Data Authentication Patents (Class 713/161)
-
Patent number: 8428570Abstract: Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket that uniquely corresponds to the combination of the device and SIM card, and that is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card, and initiates activation when the verification of the activation ticket is successful.Type: GrantFiled: April 15, 2011Date of Patent: April 23, 2013Assignee: Apple Inc.Inventors: Dallas De Atley, Jeffrey Bush, Jerry Hauck, Ronald Keryuan Huang, Brainerd Sathianathan
-
Patent number: 8429426Abstract: A method for data storage includes supplying data to and from a host to a storage memory via a secure data path. A first CPU is employed to control operation of the storage memory, and a second CPU is employed to control operation of the secure data path.Type: GrantFiled: October 17, 2008Date of Patent: April 23, 2013Assignee: SanDisk IL Ltd.Inventors: Leonid Minz, Avraham Meir, Boris Dolgunov, Roy Krotman
-
Patent number: 8429414Abstract: A method of generating prevention and control data to verify validity of data to be transmitted, and an apparatus to perform the method, the method including generating the prevention and control data according to composing information of the data to be transmitted, and transmitting the prevention and control data along with the data to be transmitted to verify the validity of the data to be transmitted.Type: GrantFiled: October 28, 2005Date of Patent: April 23, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Dae-youb Kim, Weon-il Jin, Sung-ioon Park, Hwan-ioon Kim
-
Patent number: 8429748Abstract: Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description.Type: GrantFiled: November 27, 2009Date of Patent: April 23, 2013Assignee: Red Hat, Inc.Inventors: John M. Suit, Nathaniel R. Tabernero, Daniel L. Becker, Adam J. Keeton, Joshua Suereth
-
Patent number: 8429404Abstract: A system and method for discovery and/or authentication of clients to a network, particularly a managed network, substantially without requiring the client and/or access device to transmit an unencrypted address or identification.Type: GrantFiled: September 30, 2009Date of Patent: April 23, 2013Assignee: Intel CorporationInventors: Benjamin M. Greenstein, Jesse Walker
-
Patent number: 8428261Abstract: Described is a method and system for establishing an authenticated wireless communication (e.g., using Bluetooth technology) between first and second mobile devices. The first device (e.g., a mobile barcode scanner) sends a signal to establish a wireless communication with the second device. The first device includes a data capturing arrangement (“DCA”) as an only input device interface with a user thereof. The second device initiates an authentication process by requesting the first device to obtain a PIN code from the user. Once the first device obtains the PIN code from the user via the DCA, a pairing process is performed to compare the PIN code to entries in a database of authorized PIN codes. When the pairing process has been successfully completed, a link key is generated to establish the authenticated wireless communication between the first and second devices.Type: GrantFiled: June 20, 2003Date of Patent: April 23, 2013Assignee: Symbol Technologies, Inc.Inventors: Gary Schneider, Stephen J. Shellhammer
-
Patent number: 8422674Abstract: A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access. Dedicated hardware decrypts an encrypted kernel into memory for execution. When an application is to be executed, the kernel computes one or more secrets by cryptographically combining information contained in the application with secret information contained in the kernel itself. The kernel then deletes its secret information and passes the computed secrets to the application. To store data persistently in memory, the application uses one of the computed secrets to encrypt the data prior to storage. If the kernel starts another instance of the same application, the kernel (which will have been re-decrypted to restore the kernel's secrets) will compute the same one or more secrets, thus allowing the second application instance to access the data encrypted by the first application instance.Type: GrantFiled: May 29, 2007Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Masana Murase, Wilfred E. Plouffe, Jr., Kanna Shimizu, Vladimir Zbarsky
-
