Security Protocols Patents (Class 726/14)
  • Patent number: 8731192
    Abstract: A data generating is device capable of preventing unauthorized extraction of plaintext content between decryption processing and digital watermark embedment processing. A content reproducing device obtains restoration information and, in accordance with the restoration information, selectively performs predetermined restoration processing and processing of embedding device unique information, on content data at a position shown by the restoration information.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: May 20, 2014
    Assignee: Panasonic Corporation
    Inventors: Masaya Yamamoto, Senichi Onoda, Minehisa Nagata, Kaoru Murase
  • Patent number: 8732810
    Abstract: A persistent connection is used for real-time or near real-time data transfer from a push platform on a network to a mobile station. To establish and maintain the persistent connection between the mobile station and push platform on the network, various protocols are defined over a packet connection between the mobile station and push platform. The real-time or near real-time data is pushed or sent by the push platform to the mobile station, as the data becomes available from a data source. In particular, heartbeat messages are used to determine whether or not the persistent connection is alive and available for real-time or near real-time data transfer. When the persistent connection is lost, the mobile station uses a retry connection scheme based on the number of connection attempts made by the mobile station for establishing a new persistent connection to the push platform.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: May 20, 2014
    Assignee: Cellco Partnership
    Inventors: Venkat Gaddam, Shahid Ahmed, Sankar Shanmugam, SM Masudur Rahman, William Cory Hawkins
  • Patent number: 8732451
    Abstract: As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device and a portable storage device. A connection is initiated between a second computing device (e.g., remote device), connected to an untrusted network, and the first computing device, comprising initiating a proxy server protocol from the portable storage device (e.g., attached to the second device), using the second computing device. A secure connection between the first and second devices is created using the encryption keys.
    Type: Grant
    Filed: May 20, 2009
    Date of Patent: May 20, 2014
    Assignee: Microsoft Corporation
    Inventors: Rajesh Viswanathan, David J. Steeves
  • Patent number: 8726382
    Abstract: Methods for tracking attacking nodes are described and include extracting, from a database, an instance of each unique packet header associated with IP-to-IP packets transmitted over a time period. The method includes determining from extracted headers, which nodes have attempted to establish a connection with an excessive number of other nodes over a period, identifying these as potential attacking nodes, determining from the headers, which other nodes responded with a TCP SYN/ACK packet indicating a willingness to establish connections, and a potential for compromise. Nodes scanned by potential attacking nodes are disqualified from the identified nodes based on at least one of: data in the headers relating to at least one of an amount of data transferred, and scanning activities conducted by the nodes that responded to a potential attacking node with a TCP SYN/ACK packet. Any remaining potential attacking nodes and scanned nodes are presented to a user.
    Type: Grant
    Filed: August 20, 2008
    Date of Patent: May 13, 2014
    Assignee: The Boeing Company
    Inventors: Stephen Knapp, Timothy Mark Aldrich
  • Patent number: 8719918
    Abstract: With migration of network technology and more and more requirements of user equipment for accessing to Internet, the network security faces more and more severe situation. There is provided a method for distributed security control in communication network system and the device thereof in order to improve security and operatability of network operator. In the method, firstly the network controller establishes a network security control mechanism, which is used for a second network device to check the validity of the data package from the user equipment; secondly, the network controller sends the network security control mechanism to the second network devices; lastly, the second network device checks the validity of the data package from the user equipment according to the network security control mechanism, and discards the data package if the data package is invalid.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: May 6, 2014
    Assignee: Alcatel Lucent
    Inventors: Haibo Wen, Chunyan Yao, Jun Zheng, Songwei Ma
  • Patent number: 8719957
    Abstract: Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: May 6, 2014
    Assignee: Altera Corporation
    Inventor: Bruce B. Pedersen
  • Patent number: 8719917
    Abstract: A network device may be configured to filter network traffic using multiple different filters bound to different interfaces of the network device. The network device may include logic to identify a relationship map that describes a topology of bind-points associated with the network device. Additionally, the network device may include logic to generate a merge graph based on the relationship map, the merge graph including one or more nodes, where each node represents a walk through the relationship map and includes one or more merge-points, where each merge-point is defined as a filter associated with a bind-point. The network device may also include a ternary content-addressable memory (TCAM) programmed to include entries based on the nodes of the merge graph.
