Computer Program Modification Detection By Cryptography Patents (Class 713/187)
-
Patent number: 8776234Abstract: A method for reducing the size of the AV database on a user computer by dynamically generating an AV database according to user parameters is provided. Critical user parameters that affect the content of the AV database required for this user are determined. The AV database for the single user is generated based on the user parameters. When the parameters of the user computer change or when new malware threats are detected, the user AV database is dynamically updated according to the new parameters and the new malware threats. The update procedure becomes more efficient since a need of updating large volumes of data is eliminated. The AV system, working with a small AV database, finds malware objects more efficiently and uses less of computer system resources.Type: GrantFiled: April 20, 2011Date of Patent: July 8, 2014Assignee: Kaspersky Lab, ZAOInventor: Andrey P. Doukhvalov
-
Patent number: 8769296Abstract: A method for preventing unauthorized use of software may be achieved by executing computer-readable code with instructions for recording an indication of at least one selected file of a software application in a memory location accessible to a security component of the software application, in which software application the security component is configured to cause a hash signature of the at least one selected file to be generated in response to a signal arising from use of the software application, hashing the at least one selected file to generate a first file signature, transmitting the first file signature to a secure network-accessible computer memory for storage and subsequent comparison to at least one subsequent file signature generated via operation of the security component on a client device, comparing the first file signature to a second file signature generated by the security component in response to a signal arising from use of the software application on the client device, and disabling the soType: GrantFiled: October 13, 2010Date of Patent: July 1, 2014Assignee: Uniloc Luxembourg, S.A.Inventor: Craig S. Etchegoyen
-
Patent number: 8769684Abstract: Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting masquerade attacks is provided, the method comprising: monitoring a first plurality of user actions and access of decoy information in a computing environment; generating a user intent model for a category that includes at least one of the first plurality of user actions; monitoring a second plurality of user actions; comparing the second plurality of user actions with the user intent model by determining deviation from the generated user intent model; identifying whether the second plurality of user actions is a masquerade attack based at least in part on the comparison; and generating an alert in response to identifying that the second plurality of user actions is the masquerade attack and in response to determining that the second plurality of user actions includes accessing the decoy information in the computing environment.Type: GrantFiled: December 1, 2009Date of Patent: July 1, 2014Assignee: The Trustees of Columbia University in the City of New YorkInventors: Salvatore J. Stolfo, Malek Ben Salem, Shlomo Hershkop
-
Publication number: 20140181530Abstract: Disclosed are systems, methods and computer program products for protecting cloud security services from unauthorized access and malware attacks. In one example, a cloud server receives one or more queries from security software of the user device. The server analyzes a system state and configuration of the user device to determine the level of trust associated with the user device. The server also analyzes the one or more queries received from the security software to determine whether to update the level of trust associated with the user device. The server determines, based on the level of trust, how to process the one or more queries. Finally, the server provides responses to the one or more queries from the security software based on the determination of how to process the one or more queries.Type: ApplicationFiled: February 1, 2014Publication date: June 26, 2014Applicant: Kaspersky Lab ZAOInventors: Eldar M. Kononov, Anton S. Lapushkin, Andrey A. Efremov
-
Patent number: 8762739Abstract: In an advanced metering infrastructure environment, software program statements and/or data may be encrypted. A microcontroller unit may include a first cache configured to store a block of encrypted data obtained from an external memory device. A decryption engine may decrypt the block of encrypted data for storage in a second cache. An address alignment module may be configured to receive input from a program counter and to calculate an offset pointer. The offset pointer may indicate a particular word in the block of decrypted data within the second cache for transmission to an instruction register for use by an application program. An address generator may be configured to receive input from the address alignment module and to indicate a block of data in the external memory device to be loaded into the first cache, to thereby replace the encrypted data sent to the decryption engine.Type: GrantFiled: May 18, 2012Date of Patent: June 24, 2014Assignee: Itron, Inc.Inventors: Eric Plainecassagne, Guillaume Descamps