Patent number: 8418241Abstract: Aspects of a method and system for traffic engineering in an IPSec secured network are provided. In this regard, a node in a network may be authenticated as a trusted third party and that trusted third party may be enabled to acquire security information shared between or among a plurality of network entities. In this manner, the trusted third party may parse, access and operate on IPSec encrypted traffic communicated between or among the plurality of network entities. Shared security information may comprise one or more session keys utilized for encrypting and/or decrypting the IPSec secured traffic. The node may parse IPSec traffic and identify a flow associated with the IPsec traffic. In this manner, the node may generate and/or communicate statistics pertaining to said IPSec secured traffic based on the flow with which the traffic is associated.Type: GrantFiled: November 14, 2007Date of Patent: April 9, 2013Assignee: Broadcom CorporationInventor: Uri Elzur
-
Patent number: 8416950Abstract: An integrated circuit includes a fingerprint element and a decryption circuit. The fingerprint element generates a fingerprint, where the fingerprint is reproducible and represents an inherent manufacturing process characteristic unique to the integrated circuit device. The decryption circuit decrypts, using a decryption key that is based on the fingerprint, an encrypted data in order to extract data. In one embodiment, the propagation delay of various circuit elements are used to generate the fingerprint. In another embodiment, the specific frequency of an oscillator is used to generate the fingerprint. In yet another embodiment, a ratio of measurable values is used to generate the fingerprint. In another embodiment, differences in transistor threshold voltages are used to generate the fingerprint. In yet another embodiment, variations in line widths are used to generate the fingerprint.Type: GrantFiled: April 7, 2011Date of Patent: April 9, 2013Assignee: Xilinx, Inc.Inventor: Stephen M. Trimberger
-
Patent number: 8417958Abstract: Systems and methods for electronic postmarking of location data are provided. Electronic postmarking of location data (S.20) includes generating a hash value corresponding to merged data (S.30). Electronic postmarking further includes generating an electronic postmark data structure (S.40) comprising the hash value and a date/time stamp. The electronic postmarking data structure (S.40) may further include a digital signature.Type: GrantFiled: July 6, 2010Date of Patent: April 9, 2013Assignee: United States Postal ServiceInventor: Charles R. Chamberlain
-
Patent number: 8417259Abstract: Various aspects are disclosed herein for detection of mobile devices. Detection of mobile devices can be localized to an environment that is radio frequency enclosed. Within this environment, any packages can be scanned for the presence of mobile devices and for the interrogation of information from such mobile devices, such as the mobile device number and mobile device equipment information. The environment can contain an antenna for communicating with any mobile devices within the environment and a receiver component configured to receive information from any contacted mobile device. Based on this information, a determination can be made whether to validate a contacted mobile device or to take any alternative action.Type: GrantFiled: March 31, 2008Date of Patent: April 9, 2013Assignee: AT&T Mobility II LLCInventors: DeWayne Allan Sennett, Brian Kevin Daly
-
Patent number: 8417943Abstract: A method and apparatus is described for processing of network data packets by a network processor having cipher processing cores and authentication processing cores which operate on data within the network data packets, in order to provide a one-pass ciphering and authentication processing of the network data packets.Type: GrantFiled: October 11, 2011Date of Patent: April 9, 2013Assignee: Intel CorporationInventors: Jaroslaw J. Sydir, Kamal J. Koshy, Wajdi Feghali, Bradley A. Burres, Gilbert M. Woolrich
-
Patent number: 8411760Abstract: Presented herein are systems, methods, and apparatus for displaying pictures. In one embodiment, there is presented a decoder system for decoding video data. The decoder system comprises a port and a transport processor. The port receives packets carrying encoded video data from a plurality of video streams. The transport processor adds a header to encoded video data from at least one of the packets. The header identifies a particular one of the plurality of video streams, wherein the at least one packet is from the particular one of the plurality of video stream.Type: GrantFiled: January 28, 2010Date of Patent: April 2, 2013Assignee: Broadcom CorporationInventor: Qin-Fan Zhu
-