    Type: Grant
    Filed: February 17, 2009
    Date of Patent: May 6, 2014
    Assignee: Juniper Networks, Inc.
    Inventor: Anand Ammundi
  • Publication number: 20140123267
    Abstract: A method at a computing client located behind a NAT and restrictive-access firewall, including establishing a control connection with a TCP TURN server utilizing a port capable of traversing the restrictive-access firewall; requesting an allocation of an client service identity from the TCP TURN server; and receiving, from the TCP TURN server, a response containing the client service identity, the client service identity being independent of any port used to communicate with the TCP TURN server. Further a method at a TCP TURN server, including listening on a first port for communications from a computing client, the computing client being behind a restrictive access firewall and the first port capable of traversing the restrictive-access firewall; establishing a control connection with the client on the first port; receiving a request for an allocation of an client service identity from the computing client; and sending a response containing the client service identity.
    Type: Application
    Filed: October 29, 2012
    Publication date: May 1, 2014
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Bruno Richard PREISS, Kaiduan XIE, Jonathan Hong-Man SAU
  • Patent number: 8713665
    Abstract: A method and system for controlling a firewall for a user computer system. One or more processors of the user computer system receive a control request to control a program of the user computer system by the firewall. The control request includes a condition pertaining to at least one process of a remote computer system. The at least one process is configured to be executed on the remote computer system. The firewall protects the user computer system from external threats. The processors store a remote system condition associated with the program of the user computer system. The remote system condition includes the condition pertaining to the at least one process. The processors ascertain whether the remote system condition is satisfied. The processors direct the firewall to block or allow the transmission of data if it is ascertained that the remote system condition is not satisfied or satisfied, respectively.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Rick A. Hamilton, II, Brian M. O'Connell, John R. Pavesi, Keith R. Walker
  • Patent number: 8713659
    Abstract: A switch sends an authentication request message to a client at intervals of a preset duration. A response message sent by the client is received. The response message carries authentication information of a user carried on the client. An authentication message is sent to a server according to the response message. An authentication reply message sent by the server is received. The authentication reply message carries information about an authentication domain authorized by the server to the user. It is determined, according to the authentication reply message, whether the authentication domain of the user is changed. If the authentication domain of the user is changed, an authentication domain change message is sent to the client according to the authentication reply message, so that the client obtains an IP address again.
    Type: Grant
    Filed: September 3, 2013
    Date of Patent: April 29, 2014
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Manna Chen
  • Patent number: 8713302
    Abstract: A voice-over-Internet-Protocol (VoIP) client codes audio data as printable ASCII characters, then embeds the ASCII audio data inside a cookie that is sent over the Internet within an HTTP GET message. The GET message is sent to a server acting as a call proxy or external manager that forwards the audio data to a remote client. Return audio data is sent back to the client in the normal data field of an HTTP response message from the server. When the client receives the HTTP response, it sends another GET message without audio data, allowing the server to send another response. This empty GET allows VoIP to pass through strict firewalls that pair each HTTP response with a GET. For secure-sockets layer (SSL), client and server exchange pseudo-keys in hello and finished messages that establish the SSL session. Audio data is streamed in SSL messages instead of encrypted data.
    Type: Grant
    Filed: April 25, 2011
    Date of Patent: April 29, 2014
    Assignee: Google Inc.