-
Patent number: 8763131Abstract: The security or other attributes of mobile applications may be assessed and assigned a security score. In one implementation, a device may obtain information relating to the mobile applications, and may determine, for each of the mobile applications, a number of security scores. Each of the security scores may define a level of risk for a security category relating to a mobile application. The device may further combine the security scores, for each of the mobile applications, to obtain, for each of the mobile applications, a final security score.Type: GrantFiled: May 22, 2012Date of Patent: June 24, 2014Assignee: Verizon Patent and Licensing Inc.Inventors: Steven T. Archer, Peter S. Tippett, Wade Baker, Alex Guazzelli, Gina M. Ganley
-
Patent number: 8762966Abstract: Compiled computer code comprising computer code instructions organized in a plurality of basic blocks is obfuscated by replacing a jump instruction in a first basic block with a function call with at least one parameter, wherein the function call when executed determines the address of the next function to execute in dependence on the parameter; inserting into the compiled computer code an instruction that allocates a value to the parameter, the value being such that the address determined by the function call corresponds to the address of the replace jump instruction. The allocation function is inserted into the computer code in a second basic block, different from the first basic block, preferably using information from a control flow graph. This can ensure that the obfuscated code cannot be disassembled without information from the CFG, while the CFG cannot be generated from the obfuscated code. Also provided is a device for code obfuscation.Type: GrantFiled: August 17, 2009Date of Patent: June 24, 2014Assignee: Thomson LicensingInventors: Antoine Monsifrot, Fabien Lahoudere
-
Patent number: 8763121Abstract: A method of identifying a potential attack in network traffic includes payload data transmitted to a host entity in the network. The method includes: performing a first data-check on one or more data bytes of the payload data at the host entity; performing a second data-check, equivalent to the first data-check, on data of the network equivalent to the one or more bytes of payload data; and comparing the results of the first and second data-checks to determine if there is a mismatch, the mismatch being an indication of a potential attack.Type: GrantFiled: January 20, 2011Date of Patent: June 24, 2014Assignee: F-Secure CorporationInventor: Daavid Hentunen
-
Patent number: 8756432Abstract: A computer-implemented method for detecting malicious digitally-signed applications. The method may include 1) identifying an application package file that has been digitally signed, wherein the application package file is used to distribute an application, 2) comparing the application package file to a set of known application package files, 3) determining that the application package file has been repackaged from a known application package file, 4) comparing a public key associated with a digital signature of the application package file to a public key associated with a digital signature of the known application package file, 5) determining that the public key associated with the digital signature of the application package file and the public key associated with the digital signature of the known application package file are different, and 6) performing a security action on the application. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: May 22, 2012Date of Patent: June 17, 2014Assignee: Symantec CorporationInventors: Joseph Chen, Rui Jing
-
Patent number: 8756418Abstract: A system and method of guaranteeing the presence of secure and tamper-proof remote files over a distributed communication medium, such as the Internet, is provided. The system and method automatically detects, and then self-repairs corrupt, modified or non-existent remote files. The method first performs an integrity check on a remote file and then determines whether the integrity check passed. If the integrity check passed, then the user goes through the authentication process as normal. If the integrity check fails, then the present invention redirects to an install module in order to prepare to reinstall the remote file. Via the install module, the present invention then reinstalls the remote file and the user is then taken through the authentication process as normal.Type: GrantFiled: December 27, 2012Date of Patent: June 17, 2014Assignee: Citibank, N.A.Inventors: Steve Vlcan, Bikram Singh Bakshi
-
Patent number: 8756434Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for executing encrypted computer code. A system configured to practice the method receives a request to execute encrypted computer code. In response to the request, the system identifies a portion of the encrypted computer code for execution and decrypts the portion to yield decrypted computer code. Then the system stores the decrypted computer code in a pool of memory and executes the decrypted computer code from the pool of memory. The system can store the decrypted computer code in the pool of memory based on a randomization algorithm so that identical executions of the encrypted computer code result in selections of different available memory locations within the pool of memory. Related portions can be stored non-consecutively in the pool of memory. The pool of memory can store different portions of decrypted computer code over time.Type: GrantFiled: April 8, 2011Date of Patent: June 17, 2014Assignee: Apple Inc.Inventors: Ganna Zaks, Pierre Betouin, Augustin J. Farrugia, Julien Lerouge, Jon McLachlan, Gideon M. Myles, Cédric Tessier
