Upgrade/install Encryption Patents (Class 713/191)
-
Patent number: 8850223Abstract: An inventive apparatus that integrates the operation of a hard disk emulator and a cryptographic accelerator on a single blade server card. An application with cryptographic operations can off load computationally intensive calculations to the cryptographic accelerator so that the speed at which the application performs actions can be increased significantly. Typically, the hard disk emulator is a flash memory component and the accelerator can perform at least modular exponentiation calculations. One bus is employed for communication between the hard disk emulator and the accelerator. Another bus is employed to communicate with other resources off the card. Often, the card is configured to operate as one of a several blade servers in a chassis.Type: GrantFiled: December 20, 2002Date of Patent: September 30, 2014Assignee: F5 Networks, Inc.Inventors: Brett Helsel, Ryan C. Kearny, Greg Davis, David D. Schmitt
-
Patent number: 8850197Abstract: A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical network unit (ONU) via an ONU management control interface (OMCI) channel, wherein the attributes provide security features for the ONU and an optical line terminal (OLT). Also included is an apparatus comprising an ONU configured to couple to an OLT and comprising an OMCI ME, wherein the OMCI ME comprises a plurality of attributes that support a plurality of security features for transmissions between the ONU and the OLT, and wherein the attributes are communicated via an OMCI channel between the ONU and the OLT and provide the security features for the ONU and the OLT.Type: GrantFiled: July 27, 2010Date of Patent: September 30, 2014Assignee: Futurewei Technologies, Inc.Inventor: Frank J. Effenberger
-
Patent number: 8843739Abstract: An anti-tamper hardware security device that communicates with a host machine, including a host interface coupled to the host machine and configured to receive an access request from the host machine, the access request being associated with an application; a key manager configured to manage cryptographic keys; a whitelist manager configured to manage application validation information; and a controller configured to receive the access request from the host interface, validate the application using the application validation information, retrieve a cryptographic key associated with the application, and transmit a response to the host machine through the host interface if the controller determines that the application is valid.Type: GrantFiled: October 2, 2012Date of Patent: September 23, 2014Assignee: Lockheed Martin CorporationInventors: Mathew L. Vanderpol, Kyle A. Borowski
-
Patent number: 8837717Abstract: A system and method for non-retained electronic messaging is described. In one embodiment, the system includes a message receiver module, a message storing and identifier generation module, a message retrieval module and an expunging module. The message receiver module receives a message. The message storing and identifier generation module stores the message in a non-transitory, non-persistent memory of one or more computing devices, generates a message identifier and sends the message identifier to a recipient device. The message retrieval module receives a selection of the message identifier from the recipient device, retrieves the message from the non-transitory, non-persistent memory, and sends the message to the recipient device for presentation. The expunging module expunges the message from the one or more devices responsive to sending the message to the recipient device for presentation.Type: GrantFiled: March 15, 2013Date of Patent: September 16, 2014Inventor: John R. Thorpe
-
Patent number: 8838966Abstract: In one embodiment, a computing apparatus that receives respective unique identifiers corresponding to a machine and a diagnostic tool and a requested parameter setting for configuring a machine component residing in the machine, and provides an authorization code with a payload comprising the requested parameter setting, the payload encrypted based on the unique identifiers.Type: GrantFiled: September 27, 2010Date of Patent: September 16, 2014Assignee: AGCO CorporationInventors: Joshua A. Tolle, Ty D. Klein, Gerald R. Johnson, Josh W. Russell
-
Patent number: 8832456Abstract: A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.Type: GrantFiled: April 13, 2012Date of Patent: September 9, 2014Assignee: McAfee, Inc.Inventors: Manabendra Paul, Abhilash Chandran
-
