Upgrade/install Encryption Patents (Class 713/191)
  • Patent number: 7941656
    Abstract: A system for loading application identifiers to a mobile device includes a mobile device, a card device insertable into the mobile device, and an application center. The card device is adapted to determine an effective mobile device identifier of the mobile device, and transmit the effective mobile device identifier to the application center. The effective mobile device identifier is based at least in part on the result of a process performed by the card device. The application center is adapted to (1) determine zero or more allotted application identifiers and zero or more application identifiers of applications loaded on the mobile device based at least in part on the effective mobile device identifier, (2) identify at least one application identifier of the zero or more allotted application identifiers which does not form part of the zero or more application identifiers of applications loaded on the mobile device, and (3) load the at least one application identifier to the mobile device.
    Type: Grant
    Filed: March 13, 2006
    Date of Patent: May 10, 2011
    Assignee: Oracle America, Inc.
    Inventors: Sebastian J. Hans, Eduard K. de Jong
  • Patent number: 7933409
    Abstract: To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit 104 concatenates a decrypted media key and content information in this order, and applies a one-way function to the concatenation result to generate a content key. If the key generation information is “10”, the key control unit 104 sets a rights key as the content key. If the key generation information is “01”, the key control unit 104 concatenates the decrypted media key and the rights key in this order, and applies a one-way function to the concatenation result to generate the content key.
    Type: Grant
    Filed: March 1, 2005
    Date of Patent: April 26, 2011
    Assignee: Panasonic Corporation
    Inventors: Masaya Yamamoto, Toshihisa Nakano, Motoji Ohmori, Masayuki Kozuka
  • Patent number: 7934083
    Abstract: A highly configurable kernel supports a wide variety of content protection systems. The kernel may reside in a host that interacts with a secure processor maintaining content protection clients. After establishing communication with the secure processor, the host receives messages from content protection clients requesting rules for message handling operations to support client operations. This flexible configuration allows for dynamic reconfiguration of host and secure processor operation.
    Type: Grant
    Filed: September 14, 2007
    Date of Patent: April 26, 2011
    Inventors: Kevin Norman Taylor, James Fahrny, William Lynn Helms, Azita Miahnahri Manson, Andrew T. Twigger, Nancy Louise Davoust, Henry Clarence Lilly, III
  • Patent number: 7925890
    Abstract: A method is provided for re-initializing a cryptographic processing module (102) at a location designated as an unclassified environment. The method includes storing in a database (122) a module unique recovery vector (310, 510) assigned to a cryptographic processing module. The method also includes indexing the module unique recovery vector in the database using a unique module identifying code (for example, a serial number) assigned to the cryptographic processing module. The method further includes subsequently communicating the module unique recovery vector from the database, over a computer network (120), to a remote computing environment (400) that is unclassified. The module unique recovery vector is used to re-initialize the cryptographic processing module.
    Type: Grant
    Filed: October 23, 2006
    Date of Patent: April 12, 2011
    Assignee: Harris Corporation
    Inventors: Donald J. Dever, Ian D. Mann
  • Patent number: 7925878
    Abstract: A system and method for creating a trusted network capable of facilitating secure transactions via an open network using batch credentials, such as batch PKI certificates, is presented. A certificate is bound to a group, or batch, or devices. This certificate is referenced by an activation authority upon processing a request for service by a device. Information regarding the device batch certificate is maintained in a permanent, or escrow, database. A user identity is bound to a device, as a device key is used to sign a user key created on the device in the presence of the user, and a copy of the device key is later used to decrypt the signed user key upon its transmission and receipt.
    Type: Grant
    Filed: September 24, 2002
    Date of Patent: April 12, 2011
    Assignee: Gemalto SA
    Inventors: Lionel Merrien, Jean-Louis Carrara, Youri Bebic, Paul Miller
  • Patent number: 7925013
    Abstract: A system is described for encryption and decryption of digital data prior to the digital data entering the memory of a digital device by generating a key, sub-key and combining the sub-key with mixed digital data, where the encryption and decryption occurs between the memory controller and the input output register.