-
Patent number: 8752170Abstract: Independent verification of user profile attributes that are stored on third-party community-based web sites is provided. A user request indicates target profile attributes to verify. Profile attribute data concerning a profile owner is collected from a plurality of community sites. The collected data is verified, and results of the verification process are stored in a database. When a user views verified profile attributes on a page on a community site, the corresponding stored verification status is retrieved, and an indication of the trust status of the profile is output to the user, for example by modifying the displayed web page to display the trust status.Type: GrantFiled: August 20, 2008Date of Patent: June 10, 2014Assignee: Symantec CorporationInventors: Keith Newstadt, Timothy G. Brown
-
Detecting web browser based attacks using browser digest compute tests launched from a remote source
Patent number: 8752208Abstract: The detection of web browser-based attacks using browser tests launched from a remote source is described. In one example, a digest is computed based on the content of an HTTP response message. The message is modified and sent to a client device that also computes a digest. The digests are compared to determine whether content has been modified by malware on the HTTP client. The results of the test are analyzed and defensive measures are taken.Type: GrantFiled: March 23, 2012Date of Patent: June 10, 2014Assignee: Imperva Inc.Inventors: Amichai Shulman, Tal Arieh Be'ery -
Patent number: 8752182Abstract: A build process management system can acquire data pertaining to a software build process that is currently being executed by an automated software build system. The software build process can include executable process steps, metadata, and/or environmental parameter values. An executable process step can utilize a build artifact, representing an electronic document that supports the software build process. The acquired data can then be synthesized into an immutable baseline build process and associated baseline artifact library. The baseline artifact library can store copies of the build artifacts. The immutable baseline build process can include baseline objects that represent data values and dependencies indicated in the software build process. In response to a user-specified command, an operation can be performed upon the baseline build process and associated baseline artifact library.Type: GrantFiled: March 2, 2012Date of Patent: June 10, 2014Assignee: International Business Machines CorporationInventors: Yair Amit, Roee Hay, Roi Saltzman, Adi Sharabani
-
Patent number: 8751817Abstract: A data processing apparatus includes a ROM (Read Only Memory) having a validity verification program stored therein, an auxiliary storage device including a plurality of storage areas having a plurality of target verification data stored therein, an execution unit configured to perform a validity verification process on the plural target verification data in accordance with the validity verification program. An order of priority is assigned to the plural target verification data. The plural storage areas have addresses that is recognizable by the execution unit. The execution unit is configured to determine validity of each of the plural target verification data based on the order of priority until one of the plural target verification data is determined to be valid.Type: GrantFiled: October 1, 2012Date of Patent: June 10, 2014Assignee: Ricoh Company, Ltd.Inventor: Kei Kato
-
Patent number: 8745713Abstract: A system and method to prevent the installation by a hacker of malicious software onto networked electronic systems, computers, and the like, by removing the read, write and execute administrator permission files of a system's OS, and placing them in a in a separate, protected server in the cloud. The secure cloud server records the system's unique ID(s). After relocation of the authorized administrator's permissions files, a strong password is requested from the authorized administrator. Thereafter, the network path to the secure cloud server files is encrypted and recorded on the protected system. This path change replaces the former local path in the computer system to those files. The result of these changes to the OS on a protected system eliminates the hacker's access to the system from a network to illicitly become an administrator of the hacked system.Type: GrantFiled: September 7, 2012Date of Patent: June 3, 2014Assignee: Cloud Cover Safety, Inc.Inventor: Michael James Connor
-
