Data Authentication Patents (Class 713/161)
  • Patent number: 8428570
    Abstract: Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket that uniquely corresponds to the combination of the device and SIM card, and that is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card, and initiates activation when the verification of the activation ticket is successful.
    Type: Grant
    Filed: April 15, 2011
    Date of Patent: April 23, 2013
    Assignee: Apple Inc.
    Inventors: Dallas De Atley, Jeffrey Bush, Jerry Hauck, Ronald Keryuan Huang, Brainerd Sathianathan
  • Patent number: 8429426
    Abstract: A method for data storage includes supplying data to and from a host to a storage memory via a secure data path. A first CPU is employed to control operation of the storage memory, and a second CPU is employed to control operation of the secure data path.
    Type: Grant
    Filed: October 17, 2008
    Date of Patent: April 23, 2013
    Assignee: SanDisk IL Ltd.
    Inventors: Leonid Minz, Avraham Meir, Boris Dolgunov, Roy Krotman
  • Patent number: 8429414
    Abstract: A method of generating prevention and control data to verify validity of data to be transmitted, and an apparatus to perform the method, the method including generating the prevention and control data according to composing information of the data to be transmitted, and transmitting the prevention and control data along with the data to be transmitted to verify the validity of the data to be transmitted.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: April 23, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Dae-youb Kim, Weon-il Jin, Sung-ioon Park, Hwan-ioon Kim
  • Patent number: 8429748
    Abstract: Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description.
    Type: Grant
    Filed: November 27, 2009
    Date of Patent: April 23, 2013
    Assignee: Red Hat, Inc.
    Inventors: John M. Suit, Nathaniel R. Tabernero, Daniel L. Becker, Adam J. Keeton, Joshua Suereth
  • Patent number: 8429404
    Abstract: A system and method for discovery and/or authentication of clients to a network, particularly a managed network, substantially without requiring the client and/or access device to transmit an unencrypted address or identification.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: April 23, 2013
    Assignee: Intel Corporation
    Inventors: Benjamin M. Greenstein, Jesse Walker
  • Patent number: 8428261
    Abstract: Described is a method and system for establishing an authenticated wireless communication (e.g., using Bluetooth technology) between first and second mobile devices. The first device (e.g., a mobile barcode scanner) sends a signal to establish a wireless communication with the second device. The first device includes a data capturing arrangement (“DCA”) as an only input device interface with a user thereof. The second device initiates an authentication process by requesting the first device to obtain a PIN code from the user. Once the first device obtains the PIN code from the user via the DCA, a pairing process is performed to compare the PIN code to entries in a database of authorized PIN codes. When the pairing process has been successfully completed, a link key is generated to establish the authenticated wireless communication between the first and second devices.
    Type: Grant
    Filed: June 20, 2003
    Date of Patent: April 23, 2013
    Assignee: Symbol Technologies, Inc.
    Inventors: Gary Schneider, Stephen J. Shellhammer
  • Patent number: 8422674
    Abstract: A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
  • Patent number: 8418241
    Abstract: Aspects of a method and system for traffic engineering in an IPSec secured network are provided. In this regard, a node in a network may be authenticated as a trusted third party and that trusted third party may be enabled to acquire security information shared between or among a plurality of network entities. In this manner, the trusted third party may parse, access and operate on IPSec encrypted traffic communicated between or among the plurality of network entities. Shared security information may comprise one or more session keys utilized for encrypting and/or decrypting the IPSec secured traffic. The node may parse IPSec traffic and identify a flow associated with the IPsec traffic. In this manner, the node may generate and/or communicate statistics pertaining to said IPSec secured traffic based on the flow with which the traffic is associated.
    Type: Grant
    Filed: November 14, 2007
    Date of Patent: April 9, 2013
    Assignee: Broadcom Corporation
    Inventor: Uri Elzur
  • Patent number: 8416950
    Abstract: An integrated circuit includes a fingerprint element and a decryption circuit. The fingerprint element generates a fingerprint, where the fingerprint is reproducible and represents an inherent manufacturing process characteristic unique to the integrated circuit device. The decryption circuit decrypts, using a decryption key that is based on the fingerprint, an encrypted data in order to extract data. In one embodiment, the propagation delay of various circuit elements are used to generate the fingerprint. In another embodiment, the specific frequency of an oscillator is used to generate the fingerprint. In yet another embodiment, a ratio of measurable values is used to generate the fingerprint. In another embodiment, differences in transistor threshold voltages are used to generate the fingerprint. In yet another embodiment, variations in line widths are used to generate the fingerprint.