    Type: Grant
    Filed: June 30, 2003
    Date of Patent: April 12, 2011
    Assignee: Conexant Systems, Inc.
    Inventor: Winefred Washington
  • Patent number: 7926093
    Abstract: The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of requested configuration changes initiated by the client system the Web-Server system provides a configuration data file to the client system preferably using a SOAP-communication protocol. The changes of the configuration data file are exclusively performed offline at the client side and the updated configuration data file is signed with authentication information and sent as a part of a SOAP-request to the Web-Server system. The Web-Server system provides a filter component for identifying and discarding non-SOAP requests as well as an access control manager for providing authentication examination for incoming SOAP-requests. After successful passing these components the SOAP-request is used for updating the existing configuration data file.
    Type: Grant
    Filed: May 1, 2008
    Date of Patent: April 12, 2011
    Assignee: International Business Machines Corporation
    Inventors: Wolfgang Eibach, Matthias Gruetzner, Dietmar Kuebler
  • Patent number: 7925892
    Abstract: A Modification device (5) is designed to modify an application (A1, A2, A3, A4) run by a data carrier (S), wherein a first key information item (K1) is stored in the data carrier (S) and an associated second key information item (K2) is stored in the modification device.
    Type: Grant
    Filed: March 30, 2004
    Date of Patent: April 12, 2011
    Assignee: NXP B.V.
    Inventor: Henrik Przybilla
  • Patent number: 7921302
    Abstract: A universal method and system for downloading game software to ROM based legacy gaming machines, activating selected games and providing new services. The method includes a ROM emulator for replacing the game program image and an NVRAM emulator for swapping the game context and critical meters accordingly. The method includes detection of the state of the current game activity such as to activate a new game only at an authorized time, when no player is playing a game or is carded-in for example. The system includes emulation of the original peripherals fitted to the legacy gaming machine such as to offer extended functionality and services. The universal method and system therefore prolongs the useful life of legacy machines which otherwise would be prematurely retired.
    Type: Grant
    Filed: March 20, 2006
    Date of Patent: April 5, 2011
    Assignee: IGT
    Inventors: Jean-Marie Gatto, Pierre-Jean Beney, Thierry Brunet de Courssou
  • Patent number: 7908487
    Abstract: The invention is directed to systems and methods for communicating sensitive and/or confidential medical information with the use of encryption. Specifically, the invention is directed to transmitting a request for sensitive medical data, where the request includes a public key for encryption as an XML node. The public key may be used by the responding party to encrypt at least a portion of the response and respond to the request. The only party in the network path that is able to decrypt the message is the originator of the request because the requestor will have a private keys which is required to decrypt the response data.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: March 15, 2011
    Assignee: NDCHealth Corporation
    Inventors: Jessica Landisman Williams, Troy Donovan Casey
  • Patent number: 7904706
    Abstract: This disclosure provides a system and method for updating a control system using an encrypted source code update. The example control system often includes a processor for managing at least a portion of the control system and flash memory communicably coupled with the processor, with the processor operable to load an encrypted update into the flash memory. In one example, a method for updating the control system would include identifying an update for a control system with the update comprising encrypted object code and the control system comprising at least a first processor. At least the first processor is then updated based on or using the identified update.
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: March 8, 2011
    Assignee: Innovation First, Inc.
    Inventors: Mark J. Lambert, David Anthony Norman
  • Patent number: 7894607
    Abstract: A system, method and media drive for selectively encrypting a data packet. The system includes an encryption key for use in encrypting the data packet, a verification data element derived from the encryption key, an encryption engine for selectively encrypting the data packet using the encryption key, and a verification engine in electronic communication with the encryption engine. The verification engine is configured to receive the encryption key and the verification data element, determine when the verification data element corresponds to the encryption key as received by the verification engine, and prohibit encryption of the data packet by the encryption engine when the verification data element does not correspond to the encryption key as received by the verification engine.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: February 22, 2011
    Assignee: Storage Technology Corporation
    Inventor: Alexander S. Stewart
  • Patent number: 7895449
    Abstract: A system and method for securely delivering installation keys from a key generator to an individualization device at a production facility is presented. Operators, using a production key server at the manufacturing facility, send a request to a key release server for a number of installation keys according to a production run. The key release server verifies the request, and if valid, returns the requested number of installation keys to the production key server in an encrypted format. The production key server then decrypts and delivers installation keys to the individualization device in a just-in-time fashion. The production key server includes various security devices including a hardware decryption device to decrypt the installation keys, a smart card reader for authenticating authorized operators, and a limiting switch to disable the production key server if it is tampered with.
