Intelligent Token Patents (Class 713/172)
-
Patent number: 8751800Abstract: Embodiments are directed towards providing interoperability by establishing a trust relationship between a provider of a media player usable by a consumer and a content provider. A trust relationship is verified through using a public-private key certification authority. When a request for content is received from a consumer, the request might indicate what content protection mechanisms are available in the consumer's device. When a trust relationship is determined to exist between the content provider and the media player providers, the content provider encrypts a license separately for each of a plurality of different content protection mechanisms available at the consumer's device. The encrypted licenses are provided to the consumer's device, where the media player may be selected to play the content based on a self integrity check the media player may perform, and its ability to use a private key associated with a corresponding public key to decrypt the license.Type: GrantFiled: April 2, 2012Date of Patent: June 10, 2014Assignee: Google Inc.Inventor: David Kimbal Dorwin
-
Patent number: 8751827Abstract: A method of securely operating a computerized system includes forming a connection to a user-removable physical security device (PSD) which is uniquely paired with the computerized system and which stories cryptographically secured data required for performing a protected function on the computerized system. The PSD may be realized as a USB or similar peripheral device containing security-related data and potentially security processing capability as well. The protected function could be decrypting of encrypted data encryption keys used to encrypt/decrypt user data for example. A user who has an established association with the PSD (e.g. by some preceding registration process) is authenticated, resulting in activation of the PSD on the computerized system. Upon such activation of the PSD, the computerized system engages in a security operation using the cryptographically secured data from the PSD to enable the protected function to be performed under control of the user on the computerized system.Type: GrantFiled: June 25, 2010Date of Patent: June 10, 2014Assignee: EMC CorporationInventors: William M. Duane, Robert W. Griffin, John S. Harwood, Gregory W. Lazar, Thomas E. Linnell
-
Patent number: 8752148Abstract: A processorless hardware token provides a one-time password for user authentication. The processorless hardware token contains a non-volatile memory upon which is stored a pre-produced sequence of one-time passwords. The processorless hardware token uses limited circuitry on a circuit board to read from the non-volatile memory and display a one-time password associated with a current interval. The displayed one-time password is then used for authentication by an authentication server that compares the one-time password displayed on the processorless hardware token with a one-time password retrieved from a copy of the pre-produced sequence of one-time passwords stored on the Authentication Server.Type: GrantFiled: June 25, 2012Date of Patent: June 10, 2014Assignee: EMC CorporationInventors: Edward W. Vipond, Karl Ackerman
-
Patent number: 8751815Abstract: Methods, apparatuses, and articles for receiving, by a server, a plurality of identifiers associated with a client device are described herein. The server may also encrypt a plurality of encoding values associated with the plurality of identifiers using a first key of a key pair of the server, and generate a token uniquely identifying the client device, a body of the token including the encrypted plurality of encoding values. In other embodiments, the server may receive a token along with the plurality of identifiers. In such embodiments, the server may further verify the validity of the received token, including attempting to decrypt a body of the received token with a key associated with a second server, the second server having generated the received token, and, if decryption succeeds, comparing ones of the plurality of identifiers with second identifiers found in the decrypted body to check for inconsistencies.Type: GrantFiled: October 24, 2007Date of Patent: June 10, 2014Assignee: iovation Inc.Inventors: Ron Lunde, Daniel Lulich, Greg Pierson
-
Patent number: 8745401Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authorizing actions of a service provider. In one aspect, a method includes providing a user security key to a mobile device of a user. A request is received from a client device distinct from the mobile device to perform an action. A challenge token including a security signature matched to a service security key is generated, and the challenge token is provided to the mobile device. An approval value is received from the client device. The approval value is determined to be valid in reference to the challenge token and the user security key previously provided to the mobile device and to indicate approval to perform the action for the user. The action is performed in response to receiving the approval value.Type: GrantFiled: November 12, 2010Date of Patent: June 3, 2014Assignee: Google Inc.Inventors: Andrew Hintz, Michael Wiacek
-