Patent number: 8745383Abstract: Techniques for securing a client. An operating system agent is one or more software modules that execute in an operating system of a client, such as a portable computer. Portions of the operating system agent may monitor resources of the client. The operating system agent sends a message, which describes an operational state of the operating system agent, to a BIOS agent. The BIOS agent is one or more software modules operating in a BIOS of the client. The BIOS agent performs an action based on a policy that is described by policy data stored within the BIOS of the client. The BIOS agent performs the action in response to either (a) the operational state described by the message, or (b) the BIOS agent not receiving the message after an expected period of time.Type: GrantFiled: August 7, 2009Date of Patent: June 3, 2014Assignee: Absolute Software CorporationInventors: Anahit Tarkhanyan, Ravi Gupta, Gaurav Banga
-
Patent number: 8745735Abstract: To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules included in an apparatus each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server. The monitoring patterns are restructured by the update server such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.Type: GrantFiled: November 20, 2009Date of Patent: June 3, 2014Assignee: Panasonic CorporationInventors: Manabu Maeda, Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
-
Patent number: 8738924Abstract: An electronic system is provided, in which a smart chip, a smart chip controller, a processor, a system memory, and an access management module is provided. The smart chip controller communicates with the smart chip. The processor performs a mutual authentication with the smart chip. The system memory is accessible to the smart chip and the processor. The access management module is coupled between the processor and the smart chip controller. The access management module prevents the processor accessing a certain range of the system memory according to a block command from the smart chip controller, in response of that the mutual authentication between the processor and the smart chip is failed.Type: GrantFiled: April 22, 2008Date of Patent: May 27, 2014Assignee: Via Technologies, Inc.Inventors: Zhun Huang, Jiin Lai
-
Patent number: 8738974Abstract: The memory controller writes and reads data in and from a nonvolatile memory. The nonvolatile memory has a plurality of memory cell blocks, each memory cell block includes a plurality of multi-level cells each capable of storing m-bit data (m is a natural number of two or more), a first page to a m-th page are allocated to the respective m bits of the multi-level cell, the memory controller sequentially writes the data to the memory cells from the first page in ascending order, and comprises a backup unit, and when a write command is received from the outside of the memory controller, in a case where a data write destination of the data in the nonvolatile memory is a n-th (n is a natural number of two to m) page of the multi-level cell, and data is already written in the first to (n-1)th pages, the backup unit copies the already written data to a nonvolatile storable backup region.Type: GrantFiled: August 27, 2010Date of Patent: May 27, 2014Assignee: Panasonic CorporationInventor: Toshiyuki Honda
-
Patent number: 8739285Abstract: Differential scanning is disclosed. A scan collection period is determined. A system is monitored to detect object events during the scan collection period, and a scan list may be updated with information regarding objects to be scanned, based on some of the object events. Objects are scanned based on the information in the scan list. Information regarding objects associated with object events occurring outside the scan collection period may be removed from the scan list.Type: GrantFiled: October 21, 2010Date of Patent: May 27, 2014Assignee: EMC CorporationInventors: William D. Andruss, Christopher H. Claudatos, Bruce D. Leetch, Steven R. Terwilliger
-
Patent number: 8739282Abstract: Embodiments are directed towards mobile application development in a cloud-based architecture. Mobile applications may be designed to communicate with a cloud platform over a network. Mobile application developers may be enabled to submit cloud code to cloud platforms for use by mobile applications. If cloud code is provided to a cloud platform, the cloud platform may perform one or more actions to authenticate the cloud code, such as, ensuring that that the user providing the cloud code is authorized to provide the cloud code. If the cloud code is authenticated the cloud platform may perform one or more actions to validate the cloud code. If validated, the cloud code may be activated for use by mobile applications and/or mobile application developers. Activation of the cloud code may include associating the cloud code with one or more function calls and/or with one or more trigger points.Type: GrantFiled: March 14, 2013Date of Patent: May 27, 2014Assignee: Parse, Inc.Inventors: Shyamsundar Jayaraman, Henele Iitaka Adams, Bryan Jay Klimt, Jr, Kevin David Lacker, Charity Hope Majors, David Eitan Poll, Ilya Sukhar, James Jacob Yu
-