    Type: Grant
    Filed: April 7, 2011
    Date of Patent: April 9, 2013
    Assignee: Xilinx, Inc.
    Inventor: Stephen M. Trimberger
  • Patent number: 8417958
    Abstract: Systems and methods for electronic postmarking of location data are provided. Electronic postmarking of location data (S.20) includes generating a hash value corresponding to merged data (S.30). Electronic postmarking further includes generating an electronic postmark data structure (S.40) comprising the hash value and a date/time stamp. The electronic postmarking data structure (S.40) may further include a digital signature.
    Type: Grant
    Filed: July 6, 2010
    Date of Patent: April 9, 2013
    Assignee: United States Postal Service
    Inventor: Charles R. Chamberlain
  • Patent number: 8417259
    Abstract: Various aspects are disclosed herein for detection of mobile devices. Detection of mobile devices can be localized to an environment that is radio frequency enclosed. Within this environment, any packages can be scanned for the presence of mobile devices and for the interrogation of information from such mobile devices, such as the mobile device number and mobile device equipment information. The environment can contain an antenna for communicating with any mobile devices within the environment and a receiver component configured to receive information from any contacted mobile device. Based on this information, a determination can be made whether to validate a contacted mobile device or to take any alternative action.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: April 9, 2013
    Assignee: AT&T Mobility II LLC
    Inventors: DeWayne Allan Sennett, Brian Kevin Daly
  • Patent number: 8417943
    Abstract: A method and apparatus is described for processing of network data packets by a network processor having cipher processing cores and authentication processing cores which operate on data within the network data packets, in order to provide a one-pass ciphering and authentication processing of the network data packets.
    Type: Grant
    Filed: October 11, 2011
    Date of Patent: April 9, 2013
    Assignee: Intel Corporation
    Inventors: Jaroslaw J. Sydir, Kamal J. Koshy, Wajdi Feghali, Bradley A. Burres, Gilbert M. Woolrich
  • Patent number: 8411760
    Abstract: Presented herein are systems, methods, and apparatus for displaying pictures. In one embodiment, there is presented a decoder system for decoding video data. The decoder system comprises a port and a transport processor. The port receives packets carrying encoded video data from a plurality of video streams. The transport processor adds a header to encoded video data from at least one of the packets. The header identifies a particular one of the plurality of video streams, wherein the at least one packet is from the particular one of the plurality of video stream.
    Type: Grant
    Filed: January 28, 2010
    Date of Patent: April 2, 2013
    Assignee: Broadcom Corporation
    Inventor: Qin-Fan Zhu
  • Patent number: 8411858
    Abstract: The present invention utilizes the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The present invention uses the AAA server as a central entity to dynamically generate and distribute the chosen security association parameters needed to support the Foreign Agent and Home Agent security association based on a request from the Foreign Agent. The AAA server can also dynamically assigns a unique SPI value to the Foreign Agent and Home Agent pairs. The various parameters that can be allocated in the present invention include a FA-HA shared secret key or a public/private key pair, an authentication algorithm and mode, a FA-HA secret key lifetime, and security parameter index or security index values. The present invention also can assist in making sure that the Foreign Agent and the Home Agent stay synchronized with respect to their security association.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: April 2, 2013
    Assignee: Apple Inc.
    Inventors: Ahmad Muhanna, Mohamed Khalil
  • Patent number: 8412951
    Abstract: A control system and a security checking method thereof is used in an embedded system. The control system includes a process module and a first memory module. The first memory module is used to store a pre-loader code and a first secure key. The security checking method includes the following steps: loading the pre-loader code and the first secure key; executing the pre-loader code to download a first program from an in-system programming module; determining whether the first program corresponds to the first secure key or not; if yes, then downloading a second program from the in-system programming module; and programming an internal program and a second secure key by the second program.
    Type: Grant
    Filed: November 4, 2009
    Date of Patent: April 2, 2013
    Assignee: Socle Technology Corp.