Patent number: 8745749Abstract: A system (and a method) are disclosed for generating a virtual secure digital (SD) card. One embodiment detects an SD card and reads a media key block and media identification for the SD card. The system stores the media key block and the media identification. The system creates a file system for secure data on a storage device for storage of secure data corresponding to a secure data area of the SD card and creates a file system for user data on the storage device for storage of user data corresponding to a user data area of the SD card. In addition, the system uses the virtual secure digital (SD) card. The system determines if the virtual SD card is provisioned and provisions it if not. The system accesses the data stored in the secure area of the provisioned virtual SD card. The system extracts the data from the secured area of the provisioned virtual SD card.Type: GrantFiled: April 1, 2011Date of Patent: June 3, 2014Assignee: Media IP, LLCInventors: Joseph P. Zipperer, John Calixto
-
Patent number: 8737623Abstract: Systems and methods for remotely loading encryption keys in card reader systems are provided. One such method includes storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein each of the first and second fingerprints includes an intrinsic magnetic characteristic of the data card, encrypting, using a first encryption key derived from the second fingerprint, information including the device identification number and first fingerprint, sending the encrypted information to an authentication server, receiving, from the authentication server, a score indicative of a degree of correlation between the first fingerprint and second fingerprint, and receiving, when the score is above a preselected threshold, a second encryption key from the authentication server, the second encryption key encrypted using a third encryption key derived from the first fingerprint.Type: GrantFiled: September 13, 2011Date of Patent: May 27, 2014Assignee: Magtek, Inc.Inventor: Annmarie D. Hart
-
Patent number: 8738926Abstract: A data processing system including a memory configured to store confidential data and non-confidential data; a cache memory which is configured to cache data stored in the memory and which comprises a first cache memory region and a second cache memory region; a processing circuit configured to carry out, in a first state of the data processing system, a cryptographic algorithm which operates on the confidential data and on the non-confidential data, wherein the confidential data are cached using the first cache memory region and the non-confidential data are cached using the second cache memory region; and an invalidating circuit configured to invalidate the first cache memory region when the data processing system switches from the first state into a second state.Type: GrantFiled: January 10, 2008Date of Patent: May 27, 2014Assignee: Intel Mobile Communications GmbHInventors: Eckhard Delfs, Gerard David Jennings
-
Patent number: 8739277Abstract: The invention relates to a process for releasing the access to a computer system or to a program for a user via a terminal (2) without software having to be installed solely for this purpose on the terminal (2). A data connection is established between a portable data carrier (1) of the user and the terminal (2). An authentication of the user is performed by the portable data carrier (1). If the authentication is successful, an access code is made available by the portable data carrier (1) for releasing the access to the computer system or to the program for a transmission via the data connection.Type: GrantFiled: December 14, 2004Date of Patent: May 27, 2014Assignee: Giesecke & Devrient GmbHInventor: Robert Müller
-
Patent number: 8739267Abstract: The disclosure relates to a method for communication between a secure information storage device and at least one third party with which information is exchanged. An entity ensures the management of a plurality of secure information storage devices to which said device pertains.Type: GrantFiled: September 7, 2005Date of Patent: May 27, 2014Assignee: France TelecomInventors: Jean-Pierre Le Rouzic, Gilles Macariot-Rat, Thierry Leclercq, Vincent Barnaud
-
Patent number: 8739266Abstract: A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a single universal authentication token can store the authentication credentials required to access a variety of resources, services and applications for a user. The universal authentication token includes a user interface, memory for storing a plurality of authentication records for a user, and a secure processor. The secure processor provides the required cryptographic operations to encrypt, decrypt, and/or authenticate data that is sent or received by universal token. For example, secure processor may be used to generate authentication data from seed information stored in memory.Type: GrantFiled: October 28, 2013Date of Patent: May 27, 2014Assignee: Broadcom CorporationInventor: Mark Buer
-
Patent number: 8739263Abstract: A communication apparatus includes a first communication unit that performs a wireless communication with two storage media that store therein association information for establishing a wireless connection and user identification information for identifying a user, respectively, and receives the association information and the user identification from the two storage media; a determination unit that performs user authentication based on the user identification information, determines whether or not to validate the association information based on the user authentication, and if the association information is determined to be valid, sets the association information; and a second communication unit that establishes a wireless connection based on the association information set by the determination unit.Type: GrantFiled: March 15, 2011Date of Patent: May 27, 2014Assignee: Ricoh Company, Ltd.Inventor: Yoshikazu Azuma