Patent number: 8736299Abstract: Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated circuit device is provided that receives configuration data and security requirement data. Control circuitry compares enabled security features in the device against the security requirements, and can configure the programmable integrated circuit device with the configuration data or prevent such configuration. Control circuitry may also use the security requirement data to set security features within the device.Type: GrantFiled: April 29, 2011Date of Patent: May 27, 2014Assignee: Altera CorporationInventor: Bruce B. Pedersen
-
Patent number: 8738931Abstract: A semantics engine is described that produces a semantically-impaired but equivalent version of the original source code that can be compiled and executed using conventional tools for commonly used programming languages. This semantically-impaired source code and the compiled assemblies it produces are incomprehensible to anyone who would attempt to read them. The semantics-impairing process is irreversible both at the source and the assembly levels and the machine code generated by the semantically-impaired source code is exactly the same as that produced by the original source code. The semantics engine achieves confidentiality without using encryption or compression. All protective modifications are made directly to copies of the original source code thereby introducing no intermediate forms of the code.Type: GrantFiled: October 21, 2013Date of Patent: May 27, 2014Inventor: Conley Jack Funk
-
Patent number: 8730008Abstract: A method of controlling an apparatus including a display and a sensor for obtaining biometric data of a user, the sensor being movable to take a plurality of angular positions with respect to the apparatus, includes storing a plurality of sets of reference information in association with the positions of the sensor, respectively, determining which one of the angular positions which the sensor is currently taking, displaying on the display a direction as to which one of bodily parts is to be used in accordance with the current angular position of the sensor to urge a user to input biometric data of the one of the bodily parts by the sensor, and carrying out authentication of the user by comparing the inputted biometric data with one of the sets of reference information corresponding to the current angular position of the sensor.Type: GrantFiled: September 17, 2009Date of Patent: May 20, 2014Assignee: Fujitsu LimitedInventor: Junji Takagi
-
Patent number: 8732455Abstract: Embodiments of the invention provide a method and a system of detecting source code in a message being sent over a digital communication network to secure against unauthorized leakage of source code. The message is intercepted on a network device, placed into a memory on the network device, and divided into one or more segments, wherein each segment includes a predetermined number of lines of text from the message. For each segment, one or more syntax rules of a programming language is applied to the segment and a predetermined number of context lines of text before the segment and/or after the segment, to determine which of the syntax rules of the programming language are matched in the segment. A determination of whether the text message includes source code is provided based on the syntax rules that were matched.Type: GrantFiled: July 25, 2008Date of Patent: May 20, 2014Assignee: Infotect Security Pte LtdInventors: Onn Chee Wong, Siew Keng Loh, Hui Yang, You Liang Wang
-
Patent number: 8732296Abstract: A system, method, and computer program product are provided for redirecting internet relay chat (IRC) traffic identified utilizing a port-independent algorithm and controlling IRC based malware. In use, IRC traffic communicated via a network is identified utilizing a port-independent algorithm. Furthermore, the IRC traffic is redirected to a honeypot.Type: GrantFiled: May 6, 2009Date of Patent: May 20, 2014Assignee: McAfee, Inc.Inventors: Vinoo Thomas, Nitin Jyoti, Cedric Cochin, Rachit Mathur
-
Patent number: 8732483Abstract: The invention described herein provides a method and system for foiling a keylogger by creating a custom keyboard driver and passing the keystrokes directly to the browser in an encrypted format. The browser (which is used to access the Internet) has a component that decrypts the keystroke before it is sent to the website. Thus the present invention enables the user to go to any website and enter sensitive information (passwords, credit card numbers, etc.) without the keystrokes being intercepted by Keyloggers. In general terms, the invention described herein provides a method and system for (1) modifying the keyboard driver, (2) encrypting the keystrokes between the keyboard driver and the browser, and (3) notifying the user if the invention has been compromised.Type: GrantFiled: October 8, 2013Date of Patent: May 20, 2014Assignee: StrikeForce Technologies, Inc.Inventor: Ram Pemmaraju
-
Patent number: 8726375Abstract: A method for preventing Domain Name System (DNS) spoofing includes: performing uppercase/lowercase conversion for letters of a DNS question field in a DNS request packet according to a preset rule; sending the DNS request packet; receiving a DNS response packet; obtaining uppercase/lowercase distribution of the letters of the DNS question field in the DNS response packet; and forwarding the DNS response packet to a target DNS client if the uppercase/lowercase distribution of the letters of the DNS question field in the DNS response packet complies with the preset rule. Corresponding to the method, a device for preventing DNS spoofing is disclosed. The method and device reduce occupation of storage resources of the device.Type: GrantFiled: June 1, 2011Date of Patent: May 13, 2014Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.Inventor: Shaobu Ma