Patent number: 8411858Abstract: The present invention utilizes the AAA infrastructure to dynamically allocate the various parameters needed to establish the security association between the Foreign Agent and the Home Agent. The present invention uses the AAA server as a central entity to dynamically generate and distribute the chosen security association parameters needed to support the Foreign Agent and Home Agent security association based on a request from the Foreign Agent. The AAA server can also dynamically assigns a unique SPI value to the Foreign Agent and Home Agent pairs. The various parameters that can be allocated in the present invention include a FA-HA shared secret key or a public/private key pair, an authentication algorithm and mode, a FA-HA secret key lifetime, and security parameter index or security index values. The present invention also can assist in making sure that the Foreign Agent and the Home Agent stay synchronized with respect to their security association.Type: GrantFiled: March 27, 2008Date of Patent: April 2, 2013Assignee: Apple Inc.Inventors: Ahmad Muhanna, Mohamed Khalil
-
Patent number: 8412951Abstract: A control system and a security checking method thereof is used in an embedded system. The control system includes a process module and a first memory module. The first memory module is used to store a pre-loader code and a first secure key. The security checking method includes the following steps: loading the pre-loader code and the first secure key; executing the pre-loader code to download a first program from an in-system programming module; determining whether the first program corresponds to the first secure key or not; if yes, then downloading a second program from the in-system programming module; and programming an internal program and a second secure key by the second program.Type: GrantFiled: November 4, 2009Date of Patent: April 2, 2013Assignee: Socle Technology Corp.Inventors: Shao-Ping Chen, Lin-Shu Chen
-
Patent number: 8412931Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.Type: GrantFiled: December 27, 2007Date of Patent: April 2, 2013Assignee: Apple Inc.Inventors: Srinivas Vedula, Cameron Craig Morris
-
Patent number: 8405857Abstract: An image processing apparatus that is capable of preventing an unauthorized connection from a host apparatus which is not permitted to use a device by restricting a host apparatus that performs an association process by a method other than password authentication. A processing unit performs an association process with the host apparatus in order to perform the wireless communication. A storage unit stores a permitted host ID indicating the host apparatus that is permitted to perform the association process by the processing unit. A control unit compares a host ID transmitted from the host apparatus with the permitted host ID stored in the storage unit when the processing unit performs the association process, and determines whether the processing unit performs the association process based on a result of the comparison.Type: GrantFiled: March 3, 2010Date of Patent: March 26, 2013Assignee: Canon Kabushiki KaishaInventor: Hiroshi Sekine
-
Patent number: 8407141Abstract: Financial transaction data comprising payment on any one of multiple financial transaction types are processed with an adapter layer that receives an incoming data message relating to a financial transaction initiated by a payer and operates on the incoming data message to produce adapted data relating to the financial transaction, and a processor that receives the adapted data and determines transaction routing to direct the adapted data to a processing network module that requests authorization by an issuer, responds to authorization by initiating request for settlement and payment on the financial transaction to a transaction payee, and responds to payee query requests by providing non-payment data to an external payee.Type: GrantFiled: October 30, 2007Date of Patent: March 26, 2013Assignee: Visa U.S.A. Inc.Inventors: Matthew James Mullen, Mark Rockelman
-
Patent number: 8407468Abstract: One embodiment of a method of authenticating data comprises: receiving, at a device, data in a plurality of indexed packets transmitted by a data server, the data of the indexed packets being at least a portion of a larger data stream; receiving, at the device, from a data authentication server connected to the device by a network, a server-computed authentication value based on a subset of the data transmitted by the data server, the data authentication server having access to the data that was transmitted from the data server to the device; and comparing a device-computed authentication value based on a subset of the received data, corresponding to the subset of the data transmitted by the data server, with the server-computed authentication value in order to determine whether the subset of the data received at the device is authentic.Type: GrantFiled: November 18, 2011Date of Patent: March 26, 2013Assignee: Research In Motion LimitedInventors: Michael Kenneth Brown, David Francis Tapuska, Michael Stephen Brown
-