-
Patent number: 8732859Abstract: A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to receive a monitoring signal from a network plug-in device where the monitoring signal includes location and identification information associated with the network plug-in device and where the server is remote from the network plug-in device, and determine whether the network plug-in device is in an unauthorized location based at least in part on the monitoring signal. Other embodiments are disclosed.Type: GrantFiled: October 3, 2008Date of Patent: May 20, 2014Assignee: AT&T Intellectual Property I, L.P.Inventors: Mark Hlavac, William J. Riha, Jorge A. Avila
-
Patent number: 8732812Abstract: Equipment items installed on board vehicles and more particularly to a method for operating such an on-board equipment item, the method including an on-board micro software program that is executed during power-up of the on-board equipment item to achieve secure processing with the aid of sensitive security data. In particular, the method includes connecting a secure module including the sensitive security data necessary for secure processing to the on-board equipment item, and authenticating the secure module by the micro software, in such a way as to furnish the micro software with the sensitive security data for subsequent execution of the secure processing.Type: GrantFiled: October 8, 2009Date of Patent: May 20, 2014Assignee: Airbus OperationsInventor: Stephane Chopart
-
Patent number: 8724135Abstract: A first memory section stores secret keys that are identical to secret keys stored in a cartridge. A second memory section stores history information relating to a history of usage. A secret-key selecting section performs a secret-key selecting operation of selecting, based on the history information, a specific secret key from among the secret keys. A first-authentication-information generating section encrypts a random number based on the specific secret key, thereby generating first authentication information, which is stored in a third memory section. A transmitting section transmits first identification information for identifying the specific secret key and the random number to the cartridge. A receiving section receives second authentication information generated at the cartridge by encrypting the random number based on a secret key identified by the first identification information.Type: GrantFiled: March 14, 2012Date of Patent: May 13, 2014Assignee: Brother Kogyo Kabushiki KaishaInventor: Kazuhito Misumi
-
Patent number: 8726025Abstract: An enterprise system includes a storage having stored thereon a private key and a processor that is configured to receive a data object including an encrypted datum; decrypt the encrypted data based on the private key to generate a first string of digits, each digit including N bits, wherein N is a positive integer; shuffle the N bits of the each digit according a pre-determined pattern of bit positions to generate a second string of digits; and substitute a subset of the N bits of the each digit with pre-determined bits to generate a third string of digits.Type: GrantFiled: July 19, 2012Date of Patent: May 13, 2014Assignee: SAP AGInventor: Wolfgang Dittrich
-
Patent number: 8719907Abstract: A computerized authorization system configured to authorize electronically-made requests to an electronic entity. The computerized authorization system comprises a store configured to store an indication of at least one predetermined electronic authorization device configured to authorize each electronically-made request. The computerized authorization system is further configured such that: in response to receiving an electronically-made request to the electronic entity, an indication of the request is output to the at least one predetermined electronic authorization device configured to authorize the request as indicated in the store; and in response to receiving an indication of authorization from the at least one predetermined electronic authorization device, an indication of authorization of the request is output to the electronic entity.Type: GrantFiled: May 11, 2012Date of Patent: May 6, 2014Inventor: Gary Martin Shannon
-
Patent number: 8719923Abstract: The present invention provides a technique, in a network storage system, for a key management module (KMM) managing security operations within the storage server using an authenticated storage module (ASM) such as a smart card of the storage server. The KMM may process encryption key information (key information) generated by an encryption engine of the storage server to associate a key with a storage object of the storage server. The processed key information may then be stored by the KMM to a key map of the ASM, for which the ASM performs security services prior to storing information to the key map. The KMM may then request key information stored in the key map from the ASM, and forward the key information to the encryption engine for performing cryptographic operations on data of the storage object.Type: GrantFiled: February 5, 2010Date of Patent: May 6, 2014Assignee: NetApp, Inc.Inventors: Steven C. Miller, Ravi Kavuri
