon Patent and Licensing Inc.Inventor: Dahai Ren
-
Patent number: 8793798Abstract: Systems and methods for content filtering are provided. According to one embodiment, a type and structure of an archive file are determined. The archive file includes identification bytes that identify the type of archive file and header information both in unencrypted and uncompressed form and a file data portion containing contents of files in encrypted form, compressed form or both. The determination is based solely on the identification bytes and/or the header information. Based thereon, descriptive information, describing characteristics of the files, is extracted from the header information for each file. The descriptive information includes a checksum of the file in uncompressed form, a size of the file in uncompressed form and/or a size of the file in compressed form. A file is identified as being potentially malicious or undesired when a comparison of the descriptive information to detection signatures of known malicious or undesired files results in a match.Type: GrantFiled: November 30, 2012Date of Patent: July 29, 2014Assignee: Fortinet, Inc.Inventors: Steven Michael Fossen, Alexander Douglas MacDonald
-
Patent number: 8788616Abstract: Distinctions between resources explicitly selected by a user and resources indirectly selected may be enabled by identifying an explicitly selected web page or other resource as such in the request for the web page or other resource, which may allow the web page or resource to be differentiated from web pages or other resources that are requested as a consequence of their indirect selection. Moreover, a log of web pages or other resources explicitly selected by a user may be maintained at the client and later reference by a local processor or communicated to a host process seeking to differentiate directly and indirectly selected web pages or other resources. These techniques also may allow a proxy or other server to perform processing related to parentally controlled accounts or related to accurately tracking frequently requested resources such as web pages.Type: GrantFiled: September 23, 2011Date of Patent: July 22, 2014Assignee: AOL Inc.Inventors: Eric O'Laughlen, W. Karl Renner, Kevin E. Greene
-
Patent number: 8788807Abstract: Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived identity to an application. In one embodiment, a key server may be used to receive the derived identity from the application, and return a sub-key to the application to use for encrypting communications with the user.Type: GrantFiled: January 10, 2007Date of Patent: July 22, 2014Assignee: QUALCOMM IncorporatedInventors: Adrian Escott, James Semple
-
Publication number: 20140201522Abstract: Preventing web crawler access includes receiving a request for a webpage that includes web content that is to be protected from a web crawler, encrypting the web content to be protected to generate encrypted content and responding to the request, including sending the encrypted content and a decryption instruction. The decryption instruction is configured to allow a web browser to decrypt the encrypted content.Type: ApplicationFiled: February 27, 2014Publication date: July 17, 2014Applicant: Alibaba Group Holding LimitedInventor: Ling He
-
Publication number: 20140201521Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in a header of the message. The message is then sent to a recipient and the frame type used to perform a policy check.Type: ApplicationFiled: January 31, 2014Publication date: July 17, 2014Applicant: Certicom Corp.Inventor: Marinus Struik
-
Patent number: 8782424Abstract: A system and method for sharing data is provided. A request is received from a mobile device to transfer a set of data to a recipient. The set of data is stored by a server and controlled by a user of the mobile device. The request is authenticated, and the data is encrypted. The set of data is transmitted to a recipient specified by the user via the mobile device.Type: GrantFiled: December 21, 2009Date of Patent: July 15, 2014Assignee: IMS Health Inc.Inventor: Salah Machani
-
Patent number: 8776249Abstract: A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The method includes generating a document, including marking one or more portions of the document as private; and sending the document to an intermediary system for transmission to a destination system. Prior to the document being transmitted to the destination system, the marked portions of the document are encrypted by the intermediary system using a key that is unavailable to the destination system.Type: GrantFiled: February 23, 2012Date of Patent: July 8, 2014Assignee: Google Inc.Inventor: Ben Margolin
-
Patent number: 8767963Abstract: The present invention relates to a method for encrypting a short message in mobile communication. According to the present invention, a user first inputs short-message content and a short-message password to a first communication electronic device. Then the first communication electronic device writes the short-message content to a short-message packet according to a short-message protocol, configures a set of unused parameters of the short-message packet as a set of encryption parameters according to the short-message protocol, and configures the short-message password to the set of encryption parameters for transmitting the short-message packet containing the set of encryption parameters to a second communication electronic device. Thereby, according to the present invention, the short message is encrypted.Type: GrantFiled: July 6, 2012Date of Patent: July 1, 2014Assignee: Wistron CorporationInventor: Yu-Chang Huang
-
Patent number: 8769267Abstract: A system and method for verifying and/or geolocating network nodes in a network in attenuated environments for cyber and network security applications are disclosed. The system involves an origination network node, a destination network node, and at least one router network node. The origination network node is configured for transmitting a data packet downstream to the destination network node through at least one router network node. The data packet contains a header portion and a payload data portion. At least one of the network nodes is an enabled network node. The enabled network node(s) is configured to verify any of the network nodes that are located upstream from the enabled network node(s) by analyzing the header portion and/or the payload data portion of the data packet.Type: GrantFiled: August 15, 2012Date of Patent: July 1, 2014Assignee: The Boeing CompanyInventors: Gregory M. Gutt, Arun Ayyagari, David A. Whelan, Michael L. O'Connor, David G. Lawrence
-