    Type: Grant
    Filed: June 16, 2003
    Date of Patent: February 22, 2011
    Assignee: Microsoft Corporation
    Inventor: Mark Benedikt
  • Patent number: 7895424
    Abstract: A system allowing a target machine to be booted up from a disk image stored in memory. Instead of reading the boot-up information from a disk drive or other physical device the data is read from memory. No modification is necessary to native operating system, input/output subsystem, bootstrap code, etc., since the invention modifies characteristics, such as vectors used by the operating system, to make the disk image in memory appear to be the same as a standard external device.
    Type: Grant
    Filed: May 22, 2007
    Date of Patent: February 22, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Carleton Miyamoto, Jagadish Bandhole, Sekaran Nanja
  • Patent number: 7890770
    Abstract: This invention concerns a security module deactivation and reactivation method particularly intended for access control of conditional access data. These security modules include a plurality of registers (R1, R2, R3, Rn) containing values. The method includes the step of sending at least one management message (RUN-EMM) containing an executable code, this executable code being loaded into a memory of the security module and then executed. The execution of this code in particular can carry out the combination and/or the enciphering of the values of the registers, or render these values illegible. This method also allows the reactivation of the security modules that have been deactivated previously. In this case, the method includes the step of sending another message containing an executable code (RUN-EMM?1) for the reactivation of the modules, this executable code having an inverted function to that of the executable code used for the deactivation of the security modules.
    Type: Grant
    Filed: August 29, 2005
    Date of Patent: February 15, 2011
    Assignee: Nagravision S.A.
    Inventors: Henri Kudelski, Olivier Brique, Christian Wirz, Patrick Hauert
  • Patent number: 7889866
    Abstract: A clock signal extractor (11) is connected to an interface of an information equipment (2) for processing an information signal, to extract a clock signal component from the information signal. A clock signal generator (12) generates a pseudo clock signal having an optional phase difference relative to the clock signal component extracted by the clock signal extractor (11). A prevention signal generator (13) generates, based on the pseudo clock signal generated by the clock signal generator (12), a leakage prevention signal having an electromagnetic wave strength stronger than electromagnetic waves leaking from the information signal. A prevention signal output unit (14) outputs the leakage prevention signal generated by the prevention signal generator (13).
    Type: Grant
    Filed: May 24, 2005
    Date of Patent: February 15, 2011
    Assignee: Nippon Telegraph and Telephone Company
    Inventors: Masao Masugi, Masaharu Sao, Yoshiharu Akiyama, Hiroshi Yamane, Tetsuya Tominaga
  • Patent number: 7890755
    Abstract: A secure network server having an embedded Hyper-Text Transfer Protocol (HTTP) server that is not within its trusted security functionality and that is used to configure the SNS security and networking features.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: February 15, 2011
    Assignee: The Boeing Company
    Inventors: Daniel D. Schnackenberg, Janell Schnackenberg, legal representative, Kelly S. Bunn
  • Patent number: 7886153
    Abstract: There is provided a communication system in which a public key certificate is easily updated when identification information is changed, while network traffic increase is prevented. A print server executes encryption communication using a public key certificate which attests that own public key corresponds to own identification information. Then, if the print server detects that the own identification information (IP address or host name) is to be changed, the own server certificate which attests that own public key corresponds to changed identification information is generated by an electronic signature using the CA private key in a server.
    Type: Grant
    Filed: June 29, 2006
    Date of Patent: February 8, 2011
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Masafumi Miyazawa
  • Patent number: 7886159
    Abstract: A content provider 101 distributes a secure container 104 storing content data encrypted using content key data, content key data encrypted using distribution key data, and encrypted usage control policy data indicating the handling of the content data to a SAM 1051 of a user home network 103 etc. The SAM 1051, etc. decrypts the content data and usage control policy data stored in the secure container 104 and determines the purchase mode and usage mode and other handling of the content data based on said decrypted usage control policy data.