Patent number: 8826038Abstract: Circuits, methods, and apparatus that prevent detection and erasure of encoding or encryption keys. These encoding keys may be used to encode a configuration bitstream or other data for an FPGA or other device. An exemplary embodiment of the present invention masks a first key to form an encoding key in order to prevent detection of the first key. In a specific embodiment, the first key is encoded using a second key. The encoded key is used to encode a configuration bitstream or other data. The encoded key is stored on an FPGA or other device. When the device is to be configured, the encoded key is retrieved and used to decode the bitstream or other data. A further embodiment stores an encryption key in a one-time programmable memory (OTP) array to prevent its erasure or modification. The encoding key may be further obfuscated before storage.Type: GrantFiled: May 18, 2012Date of Patent: September 2, 2014Assignee: Altera CorporationInventors: Martin Langhammer, Juju Joyce, Keone Streicher, David Jefferson, Srinivas Reddy, Nitin Prasad
-
Patent number: 8819446Abstract: A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected from other software on the computer system.Type: GrantFiled: June 26, 2009Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventor: Richard Harold Boivie
-
Patent number: 8819781Abstract: A method of managing devices in a dispersed data storage network is disclosed. A device list is maintained including entries for every device in the dispersed data storage network. Each entry lists a public key, a network address, and hardware identifier for the corresponding device. On startup each device sends a request to join the network. The request includes the device's public key, network address, and hardware identifier. The request is compared with the device list, and, based on the comparison, and, in some cases, administrator action, the request is granted or denied.Type: GrantFiled: April 20, 2009Date of Patent: August 26, 2014Assignee: Cleversafe, Inc.Inventors: Sanjaya Kumar, Steve Hoffman, Bart Cilfone
-
Patent number: 8813235Abstract: An instance of a vulnerability risk management (VRM) module and a vulnerability management expert decision system (VMEDS) module are instantiated in a cloud. The VMEDS module imports scan results from a VRM vulnerability database and saves them as vulnerabilities to be reviewed in a VMEDS database. The VMEDS module converts vulnerabilities into facts. The VMEDS module builds a rule set in the knowledge base to verify whether certain vulnerabilities are false positives. Rules related to a vulnerability are received in plain English from a web-based front-end application. The VMEDS module tests each rule against all of the facts using the Rete algorithm. The VMEDS module executes the action associated with the rule derived from the Rete algorithm. The VMEDS module stores the results associated with the executing of the action in the VMEDS database and forwards the results to the VRM module.Type: GrantFiled: August 10, 2012Date of Patent: August 19, 2014Assignee: NopSec Inc.Inventor: Michelangelo Sidagni
-
Patent number: 8812827Abstract: A Wi-Fi router with an integrated configuration touch-screen, and method to use this integrated touch screen to provide enhanced security features. The Wi-Fi router, which has a wired or optical network interface, may be factory pre-configured with hard to anticipate passwords and encryption codes, thus making even its default Wi-Fi settings difficult to attack. Besides displaying interactive menus on the touch-screen, the router may also generate touch sensitive dynamic alphanumeric virtual keypads to enable administrators to interact with the device without the need of extra computers or software. Inexperienced administrators secure in the knowledge that they may access and change even difficult to remember security settings at any time through the built-in touch-screen controller and simplified user interface, are encouraged to set up secure Wi-Fi systems. The device may optionally include security software that, upon touch of a button, can provide new randomized or otherwise obfuscated router settings.Type: GrantFiled: September 29, 2013Date of Patent: August 19, 2014Inventor: Rammohan Malasani
-
Patent number: 8806648Abstract: Automatically classifying security vulnerabilities in computer software applications by identifying candidate security vulnerabilities in a learning set including at least a first computer software application, classifying each of the candidate security vulnerabilities using predefined classifications, determining, for each of the candidate security vulnerabilities, values for predefined properties, creating a set of correlations between the property values and the classifications of the candidate security vulnerabilities, identifying a candidate security vulnerability in a second computer software application, determining, for the candidate security vulnerability in the second computer software application, values for the predefined properties, and using the set of correlations to classify the candidate security vulnerability in the second computer software application with a classification from the predefined classifications that best correlates with the property values of the candidate security vulnerabiliType: GrantFiled: September 11, 2012Date of Patent: August 12, 2014Assignee: International Business Machines CorporationInventors: Lotem Guy, Daniel Kalman, Omer Tripp, Omri Weisman
-