    Inventors: Shao-Ping Chen, Lin-Shu Chen
  • Patent number: 8412931
    Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.
    Type: Grant
    Filed: December 27, 2007
    Date of Patent: April 2, 2013
    Assignee: Apple Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Patent number: 8405857
    Abstract: An image processing apparatus that is capable of preventing an unauthorized connection from a host apparatus which is not permitted to use a device by restricting a host apparatus that performs an association process by a method other than password authentication. A processing unit performs an association process with the host apparatus in order to perform the wireless communication. A storage unit stores a permitted host ID indicating the host apparatus that is permitted to perform the association process by the processing unit. A control unit compares a host ID transmitted from the host apparatus with the permitted host ID stored in the storage unit when the processing unit performs the association process, and determines whether the processing unit performs the association process based on a result of the comparison.
    Type: Grant
    Filed: March 3, 2010
    Date of Patent: March 26, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Hiroshi Sekine
  • Patent number: 8407141
    Abstract: Financial transaction data comprising payment on any one of multiple financial transaction types are processed with an adapter layer that receives an incoming data message relating to a financial transaction initiated by a payer and operates on the incoming data message to produce adapted data relating to the financial transaction, and a processor that receives the adapted data and determines transaction routing to direct the adapted data to a processing network module that requests authorization by an issuer, responds to authorization by initiating request for settlement and payment on the financial transaction to a transaction payee, and responds to payee query requests by providing non-payment data to an external payee.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: March 26, 2013
    Assignee: Visa U.S.A. Inc.
    Inventors: Matthew James Mullen, Mark Rockelman
  • Patent number: 8407468
    Abstract: One embodiment of a method of authenticating data comprises: receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream; receiving, at the device, from a data authentication server connected to the device by a network, a server-computed authentication value based on a subset of the data transmitted by the data server, the data authentication server having access to the data that was transmitted from the data server to the device; and comparing a device-computed authentication value based on a subset of the received data, corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.
    Type: Grant
    Filed: November 18, 2011
    Date of Patent: March 26, 2013
    Assignee: Research In Motion Limited
    Inventors: Michael Kenneth Brown, David Francis Tapuska, Michael Stephen Brown
  • Patent number: 8407467
    Abstract: A ubiquitous audio reproducing and servicing method and apparatus for streaming or downloading a lossless audio source from a Content Provider (CP) using a lossy audio source card as an authentication key. The ubiquitous audio reproducing method includes determining whether a memory card storing lossy audio sources and their authentication codes is inserted, if it is determined that the memory card is inserted, transmitting an authentication code of a lossy audio source in the memory card and a system unique Identifier (ID) to a content server by connecting to the content server via a network, and if the content server allows the use of a lossless audio source corresponding to the lossy audio source using the authentication code, streaming or downloading the lossless audio source from the content server.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: March 26, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Jong-bae Kim
  • Patent number: 8402532
    Abstract: Various technologies and techniques are disclosed for providing host control of partial trust accessibility. A framework allows libraries to be identified as partial trust callers allowed to indicate that the libraries are allowed to be called from partially trusted code by default. The framework allows libraries to be identified as partial trust callers enabled to indicate the libraries could be called from partially trusted code, but not by default. A hosting application is notified that a particular library has been loaded. If the particular library has been identified as partial trust callers allowed, then a determination is received from the hosting application on whether to remove or keep partial trust accessibility for the particular library. If the particular library has been identified as partial trust callers enabled, then a determination is received from the hosting application on whether or not to enable partial trust accessibility for the particular library.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: March 19, 2013
    Assignee: Microsoft Corporation
    Inventors: Michael D. Downen, Raja Krishnaswamy, Charles William Kaufman, James S. Miller, Stephen Fisher
  • Patent number: 8402510
    Abstract: A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same.
    Type: Grant
    Filed: June 20, 2006
    Date of Patent: March 19, 2013
    Assignee: Comcast Cable Holdings, LLC
    Inventor: Mark D. Francisco
  • Patent number: 8397058
    Abstract: A method and system which provides communication between a first portable device and a second portable device. The first portable device stores a first sequence number and a first key, and the second portable device stores a second sequence number and a second key. Verification is performed using the first and second keys. The first sequence number is compared to the second sequence number. If the second sequence number is newer than the first sequence number, the first sequence number is set to have a value of the second sequence number if the verification succeeds. If the first sequence number is newer than the second sequence number, the second sequence number is set to have a value of the first sequence number if verification succeeds.