-
Patent number: 8719957Abstract: Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation.Type: GrantFiled: April 29, 2011Date of Patent: May 6, 2014Assignee: Altera CorporationInventor: Bruce B. Pedersen
-
Patent number: 8719906Abstract: Systems and methods for reactively authorizing publication of information by a third party are coordinated through the use of a presence server. The presence server communicates with other communication nodes/devices to determine and relay publication information. Publication requests that are initially unauthorized, from the perspective of the presence server, are resolved.Type: GrantFiled: May 28, 2009Date of Patent: May 6, 2014Assignee: Optis Wireless Technology, LLCInventors: Christer Boberg, David Cox, Mikael Klein, Sofie Lassborn, Anders Lindgren
-
Patent number: 8713691Abstract: A system which implements a method for providing attribute data. A request is received from a user device via a network for a virtual ID token relating to attribute information pertaining to a subscriber associated with the user device. A data record including L attributes of the subscriber is read from a database, L being at least 2. The data record is provided to the user device via the network. A selection of M attributes of the L attributes is received from the user device via the network, M being less than L. A virtual record including the M attributes selected from the data record is generated, the virtual record including a virtual ID (VID) for identifying the virtual record. The generated virtual record is stored in the database. The virtual ID token is provided to the user device via the network, wherein the virtual ID token includes the VID.Type: GrantFiled: January 4, 2012Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Yoshinobu Ishigaki, Masayuki Numao, Madoka Yuriyama, Yuji Watanabe
-
Patent number: 8707460Abstract: A smart wallet that can only be exclusively opened by an authorized individual through biometric authentication is disclosed. The smart wallet also has a security system associated therewith to prevent the smart wallet from being lost or stolen. The system comprises a fob key configured to send periodic wireless transmissions to the smart wallet device having the ability for approximate range detection. Various embodiments include audible, visual and vibrational indications for authentication, battery power and range detection.Type: GrantFiled: May 21, 2008Date of Patent: April 22, 2014Inventor: Steven D. Cabouli
-
Patent number: 8707043Abstract: A method and apparatus are provided for split-terminating a secure client-server communication connection when the client and server perform mutual authentication by exchanging certificates, such as within a Lotus Notes environment. When the client submits a certificate to the server, an intermediary device intercepts the certificate and submits to the server a substitute client certificate generated by that intermediary. A certificate authority's private key is previously installed on the intermediary to enable it to generate public keys, private keys and digital certificates. With the private key corresponding to the substitute certificate, the intermediary extracts a temporary key from a subsequent server message. The intermediary uses the temporary key to read a session key issued later by the server. Thereafter, the intermediary shares the session key with another intermediary, and together they use the session keys to access and optimize (e.g., accelerate) messages sent by the client and the server.Type: GrantFiled: March 3, 2009Date of Patent: April 22, 2014Assignee: Riverbed Technology, Inc.Inventors: Prashant Wason, Nitin Gupta, Robert Adler
-
Patent number: 8707049Abstract: The present invention discloses an authentication method and a key device and relates to the information security field. The authentication method comprises initiating user authentication, generating a dynamic code and then a first verification code on the basis of the dynamic code, and outputting the dynamic code, by a key device; and receiving a second verification code entered by a user via a host, and collating the second verification code with the first verification code, by the key device, and if a match is found, the user access is authorized to the key device; otherwise, the user access is prohibited. The key device comprises a trigger module, a generator module, an output module, a communication module, a collator module, a controller module and a security module. According to the present invention, better security is achieved by reducing the possibility of sensitive information disclosure and misuse in case of password theft for the key device.Type: GrantFiled: August 14, 2008Date of Patent: April 22, 2014Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 8700910Abstract: One of the objects of the present invention is to provide a communication system in which biometrics can be utilized without leaking to a third person so that a strict personal authentication can be conducted. The communication system includes, storing a correspondence table in a card, storing a reference password which is formed by converting a part of biometrics of an authorized user in the card by using the correspondence table, reading a part of biometrics of a user by the card, converting a part of the biometrics of the user into a password by the card using the correspondence table, and checking the password against the reference password by the card, wherein the card and the user are authenticated if a the password and the reference password match in the step of checking.Type: GrantFiled: May 29, 2006Date of Patent: April 15, 2014Assignee: Semiconductor Energy Laboratory Co., Ltd.Inventor: Asami Tadokoro