Patent number: 8776234Abstract: A method for reducing the size of the AV database on a user computer by dynamically generating an AV database according to user parameters is provided. Critical user parameters that affect the content of the AV database required for this user are determined. The AV database for the single user is generated based on the user parameters. When the parameters of the user computer change or when new malware threats are detected, the user AV database is dynamically updated according to the new parameters and the new malware threats. The update procedure becomes more efficient since a need of updating large volumes of data is eliminated. The AV system, working with a small AV database, finds malware objects more efficiently and uses less of computer system resources.Type: GrantFiled: April 20, 2011Date of Patent: July 8, 2014Assignee: Kaspersky Lab, ZAOInventor: Andrey P. Doukhvalov
-
Patent number: 8776212Abstract: A router is placed between a protected computer and devices with which the computer communicates, including peripherals and other computers. The router includes a list of authorized devices that are permitted to send data to the protected computer, against which requests to send data are checked. The router also communicates with a remote authentication service to authenticate devices requesting such permission. The authentication service may be a cloud-based identity service.Type: GrantFiled: December 13, 2011Date of Patent: July 8, 2014Assignee: SurIDx, Inc.Inventor: Norman Schibuk
-
Patent number: 8762741Abstract: Anonymous information sharing systems and methods enable communication of information to parties in a privacy-preserving manner such that no one other than the designated parties can know the source, recipient, and content of the information. Furthermore, the communication can be accomplished without requiring trial decryption, and protection can be provided against of sharing of privileges.Type: GrantFiled: January 29, 2009Date of Patent: June 24, 2014Assignee: Microsoft CorporationInventors: Melissa E. Chase, Sze Ming Chow, Seny Fakaba Kamara
-
Publication number: 20140164789Abstract: A single or multicore processor having a separate hardware cryptographic engine (HCE) for microcode patch updates is presented. Microcode in each core is modified to utilize the HCE for patch updates. Various arrangements are presented. Memory for HCE processing can include shared L2 or L3 memory or a separate DRAM configured in the address space of each core or set of cores and the HCE. In some embodiments, the HCE may be located on a circuit card attached to an extension bus, such as a PCIe or LPC bus.Type: ApplicationFiled: December 7, 2012Publication date: June 12, 2014Inventor: David A. Kaplan
-
Patent number: 8751798Abstract: A system and method of providing universal digital rights management system protection is described. One feature of the invention concerns systems and methods for repackaging and securing data packaged under any file format type, compression technique, or digital rights management system. Another feature of the invention is directed to systems and methods for securing data by providing scalability through the use of modular data manipulation software objects.Type: GrantFiled: March 16, 2010Date of Patent: June 10, 2014Assignee: Intel CorporationInventors: Jeffrey M. Ayars, Bradley D. Hefta-Gaub, Daniel Sheeran
-
Patent number: 8745406Abstract: The invention provides for a method of encrypting and executing an executable image, comprising; flagging sections of the executable image to be encrypted using commands in source files and compiling said executable images so as to generate object files, linking one or more of said executable images using a linker to produce a final executable image, passing said linked executable images to a post-linker encryption engine to encrypt a relocation fix-up patch table and sections of executable images flagged for encryption, and at load time decrypting relocating and executing the executable images.Type: GrantFiled: October 10, 2006Date of Patent: June 3, 2014Assignee: Nytell Software LLCInventor: Colin King
-
Patent number: 8736299Abstract: Systems and methods are disclosed for allowing security features to be selectively enabled during device configuration. For example, a programmable integrated circuit device is provided that receives configuration data and security requirement data. Control circuitry compares enabled security features in the device against the security requirements, and can configure the programmable integrated circuit device with the configuration data or prevent such configuration. Control circuitry may also use the security requirement data to set security features within the device.Type: GrantFiled: April 29, 2011Date of Patent: May 27, 2014Assignee: Altera CorporationInventor: Bruce B. Pedersen
-