Patent number: 8407467Abstract: A ubiquitous audio reproducing and servicing method and apparatus for streaming or downloading a lossless audio source from a Content Provider (CP) using a lossy audio source card as an authentication key. The ubiquitous audio reproducing method includes determining whether a memory card storing lossy audio sources and their authentication codes is inserted, if it is determined that the memory card is inserted, transmitting an authentication code of a lossy audio source in the memory card and a system unique Identifier (ID) to a content server by connecting to the content server via a network, and if the content server allows the use of a lossless audio source corresponding to the lossy audio source using the authentication code, streaming or downloading the lossless audio source from the content server.Type: GrantFiled: June 21, 2007Date of Patent: March 26, 2013Assignee: Samsung Electronics Co., Ltd.Inventor: Jong-bae Kim
-
Patent number: 8402532Abstract: Various technologies and techniques are disclosed for providing host control of partial trust accessibility. A framework allows libraries to be identified as partial trust callers allowed to indicate that the libraries are allowed to be called from partially trusted code by default. The framework allows libraries to be identified as partial trust callers enabled to indicate the libraries could be called from partially trusted code, but not by default. A hosting application is notified that a particular library has been loaded. If the particular library has been identified as partial trust callers allowed, then a determination is received from the hosting application on whether to remove or keep partial trust accessibility for the particular library. If the particular library has been identified as partial trust callers enabled, then a determination is received from the hosting application on whether or not to enable partial trust accessibility for the particular library.Type: GrantFiled: May 10, 2007Date of Patent: March 19, 2013Assignee: Microsoft CorporationInventors: Michael D. Downen, Raja Krishnaswamy, Charles William Kaufman, James S. Miller, Stephen Fisher
-
Patent number: 8402510Abstract: A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same.Type: GrantFiled: June 20, 2006Date of Patent: March 19, 2013Assignee: Comcast Cable Holdings, LLCInventor: Mark D. Francisco
-
Patent number: 8397058Abstract: A method and system which provides communication between a first portable device and a second portable device. The first portable device stores a first sequence number and a first key, and the second portable device stores a second sequence number and a second key. Verification is performed using the first and second keys. The first sequence number is compared to the second sequence number. If the second sequence number is newer than the first sequence number, the first sequence number is set to have a value of the second sequence number if the verification succeeds. If the first sequence number is newer than the second sequence number, the second sequence number is set to have a value of the first sequence number if verification succeeds.Type: GrantFiled: July 28, 2000Date of Patent: March 12, 2013Assignee: Mondex International LimitedInventors: Kazuo J. Ezawa, Dave Roberts, Michael Foster, John Kelly
-
Patent number: 8397083Abstract: A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores an associated file key within a special metadata portion of the file. Notably, special metadata is created by a security appliance coupled to the storage system and attached to each file to thereby create two portions of the file: the special metadata portion and the main, “file data” portion. The security appliance then stores the file key within the specially-created metadata portion of the file. A cryptainer key is associated with the cryptainer. Each file key is used to encrypt the file data portion within its associated file and the cryptainer key is used to encrypt the part of the special metadata portion of each file. To delete the file from the cryptainer, the file key of the file is deleted and the special metadata portions of all other files stored in the cryptainer are re-keyed using a new cryptainer key.Type: GrantFiled: August 23, 2006Date of Patent: March 12, 2013Assignee: NetApp, Inc.Inventors: Robert Jan Sussland, Lawrence Wen-Hao Chang, Ananthan Subramanian
-
Patent number: 8392996Abstract: A method, system, computer program product and/or a computer readable medium of instructions for detecting one or more entities which are able to reinfect a processing system with malicious software. The method includes: monitoring, in the processing system, activity indicative of the malicious software reinfecting the processing system; in response to detecting the activity, storing a record of the activity and one or more entities associated with the activity; determining if the malicious software has reinfected the processing system; and in response to determining that the malicious software has reinfected the processing system, analysing the record to detect the one or more entities which were associated with the activity that caused and/or assisted in reinfecting the processing system with the malicious software. There is also disclosed a method, system, computer program product and/or a computer readable medium of instructions for detecting a variant of malicious software in a processing system.Type: GrantFiled: August 8, 2007Date of Patent: March 5, 2013Assignee: Symantec CorporationInventors: Ian Oliver, Ryan Pereira