-
Publication number: 20140101453Abstract: A real identity biometric authentication device includes a USB thumb drive form factor, with a biometric sensor and designated device processor and stored instructions in firmware which perform authentication in a secure manner, independent of processing and storage resources on a host platform. The device and authentication process require biometric data and are secured against effects of malware or other security risks presented by applications running on the host platform. During an enrollment process, a unique encrypted enrollment biometric token is created using biometric data and uploaded securely to an authentication server. During an authentication process, the encrypted enrollment biometric token is downloaded to the real identity authentication device firmware and is decrypted on the device. The biometric data obtained from the decrypted data and is compared with live, real-time biometric data obtained from the user, for example, by a real-time fingerprint scan.Type: ApplicationFiled: October 4, 2012Publication date: April 10, 2014Applicant: MSI SECURITY, LTD.Inventor: Janarthanan Senthurpandi
-
Patent number: 8695087Abstract: Access control for a memory device is provided. In one embodiment, a portable memory device is provided comprising a storage medium comprising a private area and circuitry operative to (a) receive, from a host device, a password to unlock the host device, (b) compare the password with a password stored in the portable memory device, and (c) if the passwords match, allow the host device to access the private area. In another embodiment, a portable memory device is provided comprising a storage medium comprising a private area and a public area. The public area stores computer-readable program code to facilitate interaction with the access control features of the portable memory device. Methods for use with such memory devices are also provided. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination.Type: GrantFiled: April 4, 2008Date of Patent: April 8, 2014Assignee: SanDisk IL Ltd.Inventors: Arik Priel, Yariv Fishman, Tzvika Visman, Yaron Alterman, Mauri Liberman, Eyal Peri
-
Patent number: 8694787Abstract: A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts messages to the secured device, decrypts messages from the secured device and coordinates the encryption and decryption of data on the secured device.Type: GrantFiled: August 1, 2008Date of Patent: April 8, 2014Inventors: Christophe Niglio, Karen Flannery
-
Patent number: 8689347Abstract: A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have data stored upon them. Any operation that involves or may lead to the exchange or accessing of content (data) between a storage device and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage device, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed upon a computing station for specific user(s) and will regulate the data operations that may take place between the computing stations and storage devices based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.Type: GrantFiled: May 15, 2006Date of Patent: April 1, 2014Assignee: CryptoMill Inc.Inventors: Kha Sin Teow, Ernest Dainow, Leonid Nikolaev, Daniel Thanos
-
Patent number: 8688981Abstract: A method of logging in a health information tele-monitoring device by using a personal portable device. The method includes issuing a security key embedded in a health information tele-monitoring device to a personal portable device, storing the security key issued by the health information tele-monitoring device in the user's personal portable device; requesting the user's personal portable device to authenticate the health information tele-monitoring device in order to connect the health information tele-monitoring device to a healthcare server; and authorizing access of the health information tele-monitoring device to the healthcare server.Type: GrantFiled: September 3, 2009Date of Patent: April 1, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Byung-soo Gim, Kyu-tae Yoo, Kwang-hyeon Lee
-
Patent number: 8689291Abstract: The disclosure discloses a wireless access device (2), which includes: a wireless module (204) which establishes a wireless connection with a network, a solid state memory (203) partitioned into different storage volumes, a driver management module (202) and an enumeration management module (201). In the solid state memory, the fourth storage volume stores a bootstrap, the first storage volume stores an operating system and system management software, and the third storage volume stores encryption driver management software, device drive software and device management software. The driver management module (202) stores storage volume information.Type: GrantFiled: October 29, 2010Date of Patent: April 1, 2014Assignee: ZTE CorporationInventor: Jian Cui