Patent number: 8732484Abstract: An information processing apparatus which updates a basic software package is disclosed. The information processing apparatus includes an encryption and decryption unit which stores values calculated uniquely from software and encrypts information based on the calculated values and decrypts encrypted information based on the calculated values. The basic software package includes a firmware authenticating module for authenticating a firmware updating file which includes new software for updating the basic software package, a value uniquely calculated from the new software, and a public key signature. The information processing apparatus further includes a software updating module which updates the basic software package by using the authenticated firmware updating file, and an encryption key managing module for encrypting again the information encrypted by the values based on a value changed by updating the basic software package.Type: GrantFiled: November 13, 2012Date of Patent: May 20, 2014Assignee: Ricoh Company, Ltd.Inventor: Hidekazu Segawa
-
Patent number: 8725995Abstract: A computer-implemented method for updating system-level services within read-only system images may include (1) executing, during initialization of a mobile computing device, an update service stored within a read-only system image located on the mobile computing device, (2) identifying, via the update service, a writable partition located on the mobile computing device, (3) identifying, via the update service, a digitally signed update within the writable partition for at least one system-level service stored within the read-only system image, and (4) executing, via the update service, the digitally signed update within the writable partition instead of the system-level service stored within the read-only system image. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 4, 2013Date of Patent: May 13, 2014Assignee: Symantec CorporationInventors: Sean Kim, Paul Sangster
-
Patent number: 8726035Abstract: Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a second encryption algorithm to yield a second bit stream. This second bit stream is then associated with a second decryption algorithm. This second bit stream can then be decrypted by an intended recipient using associated keys.Type: GrantFiled: May 27, 2010Date of Patent: May 13, 2014Assignee: Krimmeni Technologies, Inc.Inventor: William V. Oxford
-
Patent number: 8719927Abstract: Technologies are generally described for data filtering for communication devices. In one example, a method of receiving data from a data source on a communication device is disclosed. The method includes determining, at the communication device, a domain name of the data source. The method also includes determining, at the communication device, one or more communication networks the communication device is connected to. The method further includes processing, at the communication device, the domain name for acceptance based on the one or more connected communication networks. The method also includes receiving the data from the data source, at the communication device, if the domain name is accepted.Type: GrantFiled: September 28, 2010Date of Patent: May 6, 2014Assignee: Empire Technology Development LLCInventors: Hidayah Hassan-Le Neel, Olivier Pierre Marie Le Neel
-
Patent number: 8713327Abstract: A circuit for enabling communication of cryptographic data in an integrated circuit is disclosed. The circuit comprises a first interface coupled to receive data having a first security level; a second interface coupled to receive data having a second security level; a cryptographic application; and a routing block coupled between the first and second interfaces and the cryptographic application, the routing block comprising configurable logic, wherein the routing block is configurable to selectively route the data having the first security level by way of the first interface and to route data having the second security level by way of the second interface. A method of enabling communication of cryptographic data in an integrated circuit is also disclosed.Type: GrantFiled: February 2, 2009Date of Patent: April 29, 2014Assignee: Xilinx, Inc.Inventors: Edward S. Peterson, Jason J. Moore
-
Patent number: 8707435Abstract: The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U1) entering into a security domain (SD), the general trust center (TC) distributing to the node at least one keying material share corresponding to the entered security domain, and upon detecting corruption of at least two security domains, determining, for each security domain, based on information registered by the base station (BTS), a respective set of nodes having received keying material corresponding to said security domain,—comparing the respective sets of nodes and identifying the common nodes as being compromised.Type: GrantFiled: May 28, 2010Date of Patent: April 22, 2014Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Klaus Kursawe
-