    Inventor: Debra C. Kirchhoff
  • Patent number: 8713667
    Abstract: Systems, methods, and apparatus are provided for policy protected cryptographic Application Programming Interfaces (APIs) that are deployed in secure memory. One embodiment is a method of software execution. The method includes executing an application in a first secure memory partition; formatting a request to comply with a pre-defined secure communication protocol; transmitting the request from the application to a cryptographic application programming interface (API) of the application, the API being in a second secure memory partition that is separate and secure from the first secure memory partition; and verifying, in the second secure memory partition, that the request complies with a security policy before executing the request.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: April 29, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeff Kalibjian, Ralph Bestock, Larry Hines, W. Dale Hopkins, Vladimir Libershteyn, Steven W. Wierenga, Susan Langford
  • Patent number: 8713669
    Abstract: Systems and/or methods of secure communication of information between multi-domain virtual private networks (VPNs) are presented. A dynamic group VPN (DGVPN) can reside in one domain and a disparate DGVPN can reside in a disparate domain. An administrative security authority (ASA) can be employed in each domain. Each ASA can generate and exchange respective keying material and crypto-policy information to be used for inter-domain communications when routing data from a member in one DGVPN to a member(s) in the disparate DGVPN, such that an ASA in one domain can facilitate encryption of data in accordance with the policy of the other domain before the data is sent to the other domain. Each ASA can establish a key server to generate the keying material and crypto-policy information associated with its local DGVPN, and such material and information can be propagated to intra-domain members.
    Type: Grant
    Filed: March 2, 2007
    Date of Patent: April 29, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: James Neil Guichard, Warren Scott Wainner, Brian E. Weis
  • Patent number: 8713668
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: April 29, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8707420
    Abstract: Trusted e-mail communication may be provided. A message source organization may be validated. When a message is received from the validated message source organization for a recipient organization, a determination may be made as to whether the recipient organization supports an attribution data extension. If so, the message may be transmitted to the recipient organization with an attribution element associated with the message source organization.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: April 22, 2014
    Assignee: Microsoft Corporation
    Inventors: Gregory Gourevitch, Victor William Habib Boctor, Wilbert De Graaf
  • Patent number: 8707026
    Abstract: A cookie attribute for use during secure HTTP transport sessions. This attribute points to a server-supplied certificate and, in particular, a digital certificate. The cookie attribute includes a value, and that value is designed to correspond to one or more content fields in the digital certificate. During a first https session, a first web application executing on a first server provides a web browser with the cookie having the server certificate identifier attribute set to a value corresponding to a content field in a server certificate. Later, when the browser is accessing a second server during a second https session, the browser verifies that the value in the cookie matches a corresponding value in the server certificate received from the second server before sending the cookie to the second server. This approach ensures that the cookie is presented only over specified https connections and to trusted organizations.
    Type: Grant
    Filed: July 13, 2011
    Date of Patent: April 22, 2014
    Assignee: International Business Machines Corporation
    Inventor: Jason Matthew Wicker
  • Patent number: 8707028
    Abstract: A cookie attribute for use during secure HTTP transport sessions. This attribute points to a server-supplied certificate and, in particular, a digital certificate. The cookie attribute includes a value, and that value is designed to correspond to one or more content fields in the digital certificate. During a first https session, a first web application executing on a first server provides a web browser with the cookie having the server certificate identifier attribute set to a value corresponding to a content field in a server certificate. Later, when the browser is accessing a second server during a second https session, the browser verifies that the value in the cookie matches a corresponding value in the server certificate received from the second server before sending the cookie to the second server. This approach ensures that the cookie is presented only over specified https connections and to trusted organizations.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: April 22, 2014
    Assignee: International Business Machines Corporation
    Inventor: Jason M. Wicker
  • Patent number: 8701180
    Abstract: In an embodiment, a method is provided for communicating a protocol request at a network zone. In this method, the protocol request is received from a computing device and this protocol request is encapsulated in a different protocol. The protocol request is then transmitted to a different network zone by way of the different protocol. A message is then accessed from the different network zone by way of the different protocol, and this message includes a protocol response to the protocol request. The protocol response is extracted from the message and transmitted to the computing device.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: April 15, 2014
    Assignee: SAP AG
    Inventor: Masoud Aghadavoodi Jolfaei
  • Patent number: 8695081
    Abstract: A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information.