    Type: Grant
    Filed: April 3, 2006
    Date of Patent: February 8, 2011
    Assignee: Sony Corporation
    Inventors: Akira Nonaka, Tadashi Ezaki
  • Patent number: 7882560
    Abstract: A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
    Type: Grant
    Filed: May 1, 2006
    Date of Patent: February 1, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Jeffrey A. Kraemer, Andrew Zawadowskiy
  • Patent number: 7882365
    Abstract: Systems and methods that facilitate processing data, such as by encryption/decryption, and storing and retrieving data to/from memory such that actual data can be distinguished from information associated with, or representative of, erased/blank memory locations. A processor can include a comparing component that compares information input to the processor to determine whether such information is associated with actual data, or associated with, or representative of, erased/blank memory locations. Information associated with, or representative of, an erased/blank memory location can be processed so that it can be interpreted as such by other components. If actual data is processed such that the comparing component interprets the processed data to be equivalent to an erased/blank memory location, then the data can be re-processed, so it is not interpreted as such, before being forwarded to its next destination.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: February 1, 2011
    Assignee: Spansion LLC
    Inventors: Venkat Natarajan, Willy Obereiner
  • Patent number: 7877520
    Abstract: Configuration information settings for a storage device are made highly reliable and facilitated. The storage device includes a service processor for setting storage device configuration information, and a terminal device connected to the service processor via a private line to send a command group, received from an operator and related to the storage device configuration information, to the service processor. The service processor also includes a device for determining approval or denial of execution of the command group prior to execution of the command group received from the terminal device.
    Type: Grant
    Filed: June 8, 2009
    Date of Patent: January 25, 2011
    Assignee: Hitachi, Ltd.
    Inventors: Toshimichi Kishimoto, Yoshinori Igarashi, Shuichi Yagi
  • Patent number: 7870614
    Abstract: Database management and security is implemented in a variety of embodiments. In one such embodiment, data sets containing sensitive data elements are analyzed using aliases representing sensitive data elements. In another embodiment, the sensitive data elements are stored in an encrypted form for use from a secure access, while the alias is available for standard access.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: January 11, 2011
    Assignee: Aspect Loss Prevention, LLC
    Inventors: David A. Duhaime, Brad J. Duhaime
  • Patent number: 7856553
    Abstract: A platform discrimination indication register is stored in a wireless network card. This register holds a platform discrimination indication that indicates whether the wireless network card can be used to transfer data with notebook computers or whether the wireless network card is restricted to transferring data from a personal digital assistant or defined set of restricted devices. The platform discrimination indication can be upgraded using a key value obtained from at Internet site. This key value is limited to a specific wireless network card because of the use of a unique electronic I.D. An Internet site encrypts the electronic I.D. to produce the first key, such as a platform activation key (PAK). This first key is then decrypted at the personal data device in order to obtain a unique calculated I.D. value. If the calculated I.D. value matches the electronic I.D.
    Type: Grant
    Filed: October 22, 2007
    Date of Patent: December 21, 2010
    Assignee: Sierra Wireless, Inc.
    Inventors: Richard Wodzianek, Jody Crowther, Iulian Mocanu, Kirstin Gulbransen
  • Patent number: 7853799
    Abstract: A programmable encryption approach involves the use of a downloadable decryptor. According to an example embodiment of the present invention, an FPGA device includes a microcontroller for configuring logic circuitry on the FPGA device. A memory register is implemented for storing encryption key data and a message authentication code (MAC). When the FPGA device is to be configured using a configuration bitstream, a MAC is calculated for a decryptor and sent to the microcontroller along with an encryption key. The microcontroller stores the encryption key and MAC in a register to which access is limited. When the decryptor is downloaded to the microprocessor, a MAC is calculated on the downloaded decryptor and compared with the stored MAC. If the calculated MAC matches the stored MAC, the decryptor is allowed to access the key.