-
Patent number: 8688988Abstract: Data security devices are provided which store user data and interact with terminal devices to provide information about the stored user data. Security device has memory for storing user data, an interface for transmission of data communications connectable to a data communications network, and a controller. The controller processes a request from the terminal device for information about said user data by first generating a message. The message is generated to permit verification, using secret data, that the message was generated by the controller. The controller sends the message to the terminal device for communication to a publication entity for publication of the message. The controller then receives from the terminal device a cryptographic construction. The controller checks validity of the cryptographic construction for said message, and subsequent supply of the information requested about the user data to the terminal device is then dependent on said cryptographic construction.Type: GrantFiled: February 16, 2011Date of Patent: April 1, 2014Assignee: International Business Machines CorporationInventors: Patrik Bichsel, Jan L. Camenisch, Thomas R. Gross
-
Patent number: 8688989Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.Type: GrantFiled: March 30, 2012Date of Patent: April 1, 2014Assignee: Apple Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8683205Abstract: A method begins by a processing module determining whether a data access request is requesting access to data stored in a plurality of dispersed storage networks (DSNs). The method continues with the processing module determining whether one of the plurality of DSNs is a home DSN to a requesting entity when the data access request is requesting access to data stored in the plurality of DSNs. The method continues with the processing module utilizing a local signed certificate to access one or more dispersed storage (DS) units of the home DSN, validating a global signed certificate with one or more DS units of a non-home DSN of the plurality of DSNs to produce a valid global signed certificate, and utilizing the valid signed certificate to access the one or more DS units of the non-home DSN when the plurality of DSNs includes the home DSN.Type: GrantFiled: May 11, 2011Date of Patent: March 25, 2014Assignee: Cleversafe, Inc.Inventors: Jason K. Resch, Gary W. Grube, Timothy W. Markison
-
Patent number: 8683204Abstract: An improved secure transaction system for facilitating secure transactions between devices in a network is set forth. The system includes a first device. A secure agent, adapted for encrypting and delivering a message on behalf of the first device, is provided. The secure agent has a secret key drawn at random from a large domain embedded in the agent by the first device. A second device, adapted to obtain the message, based on a session ID, from the secure agent, is provided. The second device can selectively test the truth of a corresponding message from the agent, based on querying of the first device. The testing is unknown and unpredictable to the secure agent during the transaction. In this manner, the first device and agent are kept separate to deter cheating.Type: GrantFiled: December 4, 2009Date of Patent: March 25, 2014Assignee: Alcatel LucentInventor: Vladimir Kolesnikov
-
Patent number: 8681995Abstract: Multiple peer domain name system (DNS) servers are included in a multi-master DNS environment. One of the multiple peer DNS servers is a key master peer DNS server that generates one or more keys for a DNS zone serviced by the multiple peer DNS servers. The key master peer DNS server can also generate a signing key descriptor that identifies the set of one or more keys for the DNS zone, and communicate the signing key descriptor to the other ones of the multiple peer DNS servers.Type: GrantFiled: December 21, 2010Date of Patent: March 25, 2014Assignee: Microsoft CorporationInventors: Shyam Seshadri, Jeffrey J. Westhead, Vamshi Krishna Kancharla, Daniel R. Simon, Anthony G. Jones, Frank Ronneburg, Guillaume V. Bailey
-
Patent number: 8683550Abstract: The disclosure provides a system and method of authenticating a user to a network. For the method, if a request for a resource initiated by the device is related to a restricted resource, then the method: redirects the request to the authentication server; initiates an authentication process at the server to request a user account and a password from the device to authenticate the device if it has not been authenticated; automatically provides the device with access to the restricted resource if the device previously had been authenticated to access the restricted resource; and provides a signal to the device indicating whether it has been authenticated to allow the device to update its graphical user interface to indicate an access status for the restricted resource. If the request relates to a non-restricted resource, then the method automatically provides the device with access to the non-restricted resource.Type: GrantFiled: June 3, 2011Date of Patent: March 25, 2014Assignee: BlackBerry LimitedInventor: Michael Hung
-