    Type: Grant
    Filed: April 10, 2007
    Date of Patent: April 8, 2014
    Assignee: International Business Machines Corporation
    Inventors: Ravi Prakash Bansal, Rick Allen Hamilton, II, Brian Marshall O'Connell, Keith Raymond Walker
  • Patent number: 8695083
    Abstract: A security gateway receives messages, such as URL requests, rejected by a message filter based on a set of rules. The security gateway maintains frequencies with which the messages were rejected by the rules. The security gateway finds rejected messages having a high frequency of occurrence. Since messages having a high frequency of occurrences are more likely to represent legitimate requests rather than malicious attacks, the security gateway generates exception rules, which would allow similar messages to pass through the gateway.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: April 8, 2014
    Assignee: Citrix Systems, Inc.
    Inventors: Abhishek Chauhan, Rajiv Mirani, Prince Kohli, Priya Nanduri
  • Patent number: 8694659
    Abstract: A computer-implemented method for enhancing domain-name-server responses may include: 1) receiving a domain-name-system request, 2) identifying a domain of the domain-name-system request, 3) retrieving classification information relating to the domain from a third-party system, and 4) including the classification information in a response to the domain-name-system request. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 6, 2010
    Date of Patent: April 8, 2014
    Assignee: Symantec Corporation
    Inventors: George Stahl, Shaun Cooley
  • Patent number: 8695065
    Abstract: A data communication apparatus which is capable of preventing reception of undesired data by a destination without increasing the load on a network, etc. Data and a destination thereof are input. A sender ID related to a sender who sends the input data is input. The input data is sent to the input destination. A sender ID for data transmission to the input destination is permitted is stored as a permission ID. The input sender ID is collated with the stored permission ID. Whether to permit data transmission is determined according to the collation result.
    Type: Grant
    Filed: March 29, 2012
    Date of Patent: April 8, 2014
    Assignee: Canon Kabushiki Kaisha
    Inventors: Shinichi Kato, Osamu Iinuma, Tsutomu Sakaue
  • Patent number: 8689317
    Abstract: A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over Internet protocol (VoIP) network, that employs a session initiation protocol (SIP). The method includes receiving a subscription request from a third party subscriber, the subscription request identifying a targeted user to be monitored, monitoring communication sessions in which the targeted user is a participant, to detect SIP events corresponding to state transitions associated with the communication sessions.
    Type: Grant
    Filed: December 19, 2005
    Date of Patent: April 1, 2014
    Assignee: Level 3 Communications, LLC
    Inventor: John Hearty
  • Patent number: 8689318
    Abstract: The present invention relates to trust in computing platforms and the like. In particular, embodiments of the invention provide a trusted computing entity (64), providing an environment comprising one or more of a set or sets of available security algorithms (62), the entity (64) being adapted to operate on data (702), which data has associated security criteria (704), only if the environment meets the associated security criteria.
    Type: Grant
    Filed: January 21, 2008
    Date of Patent: April 1, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Graeme John Proudler
  • Patent number: 8689011
    Abstract: The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit.