Patent number: 8707438Abstract: Techniques for providing storage for electronic records are described herein. According to one embodiment, a command is received from a client through an interface of a storage system. An approval is received from an authorization agent associated with the storage system for the received command. In response to the approval received from the authorization agent for the received command, an operation associated with the received command is performed. Other methods and apparatuses are also described.Type: GrantFiled: October 9, 2008Date of Patent: April 22, 2014Assignee: EMC CorporationInventor: Windsor W. Hsu
-
Patent number: 8701193Abstract: A method, article of manufacture, and apparatus for efficiently processing information are disclosed. In some embodiments, a first signature index is received. The first signature index is compared to a second signature index. A negative signature match is based on the comparison. A file is flagged based on the negative match.Type: GrantFiled: September 30, 2009Date of Patent: April 15, 2014Assignee: EMC CorporationInventor: Steven Thomas Wong
-
Patent number: 8699542Abstract: A spread spectrum modulation unit (12) performs spread spectrum clocking processing for a basic clock signal (BC) synchronized with the carrier frequency or its harmonic frequency of image information leaked from an unwanted electromagnetic wave. A modulation pattern generation unit (13) generates and outputs, as a modulation pattern signal (MP), a PN code having sign bit data synchronized with each pulse of the obtained spread spectrum clock signal SC. In addition, the modulation pattern generation unit (13) resets the repetition period of the PN code based on a horizontal sync signal (H). A modulated clock generation unit (14) modulates the spread spectrum clock signal (SC) in accordance with the modulation pattern signal (MP). The obtained modulated clock signal (MC) is amplified, generating a leakage prevention signal (JC). A leakage prevention signal containing a sideband component of a satisfactory level can be generated, obtaining a useful leakage prevention effect.Type: GrantFiled: July 16, 2010Date of Patent: April 15, 2014Assignees: NTT Advanced Technology Corporation, Nippon Telegraph and Telephone CorporationInventors: Toshinori Mori, Ryo Ishikawa, Hitoshi Nobata, Yasunao Suzuki
-
Patent number: 8694589Abstract: Methods and systems for saving draft electronic communications, such as web e-mails, are described herein. One such described method comprises automatically saving a draft web-email in the e-mail web page. A second such described method comprises saving a draft web e-mail in a cookie residing on the client machine. A third such described method comprises automatically saving a draft web e-mail at the host that provides the Web e-mail service. A fourth such described method comprises interacting with a central installed client component to save a draft web e-mail one the user's machine at the client side.Type: GrantFiled: March 31, 2005Date of Patent: April 8, 2014Assignee: Google Inc.Inventors: Paul T. Buchheit, Jing Yee Lim, Sanjeev Singh
-
Patent number: 8689006Abstract: A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.Type: GrantFiled: April 13, 2012Date of Patent: April 1, 2014Assignee: McAfee, Inc.Inventors: Manabendra Paul, Abhilash Chandran
-
Patent number: 8683226Abstract: Systems and methods for automatically provisioning devices that do not include or cannot provide a unique hardware identifier over a machine-to-machine network. A device or application may provide a server with a non-unique provisioning identifier during restricted communication between the server and the device. In response to receiving a provisioning identifier from a device, a server may generate a globally unique device identifier associated with the provisioning identifier for the individual device, and transmit the unique identifier to the device. The device may retain the unique identifier for future transactions. A request may be provided to a user, at the device, the server or any other interface, requesting that a newly identified device be authenticated. Upon authentication the device may communicate with the server with additional interactions that were not provided after provisioning and before authentication.Type: GrantFiled: July 16, 2012Date of Patent: March 25, 2014Assignee: Digi International Inc.Inventors: Christopher Glen Popp, Adam D. Dirstine
-
Patent number: 8677149Abstract: A system and method for modifying material related to computer software. The system receives an original disclosure for a software system. A masquerading algorithm is applied to the original disclosure to generate a new disclosure. The subject matter of the new disclosure is different from the original disclosure but has the same functionality. The system also receives original source code for the software system and applies a camouflaging algorithm to the original source code to generate modified source code and conversion data for converting between the modified source code and the original source code.Type: GrantFiled: December 12, 2011Date of Patent: March 18, 2014Assignee: C3S Pte. Ltd.Inventors: Ta Chun Yun, Viet Thang Nguyen
-