    Type: Grant
    Filed: July 28, 2000
    Date of Patent: March 12, 2013
    Assignee: Mondex International Limited
    Inventors: Kazuo J. Ezawa, Dave Roberts, Michael Foster, John Kelly
  • Patent number: 8397083
    Abstract: A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores an associated file key within a special metadata portion of the file. Notably, special metadata is created by a security appliance coupled to the storage system and attached to each file to thereby create two portions of the file: the special metadata portion and the main, “file data” portion. The security appliance then stores the file key within the specially-created metadata portion of the file. A cryptainer key is associated with the cryptainer. Each file key is used to encrypt the file data portion within its associated file and the cryptainer key is used to encrypt the part of the special metadata portion of each file. To delete the file from the cryptainer, the file key of the file is deleted and the special metadata portions of all other files stored in the cryptainer are re-keyed using a new cryptainer key.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: March 12, 2013
    Assignee: NetApp, Inc.
    Inventors: Robert Jan Sussland, Lawrence Wen-Hao Chang, Ananthan Subramanian
  • Patent number: 8392996
    Abstract: A method, system, computer program product and/or a computer readable medium of instructions for detecting one or more entities which are able to reinfect a processing system with malicious software. The method includes: monitoring, in the processing system, activity indicative of the malicious software reinfecting the processing system; in response to detecting the activity, storing a record of the activity and one or more entities associated with the activity; determining if the malicious software has reinfected the processing system; and in response to determining that the malicious software has reinfected the processing system, analysing the record to detect the one or more entities which were associated with the activity that caused and/or assisted in reinfecting the processing system with the malicious software. There is also disclosed a method, system, computer program product and/or a computer readable medium of instructions for detecting a variant of malicious software in a processing system.
    Type: Grant
    Filed: August 8, 2007
    Date of Patent: March 5, 2013
    Assignee: Symantec Corporation
    Inventors: Ian Oliver, Ryan Pereira
  • Patent number: 8386782
    Abstract: The invention provides a method, system, device and computer program product for setting up a secure session among three or more devices or parties of a communication group, including authenticating a key agreement between the devices or parties of the communication group, wherein the devices of the group start, preferably after a key is computed or agreed, a protocol, preferably a multi-party data integrity protocol, for authenticating the key agreement.
    Type: Grant
    Filed: January 5, 2007
    Date of Patent: February 26, 2013
    Assignee: Nokia Corporation
    Inventors: Kaisa Nyberg, Nadarajah Asokan
  • Patent number: 8386766
    Abstract: The present invention relates to a method and arrangements in a mobile telecommunications network including a plurality of access points (203), a plurality of 5 network gateway devices (204). The method comprising the steps of: deciding a security setting needed for a dedicated bearer signal by a network component, communicating said decision to a node needed for establishing communication, configuring or selecting by said access point (203) a secure protocol (205) as needed between said access point and said gateway devices (204), and said decision being based on one or several of the network deployment being used and/or network operator policies.
    Type: Grant
    Filed: October 17, 2007
    Date of Patent: February 26, 2013
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Tomas Nylander, Jari Vikberg, Oscar Zee
  • Patent number: 8380991
    Abstract: In the field of computer data security, a hash process which is typically keyless and embodied in a computing apparatus is highly secure in terms of being resistant to attack. The hash process uses computer code (software) polymorphism, wherein computation of the hash value for a given message is partly dependent on the content (data) of the message. Hence the computer code changes dynamically while computing each hash value.
    Type: Grant
    Filed: April 30, 2009
    Date of Patent: February 19, 2013
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Mathieu Ciet, Benoit Chevallier-Mames
  • Patent number: 8379854
    Abstract: In one embodiment, the method performed by mobile equipment to authenticate communication with a network includes generating keys using cellular authentication and voice encryption, and then generating an authentication key based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.