-
Patent number: 8726383Abstract: Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion.Type: GrantFiled: February 14, 2011Date of Patent: May 13, 2014Assignee: CA, Inc.Inventor: Aaron Kenneth Blackwell
-
Patent number: 8726013Abstract: An anti-keylogger computer network system includes a servo-side host computer, with a servo software which requires the user to enter confidential data. An application-side host computer is provided and a keyboard is connected to the application-side host computer. The keys on the keyboard are divided into a data key and control key. An application software is installed in the application-side host computer to receive the instructions from the servo software, and to determine when the anti-keylogger function of the keyboard module shall be started and closed. A connection network is provided for connecting the servo-side host computer to the application-side host computer. A Translate Table program is installed in the application-side host computer and a Translate Table translation program is installed in the servo software of servo-side host computer.Type: GrantFiled: November 16, 2012Date of Patent: May 13, 2014Inventor: Chi-Pei Wang
-
Patent number: 8719585Abstract: Techniques for securely updating a boot image without knowledge of a secure key used to encrypt the boot image.Type: GrantFiled: February 11, 2008Date of Patent: May 6, 2014Assignee: Nvidia CorporationInventors: Gordon Grigor, Phillip Norman Smith
-
Patent number: 8719587Abstract: The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a private key by applying an embedding and randomizing function onto the secret, storing the private key in the memory, computing a public key using the private key, the public key and the private key forming an asymmetric cryptographic key, erasing the secret and the private key from the memory, and outputting the public key for providing the pseudonym.Type: GrantFiled: April 4, 2011Date of Patent: May 6, 2014Assignee: CompuGroup Medical AGInventors: Adrian Spalka, Jan Lenhardt
-
Patent number: 8719586Abstract: This disclosure describes systems and associated processes that provide digital rights management for applications. In some embodiments, these system and processes couple DRM protection with individual applications, rather than with a centralized service. For instance, these systems and processes can be implemented in the context of an application store or distribution service that distributes applications for purchase or for free to user devices. Developers can submit applications to the application distribution service for distribution to end users. In response to receiving an application from a developer, the application distribution service can modify the application to include DRM features. The application distribution service can accomplish this modification without input from or the knowledge of the developer. The DRM features included in the modified application can prevent or otherwise reduce copying or modifying of the application.Type: GrantFiled: March 9, 2011Date of Patent: May 6, 2014Assignee: Amazon Technologies, Inc.Inventors: Ameesh Paleja, Yael Peled, Mekka C. Okereke, Timothy E. Finer
-
Patent number: 8713326Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: GrantFiled: December 20, 2012Date of Patent: April 29, 2014Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
-
Patent number: 8713652Abstract: Systems and methods provide a gaming machine that is protected from the introduction of rogue code. One aspect of the systems and methods includes disabling a user access feature, such as a login or network access feature of an operating system executing on the gaming machine. A further aspect of the systems and methods includes removing debuggers and debugging information from an operating system or application executing on the gaming machine.Type: GrantFiled: May 5, 2005Date of Patent: April 29, 2014Assignee: WMS Gaming Inc.Inventor: Craig J. Sylla
-
Patent number: 8712035Abstract: An embodiment of the invention provides an apparatus and method for online data conversion. The apparatus and method are configured to read data that is overlapped by a window in a first position in a volume, convert the data into a converted text, write the converted text into the volume, and slide the window to a second position in the volume.Type: GrantFiled: January 31, 2008Date of Patent: April 29, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Hemant Mittal, Sundararao N. Syama, Mehmet Musa
-