    Type: Grant
    Filed: August 21, 2008
    Date of Patent: April 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Frederic Bauchot, Jean-Luc Collet, Gerard Marmigere, Christophe Mialon
  • Patent number: 8688836
    Abstract: A method performed in a network element coupled between a subscriber end station and an AAA server for avoiding AAA processing by at least temporarily suppressing AAA access-request messages for a rejected subscriber end station. The network element receives subscriber session-request messages from the subscriber end station. Subscriber session-request messages include information for verifying an identity that the network element transmits to the AAA server as AAA access-request messages. The network element receives AAA access-response messages corresponding to the AAA access-request messages. Responsive to an AAA access-response message, the network element determines that additional AAA access-request messages should be, at least temporarily, suppressed with regards to the subscriber end station. Responsive to determining, the network element suppresses any additional AAA access-request messages from being transmitted to the AAA server.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: April 1, 2014
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Namadurau Akil Ponnuswamy, Sudhagar Chinnaswamy
  • Patent number: 8689319
    Abstract: A method and system for preventing an unacceptable data packet directed at a computing device on a first network and sent from a client device. The method includes a step of providing a network security system remotely from the first network and the client device, the network security system having a public address and including a load balancer and at least one network security subsystem having a private address, the network security subsystem further including an intrusion detection module, the load balancer of the network security subsystem receiving the data packet destined for the computing device. The load balancer translates the destination address of the packet from the public address of the network security system to the private address of the network security subsystem and forwards the packet to the intrusion detection module of the network security subsystem. The intrusion detection module then determines whether the packet is an intrusion attempt.
    Type: Grant
    Filed: March 1, 2010
    Date of Patent: April 1, 2014
    Assignee: Sollitionary, Inc.
    Inventors: Donald C. Gray, II, Mike Hrabik
  • Patent number: 8688834
    Abstract: According to some embodiments, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA Authentication Agent) and a DHCP (Dynamic Host Configuration Protocol) server, such as, e.g., for synchronization between the PANA SA state and the DHCP SA state, such as, e.g., maintaining synchronization when a connection is lost. In some embodiments, systems and methods for binding network bridge and network access authentication are also provided related to, inter alia, interactions between a PAA and a layer-2 switch, such as, e.g., for avoiding service thefts and the like (such as, e.g., MAC address and/or IP address spoofing) in the context of, e.g., the above. In some other embodiments, systems and methods for bootstrapping multicast security from network access authentication protocol are also provided related to, inter alia, key management for protected IP multicast streams, such as, e.g.
    Type: Grant
    Filed: October 29, 2004
    Date of Patent: April 1, 2014
    Assignees: Toshiba America Research, Inc., Telcordia Technologies, Inc.
    Inventors: Kensaku Fujimoto, Yasuhiro Katsube, Yoshihiro Oba
  • Patent number: 8689313
    Abstract: An exemplary method of the invention is for connecting a plurality of clients to one another over a computer network for communication of real-time streaming data to one another, with at least one of the clients being separated by a security device from the network. Exemplary steps include each of the clients communicating a request to the server including a client address and a conference identifier, the server using the conference identifier to identify a conference address, and the server communicating a confirmation to each of the clients in a first protocol containing the at least one conference address. The at least one security device recognizes one or both of the confirmation and request as a signal to allow traffic to pass from said conference address to the respective client separated from the network by the security device.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: April 1, 2014
    Assignee: Insors Integrated Communications
    Inventors: Jon N. Swanson, Adam M. Chapweske
  • Patent number: 8680983
    Abstract: A method of self servicing an appliance includes connecting a service accessory to an appliance, recording diagnostics data associated with the appliance onto the service accessory, removing the service accessory from the appliance, coupling the service accessory to a personal computer, and uploading the diagnostics data to an automated service system. Another embodiment includes coupling a service accessory to a computer having a test script, transferring a test script from the computer to the service accessory, connecting the service accessory to the communication network of the appliance, establishing communications between the service accessory and the appliance using the communication network; and executing the test script over the communication network.
    Type: Grant
    Filed: December 19, 2008
    Date of Patent: March 25, 2014
    Assignee: Whirlpool Corporation
    Inventors: Matthew P. Ebrom, Mark E. Glotzbach, Richard A. McCoy
  • Patent number: 8683571
    Abstract: A system and method for authenticating a user in a secure computer system. A client computer transmits a request for a sign-on page, the secure computer system responds by transmitting a prompt for a first user identifier, and the client computer transmits a request including a first identifier, a second identifier stored in an object stored at the client computer and a plurality of request header attributes. A server module authenticates the first and second user identifiers, and compares the transmitted plurality of request header attributes with request header attributes stored at the computer system and associated with the first and second user identifiers. If the first and second user identifiers are authenticated, and if a predetermined number of transmitted request header attributes match stored request header attributes, the server software module transmits a success message, and the user is allowed to access the secure computer system.