    Type: Grant
    Filed: October 2, 2008
    Date of Patent: February 19, 2013
    Assignee: Alcatel Lucent
    Inventor: Sarvar Patel
  • Patent number: 8374339
    Abstract: Method, program, network system and client device each has a structure of being given encryption information different from given present encryption information by use of the given present encryption information and being given different encryption information in incremental steps, to one or a plurality of the connection destinations (client device CLm), for security setting of wireless communication network (wireless LAN device 2) to one or a plurality of connection destinations.
    Type: Grant
    Filed: December 27, 2005
    Date of Patent: February 12, 2013
    Assignee: Fujitsu Limited
    Inventor: Tomonori Yasumoto
  • Patent number: 8370627
    Abstract: It is an object of the present invention to solve a problem included in the onion routing which is used as a confidential communication method, that if a system down occurs in a computer within a communication route, connection is not made to further components at all, or a problem that the system and the traffic become slow by using multiplexed encryption. It is a communication method in which a client of an information providing source encrypts random numbers and calculates its hash value using respective public keys of an information server to which it connects, a function server of a destination to be sent, and an information server to which the function server connects, respective servers decrypt the encrypted random number using their own secret keys to compare the random number with the hash value, and thus, the client determines whether or not the route is related to the client.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: February 5, 2013
    Assignee: University of Yamanashi
    Inventors: Haruaki Yamazaki, Hidetoshi Mino, Yoshimichi Watanabe
  • Patent number: 8370921
    Abstract: Packet sequence number checking through a VPN tunnel may be performed by assigning sequence numbers on a per-priority class basis to packets traversing the VPN tunnel. In one implementation, a network device may receive a packet that is to be transmitted over a VPN tunnel, the packet including control information that includes at least a QoS priority class of the packet. The network device may extract the priority class of the packet from the control information and generate a sequence value that describes an arrival sequence of the packet relative to other received packets of the same priority class as the packet. The network device may additionally generate an IPsec header for the packet, the IPsec header including the sequence value and the priority class of the packet; attach the IPsec header to the packet; and transmit the packet through the VPN tunnel.
    Type: Grant
    Filed: December 8, 2009
    Date of Patent: February 5, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Yifei Duan, Yufeng Zhu
  • Patent number: 8370954
    Abstract: Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which contains the encrypted content, key data, and the control data, which describes the applied conditions of the key data.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: February 5, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Takeshi Takahashi
  • Patent number: 8369527
    Abstract: A multicast host for communicating information published about any one of a set of topics to one or more authorised subscribers to those topics, the set of topics being partitioned into one or more partition elements, each partition element having a partition element encryption key associated therewith, wherein each of the one or more partition elements is a disjoint proper subset of the set of topics, the host comprising: means for receiving information relating to a topic; means for determining a partition element for the topic; means for retrieving a partition element encryption key associated with the partition element; means for encrypting the information with the retrieved partition element encryption key; and means for communicating the information to the one or more authorised subscribers.
    Type: Grant
    Filed: June 22, 2005
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Boaz Carmeli, John Justin Duigenan, Michael Damein Elder, Gidon Gershinsky
  • Patent number: 8363837
    Abstract: In a preferred embodiment a method of operating an intelligent disk drive is described which includes compression and/or encryption capability at the file level. The intelligent disk drive includes means for executing distributed computing tasks including a CPU and associated memory. The communication interface with the host computer or other device on the communication bus is modified to allow the device to send executable code for a task to the drive and to allow the drive to communicate the results and status information about the task to the host device. In a preferred embodiment the disk drive has a task control program, task program code, task data and status information for the distributed task. The task control program implements the basic task management functions of storing the task program, reporting results and saving progress information to allow the task to be interrupted by other drive functions.
    Type: Grant
    Filed: February 28, 2005
    Date of Patent: January 29, 2013
    Assignee: HGST Netherlands B.V.
    Inventor: Larry Lynn Williams
  • Patent number: 8365262
    Abstract: A system for automatically generating and filling login information to improve the security in storage and use of the login information. The system comprises a monitoring module, a registration module, and a login module; the monitoring module is coupled to the registration module and the login module; the monitoring module is adapted to check for an entry of login information corresponding to the identifier of the current page, and prompt a result to the user, and transmit a signal to the registration module and the login module to perform a registration and/or login operation; the registration module comprises a login information generation unit, a login information storage unit, and a first user confirmation unit; and the login module comprises a login information input unit and a second user confirmation unit. A method for the same is also disclosed.