-
Patent number: 8386782Abstract: The invention provides a method, system, device and computer program product for setting up a secure session among three or more devices or parties of a communication group, including authenticating a key agreement between the devices or parties of the communication group, wherein the devices of the group start, preferably after a key is computed or agreed, a protocol, preferably a multi-party data integrity protocol, for authenticating the key agreement.Type: GrantFiled: January 5, 2007Date of Patent: February 26, 2013Assignee: Nokia CorporationInventors: Kaisa Nyberg, Nadarajah Asokan
-
Patent number: 8386766Abstract: The present invention relates to a method and arrangements in a mobile telecommunications network including a plurality of access points (203), a plurality of 5 network gateway devices (204). The method comprising the steps of: deciding a security setting needed for a dedicated bearer signal by a network component, communicating said decision to a node needed for establishing communication, configuring or selecting by said access point (203) a secure protocol (205) as needed between said access point and said gateway devices (204), and said decision being based on one or several of the network deployment being used and/or network operator policies.Type: GrantFiled: October 17, 2007Date of Patent: February 26, 2013Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Tomas Nylander, Jari Vikberg, Oscar Zee
-
Patent number: 8380991Abstract: In the field of computer data security, a hash process which is typically keyless and embodied in a computing apparatus is highly secure in terms of being resistant to attack. The hash process uses computer code (software) polymorphism, wherein computation of the hash value for a given message is partly dependent on the content (data) of the message. Hence the computer code changes dynamically while computing each hash value.Type: GrantFiled: April 30, 2009Date of Patent: February 19, 2013Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Mathieu Ciet, Benoit Chevallier-Mames
-
Patent number: 8379854Abstract: In one embodiment, the method performed by mobile equipment to authenticate communication with a network includes generating keys using cellular authentication and voice encryption, and then generating an authentication key based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.Type: GrantFiled: October 2, 2008Date of Patent: February 19, 2013Assignee: Alcatel LucentInventor: Sarvar Patel
-
Patent number: 8374339Abstract: Method, program, network system and client device each has a structure of being given encryption information different from given present encryption information by use of the given present encryption information and being given different encryption information in incremental steps, to one or a plurality of the connection destinations (client device CLm), for security setting of wireless communication network (wireless LAN device 2) to one or a plurality of connection destinations.Type: GrantFiled: December 27, 2005Date of Patent: February 12, 2013Assignee: Fujitsu LimitedInventor: Tomonori Yasumoto
-
Patent number: 8370627Abstract: It is an object of the present invention to solve a problem included in the onion routing which is used as a confidential communication method, that if a system down occurs in a computer within a communication route, connection is not made to further components at all, or a problem that the system and the traffic become slow by using multiplexed encryption. It is a communication method in which a client of an information providing source encrypts random numbers and calculates its hash value using respective public keys of an information server to which it connects, a function server of a destination to be sent, and an information server to which the function server connects, respective servers decrypt the encrypted random number using their own secret keys to compare the random number with the hash value, and thus, the client determines whether or not the route is related to the client.Type: GrantFiled: December 30, 2008Date of Patent: February 5, 2013Assignee: University of YamanashiInventors: Haruaki Yamazaki, Hidetoshi Mino, Yoshimichi Watanabe
-