    Type: Grant
    Filed: June 24, 2004
    Date of Patent: December 14, 2010
    Assignee: Xilinx, Inc.
    Inventor: Stephen M. Trimberger
  • Patent number: 7849329
    Abstract: Software is licensed for use on a particular computing device, such as a gaming console or a multimedia console. An unlocking code is provided from a distribution service to the computing device (either directly or via a user), which in turn, unlocks the appropriate software or portion of software for use with the associated computing device. The software may reside on a computer-readable medium, such as a CD-ROM or DVD disk, that is being used in conjunction with the computing device. The unlocking code may be provided directly to the user in private (e.g., via email or a mobile phone) or in public (e.g., published on a website). Portions of the software that may be unlocked include a particular level of a game or other features (such as additional characters or weapons), or a working or more advanced version of an application that was otherwise provided as a demo or older version.
    Type: Grant
    Filed: September 1, 2004
    Date of Patent: December 7, 2010
    Assignee: Microsoft Corporation
    Inventors: Ling Tony Chen, Boyd Cannon Multerer
  • Patent number: 7849331
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Grant
    Filed: April 23, 2008
    Date of Patent: December 7, 2010
    Assignee: Panasonic Corporation
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Patent number: 7844835
    Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.
    Type: Grant
    Filed: September 20, 2005
    Date of Patent: November 30, 2010
    Assignee: Intertrust Technologies Corporation
    Inventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
  • Patent number: 7840960
    Abstract: A content distribution method distributes a package containing a content from a content distribution apparatus to a terminal of a content distribution destination and causes the terminal to expand and display the content contained in the distributed package by using expansion software provided in the terminal. Update data of the expansion software is inserted in the package in addition to the content. When the terminal cannot expand the content by using the expansion software provided in it, the terminal updates the expansion software provided in it by using the update data contained in the distributed package and expands the content by using the updated expansion software.
    Type: Grant
    Filed: May 27, 2005
    Date of Patent: November 23, 2010
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Akira Miura, Hiroshi Suu, Akihiro Kasahara, Kazunori Nakano
  • Patent number: 7835523
    Abstract: A radio system comprises radio frequency receiving electronics and digital signal processing electronics coupled to the radio frequency receiving electronics. The radio system is characterized by security electronics coupled to the digital signal processing electronics. The security electronics comprise a cryptographic subsystem. The cryptographic subsystem comprises cryptographic equipment software, core cryptographic algorithms and a cryptographic engine abstraction layer hardware each of which is stacked with but separate from one another. The cryptographic engine abstraction layer hardware has been designed for the specific radio system design.
    Type: Grant
    Filed: August 26, 2005
    Date of Patent: November 16, 2010
    Assignee: Rockwell Collins, Inc.
    Inventors: Rodney L. Mickelson, Dipak P. Patel
  • Patent number: 7823204
    Abstract: A method of detecting intrusions on a computer includes the step of identifying an internet protocol field range describing fields within internet protocol packets received by a computer. A connectivity range is also established which describes a distribution of network traffic received by the computer. An internet protocol field threshold and a connectivity threshold are then determined from the internet protocol field range and connectivity range, respectively. During the operation of the computer, values are calculated for the internet protocol field range and connectivity range. These values are compared to the internet protocol metric threshold and connectivity metric threshold so as to identify an intrusion on the computer.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: October 26, 2010
    Assignee: McAfee, Inc.
    Inventors: Ramesh M. Gupta, Parveen K. Jain, Keith E. Amidon, Fengmin Gong, Srikant Vissamsetti, Steve M. Haeffele, Ananth Raman
  • Patent number: 7814335
    Abstract: A system and method of selectively installing software onto a computer system which includes reading a configuration file that contains computer system information, determining an encryption key from data contained in the configuration file, and deciphering data stored on a nonvolatile storage device using the encryption key. The computer system information includes system specific information that may be used to determine whether the computer system was purchased from a particular vendor. In a Windows™ based application, the configuration file includes a BIOS/DOS file that includes computer system specific information and the encryption key is optionally stored in a registry file to provide for repeated uses of the encryption key if more than one data file are being deciphered. In another embodiment, the data file is stored on a World Wide Web page accessible over a global computer network, such as the Internet, to install and decipher encrypted data files stored on a Web server.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: October 12, 2010
    Assignee: Dell Products L.P.