Patent number: 8713677Abstract: Systems and methods for anti-phishing are disclosed. At a computing device: identifying, from a user input data stream, a first set of one or more characters, and a second set of one or more characters. The first set of characters represents a portion of first private information, and the second set of characters represents a portion of second private information. In accordance with a determination that the first set of characters and second set of characters are identified in accordance with a predefined sequential relationship, taking a protective action, prior to transmitting at least a subset of the characters of the first or second private information to a server remotely located from the computing device, to protect the first or second private information. In some implementations, the first private information includes a username, and the second private information includes a password corresponding to the username.Type: GrantFiled: July 5, 2012Date of Patent: April 29, 2014Assignee: Google Inc.Inventors: Christopher Soghoian, Kelly Caine
-
Patent number: 8713679Abstract: This document describes techniques for detection of code-based malware. According to some embodiments, the techniques utilize a collection of known malicious code and know benign code and determine which features of each type of code can be used to determine whether unclassified code is malicious or benign. The features can then be used to train a classifier (e.g., a Bayesian classifier) to characterize unclassified code as malicious or benign. In at least some embodiments, the techniques can be used as part of and/or in cooperation with a web browser to inspect web content (e.g., a web page) to determine if the content includes code-based malware.Type: GrantFiled: February 18, 2011Date of Patent: April 29, 2014Assignee: Microsoft CorporationInventors: Benjamin Goth Zorn, Benjamin Livshits, Charles M. Curtsinger, Christian Seifert
-
Patent number: 8713681Abstract: Detecting executable machine instructions in a data is accomplished by accessing a plurality of values representing data contained within a memory of a computer system and performing pre-processing on the plurality of values to produce a candidate data subset. The pre-processing may include determining whether the plurality of values meets (a) a randomness condition, (b) a length condition, and/or (c) a string ratio condition. The candidate data subset is inspected for computer instructions, characteristics of the computer instructions are determined, and a predetermined action taken based on the characteristics of the computer instructions.Type: GrantFiled: October 27, 2009Date of Patent: April 29, 2014Assignee: Mandiant, LLCInventors: Peter J. Silberman, James R. Butler, II, Nick J. Harbour
-
Patent number: 8713686Abstract: A method for detecting a malicious program infection includes scanning data to determine whether the data exhibits one or more particular symptoms of being infected with a malicious program and, in response to determining that the scanned data exhibits the symptoms of being infected with a malicious program, comparing the scanned data to known-good data. The method also includes initiating remedial action in response to determining that the scanned data does not match the known-good data.Type: GrantFiled: January 25, 2006Date of Patent: April 29, 2014Assignee: CA, Inc.Inventor: John P. Kane
-
Patent number: 8713683Abstract: Security arrangements for a universal serial bus (USB) protocol stack of a USB host system are provided. The security arrangements prevent an unauthorized or suspicious USB device from communicating with the host system, detect suspicious activity originating from a device which is already communicating with the host system and may provide notification to a user.Type: GrantFiled: January 31, 2012Date of Patent: April 29, 2014Assignee: MCCI CorporationInventors: Terrill M. Moore, John I. Garney, Salvatore Gregory Scaffidi, Jr., Christopher Jay Yokum
-
Publication number: 20140115343Abstract: A disc stores therein a computer program and encrypted information. A BIOS is executed at the time of start-up and starts the computer program. A TPM is connected to the BIOS by a low-speed bus. The TPM includes a register for storing data. A blob stores therein true hash values of the computer program and the BIOS in advance. The BIOS includes a hash value calculating unit that calculates hash values of the computer program and the BIOS and stores those hash values in the register. The TPM compares the hash values stored in the register with the hash values stored in the blob and decrypts information in the blob if the hash values agree with each other.Type: ApplicationFiled: December 20, 2013Publication date: April 24, 2014Inventor: Naoya OHHASHI
-
Publication number: 20140115342Abstract: A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information storage medium are recorded in a content hash table and are stored on the information storage medium together with the content. An information processing apparatus for executing content playback executes hash-value comparison processing based on one or more randomly selected hash values. Regardless of the data amount of content, the configuration can perform hash-value determination and comparison processing based on hash units having a small amount of data, so that user equipment for executing content playback can perform efficient content verification.Type: ApplicationFiled: December 20, 2013Publication date: April 24, 2014Inventors: Kenjiro Ueda, Tateo Oishi, Yoshitomo Osawa, Katsumi Muramatsu, Motoki Kato, Yoshikazu Takashima
-