Patent number: 8671446Abstract: A method, a system, and a computer program product embodying computer readable code for configuring a rule file for a Web application firewall. The method includes: blocking a response created by a Web application; modifying the response by adding capturing code for capturing a regular expression and an associated parameter value embedded in the response while being executed; sending the modified response to the browser; receiving a request submitted by the browser and at least one regular expression and an associated parameter value captured by the capturing code; determining a parameter name and a regular expression associated with the same parameter value, and configuring the rule file of the firewall by use of the determined parameter name and regular expression associated with one another as a filtering rule.Type: GrantFiled: July 10, 2009Date of Patent: March 11, 2014Assignee: International Business Machines CorporationInventors: Da Ming Hao, Lin Luo, Ye Wang, Yu Zhang
-
Patent number: 8667287Abstract: Data security devices are provided which store user data and interact with terminal devices to provide information about the stored user data. Security device has memory for storing user data, an interface for transmission of data communications connectable to a data communications network, and a controller. The controller processes a request from the terminal device for information about said user data by first generating a message. The message is generated to permit verification, using secret data, that the message was generated by the controller. The controller sends the message to the terminal device for communication to a publication entity for publication of the message. The controller then receives from the terminal device a cryptographic construction. The controller checks validity of the cryptographic construction for said message, and subsequent supply of the information requested about the user data to the terminal device is then dependent on said cryptographic construction.Type: GrantFiled: September 13, 2012Date of Patent: March 4, 2014Assignee: International Business Machines CorporationInventors: Patrik Bichsel, Jan L. Camenisch, Thomas R. Gross
-
Patent number: 8667609Abstract: Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input. Some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used.Type: GrantFiled: March 14, 2013Date of Patent: March 4, 2014Assignee: Sky Castle Global LimitedInventors: Edwin Tan, Michael E St. John, Jr.
-
Patent number: 8667294Abstract: An apparatus and method for preventing falsification of a client screen is provided, in which a web server dynamically generates URIs and provides them to clients, thus preventing the falsification of client screens due to a web injection attack or a memory hacking attack. The apparatus includes a random web generation unit for converting an identical web page into random URIs that are randomly generated, at a request of a plurality of clients, generating different random web sources, and providing the different random web sources to the respective clients. A web falsification determination unit compares display web source eigenvalues respectively generated by the clients with respect to any one of the random web sources with a generative web source eigenvalue for the one of the random web sources, thus determining whether screens corresponding to the random web sources displayed on the respective clients have been falsified.Type: GrantFiled: November 23, 2011Date of Patent: March 4, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Byung-Joon Kim, Jung-Hwan Moon, Hyoung-Chun Kim, Sang-Woo Park, E-Joong Yoon
-
Patent number: 8667284Abstract: A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.Type: GrantFiled: January 13, 2012Date of Patent: March 4, 2014Assignee: Microsoft CorporationInventors: Venkataramann Renganathan, Brian Thomas Carver, Daniel Browne Jump, David Charles LeBlanc, Samuel Ira Weiss
-
Patent number: 8667276Abstract: An authentication method for authenticating an article in a device includes the steps of (a) reading an identification number stored on the article, (b) reading an authentication number stored on the article, (c) determining an input number based at least in part on the identification number, (d) applying an authentication function to the input number to calculate an output number, (e) determining that the article is authentic only if the authentication number corresponds to the output number, and (f) permitting use of the article in the device if the article is authentic, and disabling use of the article in the device if the article is not authentic.Type: GrantFiled: May 15, 2012Date of Patent: March 4, 2014Assignee: ZIH Corp.Inventors: Clive P. Hohberger, Boris Y. Tsirline
-
Patent number: 8667279Abstract: Systems and methods are provided for securely providing a place-shifted media stream from a place shifting device to a remote player via a communications network. A request for a connection is received from the remote player at the place shifting device via the communications network. In response to the request for the connection, an authorization credential is requested from a central server via the communications network. Further, in response to the authorization credential received from the central server, the place-shifted media stream between the place shifting device and the remote player can be established over the communications network. At least a portion of the place-shifted media stream may be encrypted based upon the authorization credential.Type: GrantFiled: July 1, 2008Date of Patent: March 4, 2014Assignee: Sling Media, Inc.Inventor: Padmanabha R. Rao