Patent number: 8370921Abstract: Packet sequence number checking through a VPN tunnel may be performed by assigning sequence numbers on a per-priority class basis to packets traversing the VPN tunnel. In one implementation, a network device may receive a packet that is to be transmitted over a VPN tunnel, the packet including control information that includes at least a QoS priority class of the packet. The network device may extract the priority class of the packet from the control information and generate a sequence value that describes an arrival sequence of the packet relative to other received packets of the same priority class as the packet. The network device may additionally generate an IPsec header for the packet, the IPsec header including the sequence value and the priority class of the packet; attach the IPsec header to the packet; and transmit the packet through the VPN tunnel.Type: GrantFiled: December 8, 2009Date of Patent: February 5, 2013Assignee: Juniper Networks, Inc.Inventors: Yifei Duan, Yufeng Zhu
-
Patent number: 8370954Abstract: Key data is generated that contains a decryption key that decrypts an encrypted content, and a policy that defines the usage restrictions on the content. Binder data is then generated, which contains the encrypted content, key data, and the control data, which describes the applied conditions of the key data.Type: GrantFiled: May 29, 2007Date of Patent: February 5, 2013Assignee: Canon Kabushiki KaishaInventor: Takeshi Takahashi
-
Patent number: 8369527Abstract: A multicast host for communicating information published about any one of a set of topics to one or more authorised subscribers to those topics, the set of topics being partitioned into one or more partition elements, each partition element having a partition element encryption key associated therewith, wherein each of the one or more partition elements is a disjoint proper subset of the set of topics, the host comprising: means for receiving information relating to a topic; means for determining a partition element for the topic; means for retrieving a partition element encryption key associated with the partition element; means for encrypting the information with the retrieved partition element encryption key; and means for communicating the information to the one or more authorised subscribers.Type: GrantFiled: June 22, 2005Date of Patent: February 5, 2013Assignee: International Business Machines CorporationInventors: Boaz Carmeli, John Justin Duigenan, Michael Damein Elder, Gidon Gershinsky
-
Patent number: 8363837Abstract: In a preferred embodiment a method of operating an intelligent disk drive is described which includes compression and/or encryption capability at the file level. The intelligent disk drive includes means for executing distributed computing tasks including a CPU and associated memory. The communication interface with the host computer or other device on the communication bus is modified to allow the device to send executable code for a task to the drive and to allow the drive to communicate the results and status information about the task to the host device. In a preferred embodiment the disk drive has a task control program, task program code, task data and status information for the distributed task. The task control program implements the basic task management functions of storing the task program, reporting results and saving progress information to allow the task to be interrupted by other drive functions.Type: GrantFiled: February 28, 2005Date of Patent: January 29, 2013Assignee: HGST Netherlands B.V.Inventor: Larry Lynn Williams
-
Patent number: 8365262Abstract: A system for automatically generating and filling login information to improve the security in storage and use of the login information. The system comprises a monitoring module, a registration module, and a login module; the monitoring module is coupled to the registration module and the login module; the monitoring module is adapted to check for an entry of login information corresponding to the identifier of the current page, and prompt a result to the user, and transmit a signal to the registration module and the login module to perform a registration and/or login operation; the registration module comprises a login information generation unit, a login information storage unit, and a first user confirmation unit; and the login module comprises a login information input unit and a second user confirmation unit. A method for the same is also disclosed.Type: GrantFiled: November 6, 2008Date of Patent: January 29, 2013Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 8365284Abstract: The invention relates to a security border node (2a) for protecting a packet-based network from attacks, comprising: an anomaly detection unit (10) for performing an anomaly detection, in particular a statistical analysis, on session control messages (11), in particular on SIP messages contained in a packet stream (5) received in the security border node (2a). The security border node further comprises a message context provisioning unit (13) for providing at least one session control message (11) to the anomaly detection unit (10) together with message context information (12, 17, 24) related to a client (22) and/or to a session (23) to which the session control message (11, 11a to 11f) is attributed. The invention also relates to a method for protecting a packet-based network from attacks, to a computer program product, and to a packet-based network.Type: GrantFiled: June 1, 2009Date of Patent: January 29, 2013Assignee: Alcatel LucentInventor: Stefan Wahl