    Type: Grant
    Filed: July 24, 2012
    Date of Patent: March 25, 2014
    Assignee: Keycorp
    Inventors: Onesimo Zapata, Susan E. Zielinski, Deana M. Flannery
  • Patent number: 8683548
    Abstract: An improved technique for delegating computing actions among different machines includes a policy engine that receives inputs specifying computing actions to be performed and automatically selects a virtual machine to perform each action. Machine selection is based on a policy, which recognizes multiple categories of computing actions, classifies each input as belonging to one of the categories, and directs each computing action to a virtual machine designated for performing only that one category of computing actions.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: March 25, 2014
    Assignee: EMC Corporation
    Inventors: Samuel Curry, Daniel Schiappa
  • Patent number: 8676159
    Abstract: In general, techniques are described for modifying control plane messages for subscriber sessions with a network device to add and/or modify discrete information elements and thereby conform the messages to different versions of mobile network specifications, including roaming protocols, executed by different mobile networks or by heterogeneous infrastructure elements within a mobile network. In some examples, an input network interface of a network device receives a roaming protocol message on an interface connecting a first support node of a first mobile network and a second support node of a second mobile network. A roaming protocol module of the network device modifies the roaming protocol message by adding or modifying a discrete information element to conform the roaming protocol message to a roaming protocol of the second mobile network. An output network interface of the network device sends the modified roaming protocol message to the second support node.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: March 18, 2014
    Assignee: Juniper Networks, Inc.
    Inventors: Jesse Shu, Mingming Quan, Jinfeng Yu, Qiong Wang, Qiuyuan Liu
  • Patent number: 8677113
    Abstract: A method and system for providing e-mail messages to a receiving e-mail application. The e-mail messages as sent from a sending e-mail application being secure and in opaque signed format. The opaque signed e-mail messages being converted to clear signed e-mail messages by decoding extracting message content and digital signatures. The clear signed e-mails being sent to a receiving e-mail application.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: March 18, 2014
    Assignee: BlackBerry Limited
    Inventors: Michael K. Brown, Michael S. Brown, Michael G. Kirkup
  • Patent number: 8677475
    Abstract: A communication system may be configured to provide multiple levels of security for a communication link between a first node and a second node of a network. The system may be further configured to select a first level of security from the multiple levels of security for transmitting first data send by a first client via the first node to the second node and to select a second level of security from the multiple levels of security for transmitting second data send by a second client via the first node to the second node, the second level of security being different than the first level of security.
    Type: Grant
    Filed: July 15, 2009
    Date of Patent: March 18, 2014
    Assignee: Infineon Technologies AG
    Inventors: Neal J. King, Charles Bry
  • Patent number: 8676998
    Abstract: A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection, the client transmits a request and the server performs or responds accordingly. A network management system and environment where this protocol can be used is also described and claimed.
    Type: Grant
    Filed: November 29, 2007
    Date of Patent: March 18, 2014
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8677114
    Abstract: Techniques are provided for enabling application steering/blocking in a secure network which includes a network entity, and a first tunnel endpoint coupled to the network entity over an encrypted tunnel. The first tunnel endpoint associates at least a first Security Parameter Index (SPI) to a first application identifier to generate first mapping information (MI), communicates the first MI to the network entity, and transmits an encrypted message to the network entity over the encrypted tunnel. The encrypted message includes an encrypted packet and an unencrypted header including the first SPI. The network entity determines the first SPI from the unencrypted header, determines the first application identifier based on the first SPI and the first MI, and identifies a first application associated with the first application identifier. The network entity can still perform application steering/blocking even though traffic passing through the tunnel is encrypted.