    Type: Grant
    Filed: November 6, 2008
    Date of Patent: January 29, 2013
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 8365284
    Abstract: The invention relates to a security border node (2a) for protecting a packet-based network from attacks, comprising: an anomaly detection unit (10) for performing an anomaly detection, in particular a statistical analysis, on session control messages (11), in particular on SIP messages contained in a packet stream (5) received in the security border node (2a). The security border node further comprises a message context provisioning unit (13) for providing at least one session control message (11) to the anomaly detection unit (10) together with message context information (12, 17, 24) related to a client (22) and/or to a session (23) to which the session control message (11, 11a to 11f) is attributed. The invention also relates to a method for protecting a packet-based network from attacks, to a computer program product, and to a packet-based network.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: January 29, 2013
    Assignee: Alcatel Lucent
    Inventor: Stefan Wahl
  • Patent number: 8364965
    Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.
    Type: Grant
    Filed: March 15, 2006
    Date of Patent: January 29, 2013
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Jean-Francois Riendeau
  • Patent number: 8356233
    Abstract: The present disclosure provides systems and methods for inserting pseudo-noise in a data stream based on an unacceptable input data sequence in an optical network thereby preventing unnecessary loss of frame in SONET/SDH or Optical Transport Network (OTN) systems. The present disclosure includes a SONET/SDH or OTN framer, a transceiver, and a method for detecting an unacceptable data sequence or pattern and inserting a keep-alive or pseudo-noise sequence in the data sequence to maintaining framing on subsequent network elements, framers, transceivers, etc. For example, the present invention, upon receiving an unacceptable pattern of zeros or low ones density caused by a loss of signal condition or the like, may insert a pseudorandom noise pattern into the transmitted frame. This allows the downstream network element to continue a frame lock on the incoming signal, and thus keep the frame overhead and data communications channels from being lost.
    Type: Grant
    Filed: May 19, 2010
    Date of Patent: January 15, 2013
    Assignee: Ciena Corporation
    Inventors: Jeffery Thomas Nichols, Jeffrey Scott Moynihan
  • Patent number: 8356178
    Abstract: A method includes: computing a first message authentication code for each of a plurality of sets of data blocks on a data storage medium, and authenticating the sets of data blocks by computing a second message authentication code for each of the sets of data blocks to be authenticated and comparing the first and second message authentication codes. An apparatus that performs the method is also provided.
    Type: Grant
    Filed: November 13, 2006
    Date of Patent: January 15, 2013
    Assignee: Seagate Technology LLC
    Inventor: Laszlo Hars
  • Patent number: 8352731
    Abstract: A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of security administration in large-scale storage systems.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: January 8, 2013
    Assignee: Huazhong University of Science & Technology
    Inventors: Ke Zhou, Dan Feng, Zhongying Niu, Tianming Yang, Qinhua Yan, Dongliang Lei, Wei Yan
  • Patent number: 8352732
    Abstract: This invention relates to a transmission method for conditional access content, in which said content is broadcast in the form of data packets (DP). These data packets contain at least one marker having a known value and a useful part (PL). This method includes the following steps: extraction of said marker (Mc) from the data packet (DP) and replacement of this marker with an encryption key identification information (PAR); encryption of said useful part (PL) by an encryption key (K1) that can be identified by said encryption key identification information (PAR); formation of an encrypted data packet containing at least said encryption key identification information (PAR) and the encrypted useful part (PLK1); transmission of said encrypted data packet to at least one receiver.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: January 8, 2013
    Assignee: Nagra France SAS
    Inventor: Thierry Lelegard
  • Patent number: 8353055
    Abstract: A method for upgrading a Rights Object (RO) includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the RO that requires updating from a Secure Removable Media (SRM) Agent; providing, by the DRM Agent, the RO related information to a Rights Issuer (RI), and obtaining a new RO from the RI; and interacting, by the DRM Agent, with the SRM Agent to upgrade the RO that requires updating on the SRM by means of the new RO. According to the embodiments of the present invention, the DRM Agent acquires RO related information which is stored on the SRM and does not have Move rights, and interacts with the RI to move the RO out from the SRM, so as to move the RO without the Move rights out from the SRM.