-
Patent number: 8364965Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.Type: GrantFiled: March 15, 2006Date of Patent: January 29, 2013Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Jean-Francois Riendeau
-
Patent number: 8356233Abstract: The present disclosure provides systems and methods for inserting pseudo-noise in a data stream based on an unacceptable input data sequence in an optical network thereby preventing unnecessary loss of frame in SONET/SDH or Optical Transport Network (OTN) systems. The present disclosure includes a SONET/SDH or OTN framer, a transceiver, and a method for detecting an unacceptable data sequence or pattern and inserting a keep-alive or pseudo-noise sequence in the data sequence to maintaining framing on subsequent network elements, framers, transceivers, etc. For example, the present invention, upon receiving an unacceptable pattern of zeros or low ones density caused by a loss of signal condition or the like, may insert a pseudorandom noise pattern into the transmitted frame. This allows the downstream network element to continue a frame lock on the incoming signal, and thus keep the frame overhead and data communications channels from being lost.Type: GrantFiled: May 19, 2010Date of Patent: January 15, 2013Assignee: Ciena CorporationInventors: Jeffery Thomas Nichols, Jeffrey Scott Moynihan
-
Patent number: 8356178Abstract: A method includes: computing a first message authentication code for each of a plurality of sets of data blocks on a data storage medium, and authenticating the sets of data blocks by computing a second message authentication code for each of the sets of data blocks to be authenticated and comparing the first and second message authentication codes. An apparatus that performs the method is also provided.Type: GrantFiled: November 13, 2006Date of Patent: January 15, 2013Assignee: Seagate Technology LLCInventor: Laszlo Hars
-
Patent number: 8352731Abstract: A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of security administration in large-scale storage systems.Type: GrantFiled: April 17, 2009Date of Patent: January 8, 2013Assignee: Huazhong University of Science & TechnologyInventors: Ke Zhou, Dan Feng, Zhongying Niu, Tianming Yang, Qinhua Yan, Dongliang Lei, Wei Yan
-
Patent number: 8352732Abstract: This invention relates to a transmission method for conditional access content, in which said content is broadcast in the form of data packets (DP). These data packets contain at least one marker having a known value and a useful part (PL). This method includes the following steps: extraction of said marker (Mc) from the data packet (DP) and replacement of this marker with an encryption key identification information (PAR); encryption of said useful part (PL) by an encryption key (K1) that can be identified by said encryption key identification information (PAR); formation of an encrypted data packet containing at least said encryption key identification information (PAR) and the encrypted useful part (PLK1); transmission of said encrypted data packet to at least one receiver.Type: GrantFiled: December 14, 2006Date of Patent: January 8, 2013Assignee: Nagra France SASInventor: Thierry Lelegard
-
Patent number: 8353055Abstract: A method for upgrading a Rights Object (RO) includes: acquiring, by a Digital Rights Management (DRM) Agent, RO related information of the RO that requires updating from a Secure Removable Media (SRM) Agent; providing, by the DRM Agent, the RO related information to a Rights Issuer (RI), and obtaining a new RO from the RI; and interacting, by the DRM Agent, with the SRM Agent to upgrade the RO that requires updating on the SRM by means of the new RO. According to the embodiments of the present invention, the DRM Agent acquires RO related information which is stored on the SRM and does not have Move rights, and interacts with the RI to move the RO out from the SRM, so as to move the RO without the Move rights out from the SRM.Type: GrantFiled: July 2, 2012Date of Patent: January 8, 2013Assignee: Huawei Technologies Co., Ltd.Inventors: Renzhou Zhang, Chen Huang, Weizhong Yuan, Zhipeng Zhou
-