    Inventors: Anil V. Rao, Wayne R. Weilnau
  • Patent number: 7814334
    Abstract: A method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content. The rules for validating activation keys, the code for providing instructions for executing the rules for validating the activation keys and a template for identifying possible activation keys, which keys are currently valid and validating rules associated with each currently valid activation key are separated and separately secured.
    Type: Grant
    Filed: June 18, 2007
    Date of Patent: October 12, 2010
    Assignee: International Business Machines Corporation
    Inventor: Brent Ryan Modesitt
  • Publication number: 20100241873
    Abstract: An application packaging device is provided, which comprises a decryption component configured to decrypt each of a plurality of applications, a replication component configured to replicate an end user license agreement included in each of the plurality of decrypted applications, and a component configured to package respective replicas of the end user license agreements and the plurality of applications before the decryption so as to obtain an application package.
    Type: Application
    Filed: March 10, 2010
    Publication date: September 23, 2010
    Applicant: CANON KABUSHIKI KAISHA
    Inventor: Hiroyasu Miyazawa
  • Patent number: 7802298
    Abstract: In one embodiment, a client computer is protected from phishing attacks using a sensitive state monitor and a phishing site detector. The sensitive state monitor may detect reception of a web page displayed in a web browser of the client computer. The sensitive state monitor may determine whether or not the web page is a sensitive web page, such as those used to receive user confidential information. When the sensitive state monitor determines that the web page is sensitive, the sensitive state monitor may ask the user to confirm that the web page is indeed sensitive. After user confirmation, the sensitive state monitor may invoke the phishing site detector, which may determine whether or not the website serving the web page is a phishing site.
    Type: Grant
    Filed: August 10, 2006
    Date of Patent: September 21, 2010
    Assignee: Trend Micro Incorporated
    Inventors: Paul Hong, Xiaoming Zhao, Gang Chen
  • Patent number: 7793284
    Abstract: The described systems and methods are directed at configuring a server based on a selected role. An installation application is configured to install core components in a server where these core components enable the server to perform the basic functions of a network computing device. A role management application is configured to enable a system administrator to select a role for the server and to automatically determine software components associated with the selected role. The role management application is then configured to build the software components and install the components on the server. The role management application is further configured to configure the components for the selected role. The automated installation process performed by the role management application enables a server to be efficiently configured for a particular role without installing other unnecessary components unrelated to the role.
    Type: Grant
    Filed: March 25, 2005
    Date of Patent: September 7, 2010
    Assignee: Microsoft Corporation
    Inventors: Andrew T. Mason, William A. Laing, John Macintyre, Richard A. Pletcher
  • Patent number: 7793113
    Abstract: A method, system and computer program product for updating distributed applications in a multiple application-server environment, in which at least one server receives updates later than another server and update delivery is tracked by an update tracker in the form of a message history, is disclosed. In a preferred embodiment, an application will be distributed across multiple servers and will receive updates from a central repository across a network or other communication fabric. Responsive to starting an application server in the data processing system, a messaging system is contacted over a secure connection to determine whether an application update distribution occurred while the application server was unavailable to update applications, and, responsive to a determination that the application update distribution occurred, an application is received.
    Type: Grant
    Filed: May 21, 2008
    Date of Patent: September 7, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kulvir S. Bhogal, Alexandre Polozoff, Jr.
  • Patent number: 7788503
    Abstract: A gaming machine may include a locked enclosure and a first computing device disposed within the locked enclosure. The first computing device may be programmed to enable game play of the gaming machine. A second computing device may be provided that is controlled by policies and disposed within the locked enclosure of the gaming machine. The second computing device may be configured for network access. An interface may also be provided between the first and the second computing devices. The second computing device may be configured to receive game software components over the network that are compatible with the first computing device but not compatible with the second computing device and to transfer the received game software components to the first computing device over the interface.
    Type: Grant
    Filed: April 5, 2006
    Date of Patent: August 31, 2010
    Assignee: Mudalla Technology, Inc.