Patent number: 8707403Abstract: The present application provides a subscription interface positioned between client devices and third-party digital subscription providers. The subscription interface allows multiple different publication-related applications (e.g., Sports Illustrated, Time magazine, etc.) running on different client devices (e.g., tablets, desktop computers, laptop computers, smart phones, etc.) to obtain a list of digital issues available from an associated third-party digital subscription provider based on entitlements of the user of the client device. The subscription interface ensures that the application receives the list and associated metadata in a desired format for that particular application on a particular client device.Type: GrantFiled: August 10, 2011Date of Patent: April 22, 2014Assignee: Time Inc.Inventors: Jonathan C. Malat, Justin V. Raimo, Matthew K. Luther, Abraham Cytryn, F. Jason Stein, Dennis B Golovaty, Robert Ferreira, Leon M. Misiukiewicz
-
Patent number: 8707424Abstract: A method for making secure execution of a computer program includes the following steps: stacking a predetermined value in a pile of instructions of the program; and stack popping the pile, the stack popping step being adapted, as the case may be, to enable detection of an anomalous execution.Type: GrantFiled: July 6, 2004Date of Patent: April 22, 2014Assignee: Oberthur TechnologiesInventors: Jean-Bernard Fischer, Hugues Thiebeauld De La Crouee
-
Patent number: 8707050Abstract: A method of running an application in a process virtual machine (PVM) on a computing device using a dynamically-linked module (DLM) with an integrity self-check feature is provided. The DLM is written in PVM-native bytecode, and the PVM is configured to execute applications stored as PVM-native bytecode within a single code file associated with that application. The method includes (a) dynamically linking the application to the DLM by loading the PVM-native bytecode of the DLM from a resource file separate from the single code file of the application, (b) performing the integrity self-check feature on the DLM to ensure the integrity of the PVM-native bytecode of the DLM, and (c) in response to the DLM passing the integrity self-check, calling functions of the DLM from within the application. Embodiments directed to analogous computer program products and apparatuses are also provided.Type: GrantFiled: December 23, 2011Date of Patent: April 22, 2014Assignee: EMC CorporationInventors: Peter A. Robinson, Stefan Pingel, Jaimee Brown, Geetu Preet Sandhu
-
Publication number: 20140108812Abstract: Systems and methods enabling parallel processing of hash functions are provided. A data string including a plurality of pieces arranged in an order is hashed using a hash function to determine a plurality of authentication checkpoint hashes associated with the pieces. To authenticate the data string, the pieces are grouped into sets, and the authentication checkpoint hash associated with the piece following all other pieces of that set in the order is associated with that set. The system simultaneously performs a separate hash process on each set. That is, the system hashes the pieces of that set using the hash function to determine a result hash, and compares that result hash with the authentication checkpoint hash associated with that set. The initial input to the hash function for the hash process for each set includes one of the pieces and either a default seed or an authentication checkpoint hash.Type: ApplicationFiled: December 24, 2013Publication date: April 17, 2014Applicant: IGTInventor: Bryan D. Wolf
-
Patent number: 8700915Abstract: A method and system for verifying authenticity of at least part of an execution environment for executing a computer module is provided. The computer program module is operative to cause processing of digital input data in dependence on a plurality of predetermined digital parameters. At least part of one of the plurality of predetermined digital parameters is driven from the at least part of the execution environment.Type: GrantFiled: July 4, 2007Date of Patent: April 15, 2014Assignee: Irdeto Corporate B.V.Inventors: Wilhelmus Petrus Adrianus Johannus Michiels, Paulus Mathias Hubertus Mechtildis Antonius Gorissen
-
Patent number: 8694794Abstract: A method for protecting a privilege level of a system management mode (SMM) of a computer system is disclosed. A SMM program is loaded into a special memory (SMRAM) area within a system memory of a computer. A first program, a second program, and a vector table are loaded into a general area of the system memory. Before the booting process of the computer has been completed, a reference hash value of the first program is determined by the SMM program, and the reference hash value is stored in the SMRAM area. A hash value of the first program is the computed by the SMM program. After the computer has been operating under an operating environment of an operating system, the computed hash value is compared to the reference hash value. When the computed hash value matches the reference hash value, the first program is called by the SMM program.Type: GrantFiled: September 2, 2010Date of Patent: April 8, 2014Assignee: Lenovo (Singapore) Pte Ltd.Inventors: Norihito Ishida, Toyoaki Inada, Eitaroh Kasamatsu, Noritoshi Yoshiyama