Publication number: 20140173275Abstract: Embodiments of an invention for securing transmissions between processor packages are disclosed. In one embodiment, an apparatus includes an encryption unit to encrypt first content to be transmitted from the apparatus to a processor package directly through a point-to-point link.Type: ApplicationFiled: December 19, 2012Publication date: June 19, 2014Inventors: Simon Johnson, Abhishek Das, Carlos Rozas, Uday Savagaonkar, Robert Blankenship, Kiran Padwekar
-
Patent number: 8755522Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.Type: GrantFiled: August 16, 2013Date of Patent: June 17, 2014Assignee: Luminal, Inc.Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
-
Patent number: 8756673Abstract: Techniques for sharing data between users in a manner that maintains anonymity of the users. Tokens are generated and provided to users for sharing data. A token comprises information encoding an identifier and an encryption key. A user may use a token to upload data that is to be shared. The data to be shared is encrypted using the encryption key associated with the token and the encrypted data is stored such that it can be accessed using the identifier associated with the token. A user may then use a token to access the shared data. The identifier associated with the token being used to access the shared data is used to access the data and the encryption key associated with the token is used to decrypt the data. Data is shared anonymously without revealing the identity of the users using the tokens.Type: GrantFiled: March 30, 2007Date of Patent: June 17, 2014Assignee: Ricoh Company, Ltd.Inventors: John W. Barrus, Tomohiko Sasaki, Jamey Graham, Sharon Kojima
-
Patent number: 8751789Abstract: A general purpose distributed encrypted file system generates a block key on a client machine. The client machine encrypts a file using the block key. Then, the client encrypts the block key on the first client machine with a public key of a keystore associated with a user and associates the encrypted block key with the encrypted data block as crypto metadata. The client machine caches the encrypted data block and the crypto metadata and sends the encrypted data block and the crypto metadata to a network file system server. When the client machine receives a return code from the network file system server indicating successful writes of the encrypted data block and the crypto metadata, the client machine clears the cached encrypted data block and the crypto metadata.Type: GrantFiled: September 17, 2010Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventors: Hussaina Nandyala Begum, Shawn Patrick Mullen, Manjunath A. Pattanshetti
-
Patent number: 8751787Abstract: A method and device for integrating multiple threat security services are disclosed. The method may comprise parsing an incoming packet at a current layer and analyzing the packet with respect to multiple threat security services and so that one or more threat security services needed by the packet may be determined. According to an exemplary embodiment, the current layer may be a layer in a protocol stack constructed based on the multiple threat security services. With this method, integrated multiple threat security services may filter application data and parse network packet data via a single integrated entity, and thus the efficacy of filtering application data may be improved while computation overhead may be reduced.Type: GrantFiled: December 10, 2008Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventor: Bai Ling Wang
-
Patent number: 8751800Abstract: Embodiments are directed towards providing interoperability by establishing a trust relationship between a provider of a media player usable by a consumer and a content provider. A trust relationship is verified through using a public-private key certification authority. When a request for content is received from a consumer, the request might indicate what content protection mechanisms are available in the consumer's device. When a trust relationship is determined to exist between the content provider and the media player providers, the content provider encrypts a license separately for each of a plurality of different content protection mechanisms available at the consumer's device. The encrypted licenses are provided to the consumer's device, where the media player may be selected to play the content based on a self integrity check the media player may perform, and its ability to use a private key associated with a corresponding public key to decrypt the license.Type: GrantFiled: April 2, 2012Date of Patent: June 10, 2014Assignee: Google Inc.Inventor: David Kimbal Dorwin
-
Patent number: 8751795Abstract: A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.Type: GrantFiled: September 13, 2011Date of Patent: June 10, 2014Assignee: MO-DV, Inc.Inventors: Robert D. Widergren, Martin Paul Boliek
-
Patent number: 8750501Abstract: A method for securely transmitting data from a sender computer system to a receiver computer system comprises receiving cleartext message by a first intelligent agent environment; splitting said message into a plurality of message fragments; creating an intelligent agent for each message fragment; generating a key for each message fragment; encrypting each said message fragment to produce a respective encrypted message fragment; and transmitting each intelligent agent with said respective encrypted message fragment as a data payload. The method may further comprise receiving each intelligent agent with its respective encrypted message fragment as a data payload by a second intelligent agent environment at the receiver computer system; locating each of a set of agents; decrypting each encrypted respective message fragment to produce a respective cleartext message fragment; and collaborating by the set of agents to recombine cleartext message fragments to form a cleartext message.Type: GrantFiled: November 21, 2012Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventors: Nicholas R. Bailey, Margaret A. Beynon, Peter Stretton
-
Patent number: 8745371Abstract: Devices located on a back end of a web application in a private cloud may establish secure communications to other back end devices or client devices with a secure boot device integrated in the back end device. The secure boot device enables the back end component to cryptographically split data and encrypt data for transmission to other devices through a secure communications link. The secure communications link may improve security on private cloud networks. Further the secure communications link may improve security to allow back end devices to be located remote to other back end devices.Type: GrantFiled: December 29, 2011Date of Patent: June 3, 2014Assignee: Unisys CorporationInventor: Eric T. Obligacion