    Inventors: Jean-Marie Gatto, Thierry Brunet De Courssou
  • Patent number: 7788730
    Abstract: A secure bytecode instrumentation facility, wherein a new code fragment is registered in an encrypted registry by first extracting a digital certificate from a specified code fragment location. A certification authority (CA) in the digital certificate is compared against a list of registered trusted certification authorities in the registry. If the CA is in the registry list, the code fragment origin in the digital certificate is compared against a list of registered trusted origins in the registry. If the code fragment origin is in the registry list, a determination is made as to whether the code fragment is authentic. If so, the information of the code fragment is recorded into the registry. The injection of code fragments may begin upon the initialization of the instrumentation facility if the encrypted registry has not been corrupted since last accessed, and if the code fragment content matches code fragment information in the registry.
    Type: Grant
    Filed: January 17, 2006
    Date of Patent: August 31, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey R. Dean, Alberto Giammaria
  • Patent number: 7780082
    Abstract: A reader/writer that reads or writes information from or in an Integrated Circuit (IC) module, in which one or more applications are loaded, in response to an instruction issued from a controller in which counter-applications compatible with the applications are loaded. The reader/writer includes a memory in which one or more pieces of IC access authentication information that are associated with the applications in the IC module and that are used to authenticate the associated applications respectively are stored. The memory also stores pieces of group authentication information. A control unit authenticates a counter-application using group authentication information and, if the authentication succeeds, permits the counter-application to use IC access authentication information belonging to a group identified with the group authentication information.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: August 24, 2010
    Assignee: Felica Networks, Inc.
    Inventors: Minoru Handa, Taro Kurita, Norio Uchida
  • Patent number: 7784048
    Abstract: A mobile communication terminal comprises: a download portion which downloads an application program from an outside WWW server, and secures a data region for reference parameters to which the application program refers at the time of execution; a control signal receiving portion which receives a control signal containing the reference parameters to which the application program refers, and a parameter saving portion which saves the reference parameters contained in the control signal to the data region.
    Type: Grant
    Filed: June 13, 2005
    Date of Patent: August 24, 2010
    Assignee: NTT DoCoMo, Inc.
    Inventors: Mao Asai, Nobuyuki Watanabe, Tatsuro Oi, Mitsuyuki Abe
  • Patent number: 7783881
    Abstract: There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events.
    Type: Grant
    Filed: August 15, 2006
    Date of Patent: August 24, 2010
    Assignee: Bally Gaming, Inc.
    Inventors: James W. Morrow, Larence McAllister, Robert Dubner, David Carman
  • Patent number: 7779474
    Abstract: A computer system and storage medium that in an embodiment count the number of times that a file or registry entry is added, changed, or deleted at clients in a network. If the count exceeds a threshold, then a warning is sent to the clients. The warning may prompt the clients to delete or rename the file or registry entry, run an anti-virus program, quarantine the file or registry entry, or issue a message. In this way, viruses may be detected at clients.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: August 17, 2010
    Assignee: Trend Micro Incorporated
    Inventors: Zachary Adam Garbow, Michael David Gordon, Robert Hart Hamlin, William Russell Marshall, Clayton Lee McDaniel, Emuejevoke Jane-Frances Sanomi-Fleming
  • Patent number: 7779273
    Abstract: A mechanism is provided for booting a multiprocessor device based on selection of encryption keys to be provided to the processors. With the mechanism, a security key and one or more randomly generated key values are provided to a selector mechanism of each processor of the multiprocessor device. A random selection mechanism is provided in pervasive logic that randomly selects one of the processors to be a boot processor and thereby, provides a select signal to the selector of the boot processor such that the boot processor selects the security key. All other processors select one of the one or more randomly generated key values. As a result, only the randomly selected boot processor is able to use the proper security key to decrypt the boot code for execution.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: August 17, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jason N. Dale, Jonathan J. DeMent, Clark M. O'Niell, Christopher J. Spandikow
  • Patent number: 7779272
    Abstract: A hardware cryptographic engine for encrypting transmission data may include a plurality of ciphertext engines that generate intermediate ciphertexts and final ciphertexts. At least one of the ciphertext engines may receive an intermediate ciphertext output from at least one neighboring ciphertext engine to generate a corresponding intermediate ciphertext and final ciphertext. A method of encrypting transmission data may include inputting a second intermediate ciphertext of a second ciphertext engine to a first ciphertext engine and generating a first intermediate ciphertext of the first ciphertext engine using the second intermediate ciphertext.