    Type: Grant
    Filed: July 2, 2012
    Date of Patent: January 8, 2013
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Renzhou Zhang, Chen Huang, Weizhong Yuan, Zhipeng Zhou
  • Patent number: 8347405
    Abstract: An apparatus, system, and method are disclosed for Asynchronous Java Script and XML (AJAX) form-based authentication using Java 2 Platform Enterprise Edition (J2EE). The apparatus for AJAX form-based authentication using J2EE is provided with a plurality of modules configured to functionally execute the necessary steps for redirecting an AJAX client request to an authentication required servlet, issuing an AJAX response to the client, authenticate the user security credentials, and process the client request for secure data. In addition, a method of the present invention is also presented for programming Asynchronous Java Script and XML (AJAX) form-based authentication that avoids a page change using Java 2 Platform Enterprise Edition (J2EE).
    Type: Grant
    Filed: December 27, 2007
    Date of Patent: January 1, 2013
    Assignee: International Business Machines Corporation
    Inventor: Richard A. Backhouse
  • Patent number: 8347086
    Abstract: A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method automatically detects, and then self-repairs corrupt, modified or non-existent remote files. The method first performs an integrity check on a remote file and then determines whether the integrity check passed. If the integrity check passed, then the user goes through the authentication process as normal. If the integrity check fails, then the present invention redirects to an install module in order to prepare to reinstall the remote file. Via the install module, the present invention then reinstalls the remote file and the user is then taken through the authentication process as normal.
    Type: Grant
    Filed: December 17, 2001
    Date of Patent: January 1, 2013
    Assignee: Citibank, N.A.
    Inventors: Steve Vlcan, Bikram S Bakshi
  • Patent number: 8347075
    Abstract: The present invention provides methods to mitigate the problems associated with MAC address spoofing and denial of service attacks in an FTTH network system. The MAC address spoofing attack may occur when a computer hacker configures his computer to change the MAC address of a data signal to deceive the receiver of the signal's source address. The denial of service may occur when a computer hacker floods a file server with data packets. The present invention mitigates these attacks by modifying the software of certain components of the FTTH network system to enable the components to insert virtual MAC addresses, tags and codes into the data packets that identify a component of the communication related to the address of the source computer.
    Type: Grant
    Filed: November 1, 2002
    Date of Patent: January 1, 2013
    Assignee: Verizon Laboratories Inc.
    Inventor: Muxiang Zhang
  • Patent number: 8341733
    Abstract: A computer implemented method, apparatus, and computer program product for creating secured file views of a protected file. The process receives a request to access the file, wherein the file is stored in a common location, and wherein the request includes a set of file viewing parameters. The process identifies a callback function associated with the file and calls the callback function with the set of file viewing parameters to form a set of virtual viewing parameters. Thereafter, the process generates a secured file view of the file using the virtual viewing parameters, wherein the secured file view is viewable by a user of an authorized partition.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: December 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Jones Craft, Eric Philip Fried
  • Patent number: 8340298
    Abstract: Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized quantum key certificate authority (QKCA) to each network user via respective secure quantum links or “Q-links” that encrypt and decrypt data based on quantum keys (“Q-keys”). When two users (Alice and Bob) wish to communicate, the QKCA sends a set of true random bits (R) to each user over the respective Q-links. They then use R as a key to encode and decode data they send to each other over the TC-link.
    Type: Grant
    Filed: April 16, 2007
    Date of Patent: December 25, 2012
    Assignee: MagiQ Technologies, Inc.
    Inventors: Robert Gelfond, Audrius Berzanskis
  • Patent number: 8341422
    Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array.
    Type: Grant
    Filed: July 20, 2006
    Date of Patent: December 25, 2012
    Assignee: Apple Inc.
    Inventors: Perry Kiehtreiber, Michael Brouwer
  • Patent number: 8336100
    Abstract: A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3) obtaining community-based reputation data for the file, 4) determining, by analyzing the reputation data, that instances of the file have been encountered infrequently (or have never been encountered) within the community, and then 5) performing a security operation on the file (by, for example, quarantining or deleting the file).
    Type: Grant
    Filed: August 21, 2009
    Date of Patent: December 18, 2012
    Assignee: Symantec Corporation
    Inventors: Adam Glick, Nicholas Graf, Spencer Smith