Patent number: 8667580Abstract: A system may include a memory having a unique identifier that uniquely identifies the memory. A package may be communicatively coupled to the memory. The package may include a processor, an identifier storage, and a boot storage. The identifier storage may store the unique identifier from the memory. The boot storage may include instructions to control booting of the processor based on the unique identifier in the identifier storage.Type: GrantFiled: November 15, 2004Date of Patent: March 4, 2014Assignee: Intel CorporationInventors: Dhiraj Bhatt, Eric Auzas
-
Patent number: 8656184Abstract: An application packaging device is provided, which comprises a decryption component configured to decrypt each of a plurality of applications, a replication component configured to replicate an end user license agreement included in each of the plurality of decrypted applications, and a component configured to package respective replicas of the end user license agreements and the plurality of applications before the decryption so as to obtain an application package.Type: GrantFiled: March 10, 2010Date of Patent: February 18, 2014Assignee: Canon Kabushiki KaishaInventor: Hiroyasu Miyazawa
-
Patent number: 8650406Abstract: A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory.Type: GrantFiled: February 27, 2012Date of Patent: February 11, 2014Assignee: International Business Machines CorporationInventors: Michael Backes, Shmuel S Ben-Yehuda, Jan Leonhard Camenisch, Ton Engbersen, Zorik Machulsky, Julian Satran, Leah Shalev, Ilan Shimony, Thomas Basil Smith, III, Michael Waidner
-
Patent number: 8650636Abstract: In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen 172 may display a personalized digital image 310. A user input device 160 may receive a user drawing set executed by a user over the personalized digital image 310. A processor 120 may authenticate access to the user session if the user drawing set matches a library drawing set associated with the user.Type: GrantFiled: June 17, 2011Date of Patent: February 11, 2014Assignee: Microsoft CorporationInventors: Jeff Johnson, Steve Seixeiro, Zachary Pace, Giles van der Bogert, Sean Gilmour, Levi Siebens, Ken Tubbs
-
Patent number: 8645717Abstract: A mechanism for creating secure storage for firmware for a computing device. A designated secure storage area holding firmware that is executable prior to a loading of an operating system for the computing device is created during a build of a ROM image. The creating marks one or more files as requiring encrypted storage and the one or marked files are combined during the build into the designated secure storage area. The designated secure storage area is located outside the ROM image and includes, during the build of the ROM image, a reference to the designated secure storage area in a build of firmware placed in the ROM image. The reference includes a flag indicating a current encrypted status of the designated secure storage area.Type: GrantFiled: April 18, 2012Date of Patent: February 4, 2014Assignee: Insyde Software Corp.Inventor: Rex A. Flynn
-
Patent number: 8639942Abstract: An information processing apparatus, a software update method, and an image processing apparatus capable of encrypting and decrypting information using values uniquely calculated from booted primary modules or booted backup modules with less effort are disclosed. The information processing apparatus includes primary modules and the same kinds of backup modules, and includes a value storage unit storing values calculated from the modules, an encryption information storage unit storing information unique to the modules, an information decryption unit decrypting the information unique to the modules using the values in the value storage unit, and an encryption information update unit, when the module is updated, encrypting the information unique to the modules based on a value calculated from the each kind of the primary modules or the backup modules after the update.Type: GrantFiled: March 11, 2008Date of Patent: January 28, 2014Assignee: Ricoh Company, Ltd.Inventor: Kiwamu Okabe
-
Patent number: 8635700Abstract: In one embodiment, a method includes identifying a plurality of portions of a file and comparing the plurality of portions of the file to a plurality of stored patterns. The plurality of stored patterns include portions of known malware. The method also includes determining, from the plurality of portions of the file and based on the comparing of the plurality of portions of the file to the plurality of stored patterns, a set of matching portions. The set of matching portions include one or more of the plurality of portions of the file. In addition, the method includes determining a score for each portion in the set of matching portions and providing information regarding the set of matching portions. The information includes the scores determined for each portion of the set of matching portions.Type: GrantFiled: December 6, 2011Date of Patent: January 21, 2014Assignee: Raytheon CompanyInventors: Matthew Richard, Jesse J. Lee, Monty D. McDougal, Randy S. Jennings, William E. Sterns