Patent number: 8347405Abstract: An apparatus, system, and method are disclosed for Asynchronous Java Script and XML (AJAX) form-based authentication using Java 2 Platform Enterprise Edition (J2EE). The apparatus for AJAX form-based authentication using J2EE is provided with a plurality of modules configured to functionally execute the necessary steps for redirecting an AJAX client request to an authentication required servlet, issuing an AJAX response to the client, authenticate the user security credentials, and process the client request for secure data. In addition, a method of the present invention is also presented for programming Asynchronous Java Script and XML (AJAX) form-based authentication that avoids a page change using Java 2 Platform Enterprise Edition (J2EE).Type: GrantFiled: December 27, 2007Date of Patent: January 1, 2013Assignee: International Business Machines CorporationInventor: Richard A. Backhouse
-
Patent number: 8347086Abstract: A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method automatically detects, and then self-repairs corrupt, modified or non-existent remote files. The method first performs an integrity check on a remote file and then determines whether the integrity check passed. If the integrity check passed, then the user goes through the authentication process as normal. If the integrity check fails, then the present invention redirects to an install module in order to prepare to reinstall the remote file. Via the install module, the present invention then reinstalls the remote file and the user is then taken through the authentication process as normal.Type: GrantFiled: December 17, 2001Date of Patent: January 1, 2013Assignee: Citibank, N.A.Inventors: Steve Vlcan, Bikram S Bakshi
-
Patent number: 8347075Abstract: The present invention provides methods to mitigate the problems associated with MAC address spoofing and denial of service attacks in an FTTH network system. The MAC address spoofing attack may occur when a computer hacker configures his computer to change the MAC address of a data signal to deceive the receiver of the signal's source address. The denial of service may occur when a computer hacker floods a file server with data packets. The present invention mitigates these attacks by modifying the software of certain components of the FTTH network system to enable the components to insert virtual MAC addresses, tags and codes into the data packets that identify a component of the communication related to the address of the source computer.Type: GrantFiled: November 1, 2002Date of Patent: January 1, 2013Assignee: Verizon Laboratories Inc.Inventor: Muxiang Zhang
-
Patent number: 8341733Abstract: A computer implemented method, apparatus, and computer program product for creating secured file views of a protected file. The process receives a request to access the file, wherein the file is stored in a common location, and wherein the request includes a set of file viewing parameters. The process identifies a callback function associated with the file and calls the callback function with the set of file viewing parameters to form a set of virtual viewing parameters. Thereafter, the process generates a secured file view of the file using the virtual viewing parameters, wherein the secured file view is viewable by a user of an authorized partition.Type: GrantFiled: June 20, 2007Date of Patent: December 25, 2012Assignee: International Business Machines CorporationInventors: David Jones Craft, Eric Philip Fried
-
Patent number: 8340298Abstract: Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method includes securely linking a centralized quantum key certificate authority (QKCA) to each network user via respective secure quantum links or “Q-links” that encrypt and decrypt data based on quantum keys (“Q-keys”). When two users (Alice and Bob) wish to communicate, the QKCA sends a set of true random bits (R) to each user over the respective Q-links. They then use R as a key to encode and decode data they send to each other over the TC-link.Type: GrantFiled: April 16, 2007Date of Patent: December 25, 2012Assignee: MagiQ Technologies, Inc.Inventors: Robert Gelfond, Audrius Berzanskis
-
Patent number: 8341422Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array.Type: GrantFiled: July 20, 2006Date of Patent: December 25, 2012Assignee: Apple Inc.Inventors: Perry Kiehtreiber, Michael Brouwer
-
Patent number: 8336100Abstract: A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3) obtaining community-based reputation data for the file, 4) determining, by analyzing the reputation data, that instances of the file have been encountered infrequently (or have never been encountered) within the community, and then 5) performing a security operation on the file (by, for example, quarantining or deleting the file).Type: GrantFiled: August 21, 2009Date of Patent: December 18, 2012Assignee: Symantec CorporationInventors: Adam Glick, Nicholas Graf, Spencer Smith