-
Patent number: 8660268Abstract: A method and apparatus for client authentication using a pseudo-random number generation system. The pseudo-random number generation utilizes a secret key as well as state information as input into the hash function to generate a pseudo-random number. The state information that is part of the input can be any number of prior generated pseudo-random numbers. The authentication allows for synchronization of the client and server by exchanging state information. The authentication is not dependent on any absolute time and consequently the client and servers are not required to maintain a reliable shared time base.Type: GrantFiled: April 29, 2008Date of Patent: February 25, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8661258Abstract: The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to apparatuses for generating transaction risk level approval codes. In a method according to the invention transactions are classified into a limited number of categories. A user submitting a transaction to a server is requested to also generate and submit a dynamic transaction category approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction. In an alternative method according to the invention transactions are assigned one of a limited number of risk levels. A user submitting a transaction to a server is requested to also generate and submit a dynamic risk level approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction.Type: GrantFiled: October 23, 2009Date of Patent: February 25, 2014Assignee: Vasco Data Security, Inc.Inventors: Frank Hoornaert, Dirk Marien
-
Patent number: 8661529Abstract: An information processing device includes a processing unit which performs user authentication. The processing unit includes a setting part that determines setting of operation of a target device using the user authentication. An authentication information setting part determines user authentication information. A password generation part generates a one-time password partially or fully. A transmission part transmits the setting of operation of the target device and the one-time password to the target device.Type: GrantFiled: December 21, 2011Date of Patent: February 25, 2014Assignee: Ricoh Company, Ltd.Inventor: Ryoichi Suzuki
-
Patent number: 8660530Abstract: Methods and systems are presented for remotely commanding a mobile device. In one aspect, a method includes receiving input identifying a mobile device, presenting to a user one or more remote commands corresponding to the mobile device, receiving user input selecting a remote command from the one or more presented remote commands, generating a remote command message instructing the mobile device to execute the selected remote command, and transmitting the remote command message to a server for publication in a message topic. Further, a selectable list of mobile devices associated with a remote management account can be presented to the user, the selectable list including information uniquely identifying each mobile device. Additionally, the selectable list of mobile devices can include an indication of whether an included mobile device is online.Type: GrantFiled: May 1, 2009Date of Patent: February 25, 2014Assignee: Apple Inc.Inventors: Christopher Brooke Sharp, Brendan A. McCarthy, Stuart Slack, Carsten Guenther, Jeff Lin, Rob Butler
-
Patent number: 8656303Abstract: The technology disclosed relates to certifying a webform. A Declarant desires to publish a plurality of facts it asserts about a webform's posting location. The Declarant constructs a formatted digital declaration of facts and presents it to a Certifier requesting a signed declaration of facts. The Certifier examines the declaration in accordance with its operating policy and assembles a signed declaration of facts indicating its confidence that the facts are true. A Client encounters a webform in a hypermedia document that is or might be certified and requests information from the Certifier about the facts and the Certifier's confidence that the facts are true. The Certifier presents its signed declaration of facts and confidence to the Client in a manner such that the Client can render the facts and confidence information prior to the user manipulating the webform.Type: GrantFiled: February 17, 2010Date of Patent: February 18, 2014Inventor: Larry J Hughes, Jr.
-
Patent number: 8655318Abstract: A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous operation when roaming, the mobile node identifies itself with a coded identifier instead of a public identifier. The coded identifier used at a given time includes the time-based code that is valid for that given time. To authenticate the mobile node, a serving system receives authentication information from the mobile node and forwards the authentication information to a home system. The authentication information includes the current time-based code and a timestamp. The home system identifies the mobile node from the current time-based code and the timestamp. The home system then uses the authentication information to authenticate the mobile node.Type: GrantFiled: March 27, 2013Date of Patent: February 18, 2014Assignee: Sprint Spectrum L.P.Inventors: Tong Zhou, George Jason Schnellbacher