-
Patent number: 8626647Abstract: Electronic documents corresponding to executed paper documents are certified. A certifying agent receives an electronic document and a corresponding paper document that had been executed pursuant to some transaction. The certifying agent compares the information contained in the paper to that in the electronic mortgage document. If the paper adequately corresponds to the electronic document and is otherwise sufficient, then the certifying agent certifies the electronic document so that other parties can reliably engage in transactions involving the electronic document without having to possess or otherwise inspect the executed paper document. Certification involves application of some form of indicia of certification to the electronic document, such as updating the value of a field corresponding to certification in the electronic document and/or applying a digital or electronic signature corresponding to the certifying agent to the electronic document.Type: GrantFiled: October 9, 2012Date of Patent: January 7, 2014Assignee: Fannie MaeInventors: J. Harvey Trimble, Jr., Cynthia H. Keith, Charlotte Haberaecker, N. Grande Bucca
-
Patent number: 8627053Abstract: A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code.Type: GrantFiled: December 23, 2010Date of Patent: January 7, 2014Assignee: Intel CorporationInventor: Millind Mittal
-
Patent number: 8621610Abstract: A system is provided for detecting, analyzing and quarantining unwanted files in a network environment. A host agent residing on a computing device in the network environment detects a new file introduced to the computing device and sends the new file to a network service for analysis. The network service is accessible to computing devices in the network environment. An architecture for the network service may include: a request dispatcher configured to receive a candidate file for inspection from a given computing device in the network environment and distribute the candidate file to one or more of a plurality of detection engines, where the detection engines operate in parallel to analyze the candidate file and output a report regarding the candidate file; and a result aggregator configured to receive reports from each of the detection engines regarding the candidate file and aggregates the reports in accordance with an aggregation algorithm.Type: GrantFiled: August 5, 2008Date of Patent: December 31, 2013Assignee: The Regents of The University of MichiganInventors: Jon Oberheide, Evan Cooke, Farnam Jahanian
-
Patent number: 8621236Abstract: A method for activating a function of a chipset comprising at least a memory and a calculation module in charge of cryptographic operations, the memory containing at least a seed and the calculation module containing at least one cryptographic algorithm, the method comprising the steps of: receiving at least one of a segmentation key, a global key and a global cryptographic algorithm selector; transmitting at least two items selected from the group consisting of the seed, the received segmentation key, the global key and the global cryptographic algorithm selector, to the calculation module, each of the items being provided by different entities; generating in the calculation module, a temporary key by using one of said at least one cryptographic algorithm of the calculation module and at least the two items; and verifying an authenticity of a received activation message using the temporary key and controlling activation based on the verification.Type: GrantFiled: June 6, 2011Date of Patent: December 31, 2013Assignee: Nagravision S.A.Inventors: Patrick Servet, Didier Hunacek
-
Patent number: 8621653Abstract: A location collection system is described herein that provides a uniform facility for reporting location data to a cloud-based service from a variety of devices, and that provides a uniform facility for accessing aggregated location data collected by the cloud-based service. The system collects location information related to a user and reports the location information to a central service to provide a variety of useful services to the user. By providing a big, secure location vault in the cloud, the system enables big data analytics to be used to allow current and future questions to be asked of this data and to correlate this with other data to enable new scenarios not yet enabled. Thus, the location collection system provides a model to report, gather, and analyze location data across devices and users.Type: GrantFiled: December 12, 2011Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: Moe Khosravy, Christian Liensberger
-