    Type: Grant
    Filed: August 30, 2004
    Date of Patent: August 17, 2010
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Sung-Woo Lee
  • Patent number: 7774619
    Abstract: New code routines for a secure system (e.g., a TPM) are stored in a memory (e.g., a flash memory) that is located external to the secure system. For example, a chip may include a TPM and an external flash memory may be connected to the chip. New routines for the TPM may then be stored in the flash. A function table may be used to determine whether a given function to be executed by the TPM is stored in on-chip memory (e.g., ROM) or in the flash. New function tables may be stored in the flash. For example, when a new set of functions is loaded into the flash, a new function table that references the new functions also may be loaded into the flash.
    Type: Grant
    Filed: October 13, 2005
    Date of Patent: August 10, 2010
    Assignee: Broadcom Corporation
    Inventors: Timothy R. Paaske, Jeffrey C. Glover
  • Patent number: 7774617
    Abstract: A mechanism is provided for masking a boot sequence by providing a dummy processor. With the mechanism, one of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. The execution of the masking code on the non-boot processors preferably generates electromagnetic and/or thermal signatures that approximate the signatures of the actual boot code execution on the boot processor. One of the non-boot processors is selected to execute masking code that is different from the other masking code sequence to thereby generate a electromagnetic and/or thermal signature that appears to be unique from an external monitoring perspective.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: August 10, 2010
    Assignee: International Business Machines Corporation
    Inventors: Jason N. Dale, Jonathan J. DeMent, Clark M. O'Niell, Steven L. Roberts
  • Publication number: 20100195833
    Abstract: A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment (operating system) (30) and a secure execution environment (32) comprising a Mobile Trusted Module (MTM). The mobile terminal enables the software of the terminal in the secure execution environment (32) to be updated. The terminal 1 may be provided with minimal software initially in the secure execution environment (32), and is operable to subsequently update the software by over the air transmission of software. Also disclosed is a method for managing rights in respect of broadcast, multicast and/or unicast (downloaded) data, relevant in particular to managing access to a broadcast video data stream complying with a mobile digital broadcast scheme. The method defines a service protection platform implemented on mobile terminals having both normal execution environment (i.e. the operating system) and secure execution environment.
    Type: Application
    Filed: July 13, 2007
    Publication date: August 5, 2010
    Applicant: VODAFONE GROUP PLC
    Inventors: Mark Priestley, Timothy Wright, Caroline Jessica Belrose, Nicholas Bone, James Irwin
  • Patent number: 7765409
    Abstract: A modular BIOS update mechanism provides a standardized method to update options ROMs and to provide video and processor microcode upgrades in a computer system without requiring a complete replacement of the system BIOS. The MBU mechanism provides several advantages. First, new features and BIOS bugs from earlier release may be delivered to an installed base of end-user systems even if direct OEM support cannot be identified. Also, BIOS components may be provided as a validated set of revisions. With resort to a validation matrix, BIOS updates may be managed easily. The modular BIOS update is particularly useful in systems having several independent BIOS's stored within unitary firmware.
    Type: Grant
    Filed: April 27, 2007
    Date of Patent: July 27, 2010
    Assignee: Intel Corporation
    Inventors: Andrew H. Gafken, Todd D. Wilson, Tom Dodson, John V. Lovelace
  • Patent number: 7752676
    Abstract: Provided are a method, system and article of manufacture, wherein a request to access data is received from a requestor. A determination is made as to whether the requestor is authorized to access the data. In response to determining that the requestor is authorized to access the data, a determination is made as to whether the data is encrypted. An encryption key is requested from the requester, in response to determining that the data is not encrypted.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: July 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Michael Howard Hartung, Yu-Cheng Hsu, Robert Frederic Kern