Patent number: 8621624Abstract: An apparatus and method for preventing an anomaly of an application program are provided. More particularly, an apparatus and method for preventing an anomaly of an application program that detect and stop an anomaly on the basis of a behavior profile for an application program are provided. The apparatus includes a behavior monitor that detects behavior of an application program in operation, an anomaly detector that determines whether the detected behavior of the application program is an anomaly on the basis of a behavior profile of the application program in operation, and an anomaly stopper that stops the behavior of the application program determined as an anomaly by the anomaly detector.Type: GrantFiled: December 10, 2008Date of Patent: December 31, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: In Sook Jang, Eun Young Lee, Hyung Geun Oh, Do Hoon Lee
-
Patent number: 8620817Abstract: A method and system for creating license management in software applications are disclosed. In one embodiment, the method comprises receiving an installer package associated with a software application to be run on a computer, the installer package not including license administration functionality. One or more executable files are extracted from the installer package. One or more license-enabled executable files are generated with the one or more executable files and a license wrapper. A new installer package is created with the one or more license-enabled executable files, the new installer package supporting the license administration functionality.Type: GrantFiled: September 14, 2006Date of Patent: December 31, 2013Assignee: Flexera Software, Inc.Inventor: Marwan Tabet
-
Patent number: 8615785Abstract: A network switch automatically detects undesired network traffic and mirrors the undesired traffic to a security management device. The security management device determines the source of the undesired traffic and redirects traffic from the source to itself. The security management device also automatically sends a policy to a switch to block traffic from the source.Type: GrantFiled: August 14, 2012Date of Patent: December 24, 2013Assignee: Extreme Network, Inc.Inventors: Craig T. Elrod, Prakash Kashyap
-
Patent number: 8612773Abstract: A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an appropriated response containing the list of software and an information file containing the respective attributes of the list of software. The server encoded this response and the encoded response is transmitted to the client. The client on receiving the response is configured to authenticate the response and install the encoded response after authentication. Highly accurate and reliable software installation using the network based installation management system may be achieved using a respective hardware element on the client and the server, which is configured to encode and decode a request and/or response suitably thereby providing a high level of security and trust in an un-trusted network environment.Type: GrantFiled: May 3, 2007Date of Patent: December 17, 2013Assignee: International Business Machines CorporationInventors: Pruthvi Panyam Nataraj, Bipin Tomar, Arun Prasath Anbalagan, Eduardo Lazaro Reyes
-
Patent number: 8607053Abstract: In accordance with the exemplary embodiments of the invention there is at least a method, an executable computer program, and an apparatus to determine at a network application function a list of desired user equipment security features to be used, the security features of the list ordered by preference of the network application function, send the list to a database of user security settings via a bootstrapping server function, and receive by the network application function, via the bootstrapping server function, a security features response including a security key, derived from information stored in the database, corresponding to a desired security feature contained in the list, thereby informing the network application function of the availability of at least one of the desired security features in the user equipment.Type: GrantFiled: November 24, 2010Date of Patent: December 10, 2013Assignee: Nokia CorporationInventor: Silke Holtmanns
-
Patent number: 8605296Abstract: A digital signature system and method are disclosed. The digital signature system may include a remote certificate server for storing and maintaining at least one digital certificate of a user by a service provider and a digital signature printer driver loaded on the user's computer for communicating with the service provider via a network, such as the Internet. The digital signature printer driver may obtain verification of the user's identity from the service provider via the network and electronically place on a printable document a digital signature of the user based on the remotely stored digital certificate. The system may further include a remote storage server for storing a digital copy of the digitally signed document. The digital signature may include a unique identifier for subsequent validation of the digital signature by the service provider.Type: GrantFiled: May 28, 2010Date of Patent: December 10, 2013Assignee: SecureCare Technologies, Inc.Inventors: Eugene L. Fry, Aleksander Roman Szymanski, Dennis J. Nasto, David D. Vineyard