    Type: Grant
    Filed: January 4, 2007
    Date of Patent: March 18, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Adam C. Lewis, George Popovich, Peter E. Thomas
  • Publication number: 20140075541
    Abstract: Systems, methods, and computer-readable storage media for providing access to a firewalled resource are provided. A system includes a controller configured to be positioned outside of the firewall and configured to receive connection information from the resource through the firewall. The controller is configured to generate instructions for establishing a connection between the client device and the resource through the firewall based on the connection information received from the resource. The controller is configured to transmit the instructions to the client device. The client device is configured to open a connection between the client device and the resource through the firewall based on the instructions transmitted to the client device from the controller.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 13, 2014
    Inventors: Jason V. Young, Shawn L. Riesterer
  • Patent number: 8671446
    Abstract: A method, a system, and a computer program product embodying computer readable code for configuring a rule file for a Web application firewall. The method includes: blocking a response created by a Web application; modifying the response by adding capturing code for capturing a regular expression and an associated parameter value embedded in the response while being executed; sending the modified response to the browser; receiving a request submitted by the browser and at least one regular expression and an associated parameter value captured by the capturing code; determining a parameter name and a regular expression associated with the same parameter value, and configuring the rule file of the firewall by use of the determined parameter name and regular expression associated with one another as a filtering rule.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: March 11, 2014
    Assignee: International Business Machines Corporation
    Inventors: Da Ming Hao, Lin Luo, Ye Wang, Yu Zhang
  • Patent number: 8671273
    Abstract: A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.
    Type: Grant
    Filed: April 15, 2011
    Date of Patent: March 11, 2014
    Assignee: The University of Maryland
    Inventors: Ayan Roy-Chowdhury, John S. Baras
  • Patent number: 8670568
    Abstract: A computer platform is provided that comprises a processor and a cryptographic co-processor coupled to the processor. The computer platform further comprises a platform entity coupled to the processor. The platform entity establishes a secure relationship with the cryptographic co-processor that enables the platform entity to utilize cryptographic functions provided by the cryptographic co-processor.
    Type: Grant
    Filed: July 22, 2011
    Date of Patent: March 11, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wael M. Ibrahim, Graeme J. Proudler, Liqun Chen, Manuel Novoa
  • Patent number: 8661524
    Abstract: Techniques for selective desktop control of virtual private networks (VPN's) in a multiuser environment are provided. A multiuser desktop/workstation includes a first user that establishes a VPN session on the desktop for accessing protected resources. Other users are permitted to simultaneously access non-protected resources of the desktop during the VPN session. Other users are also permitted to log into the desktop during the VPN session. However, if the other users attempt to access the protected resources, the access attempts are denied.
    Type: Grant
    Filed: December 14, 2007
    Date of Patent: February 25, 2014
    Assignee: Novell, Inc.
    Inventors: Girish KS, Gautham Chambrakana Ananda, Vishnu Govind Attur, Allu Babula
  • Patent number: 8661498
    Abstract: A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises monitoring messages electronically transmitted over a network for embedded preselected data and performing content searches on the messages to detect the presence of the embedded preselected data using an abstract data structure derived from the preselected data.
    Type: Grant
    Filed: September 18, 2002
    Date of Patent: February 25, 2014
    Assignee: Symantec Corporation
    Inventor: Kevin T. Rowney
  • Patent number: 8661523
    Abstract: A method and system, used with an extended USB computer system, for locking out USB mass storage devices at the desktop. For lockout activation, a switch at each host computer is set, and causes a host-side lockout process to deliver a downstream lockout signal to the host's associated portal. This signal causes a portal-side lockout process to disallow USB data from a mass storage device from entering the network.
    Type: Grant
    Filed: September 3, 2010
    Date of Patent: February 25, 2014
    Assignee: ClearCube Technology, Inc.
    Inventors: Michael Barron, Raymond A. Dupont, Rajesh K. Mellacheruvu, Randy Printz, Syed Mohammad Amir Husain
  • Patent number: 8661507
    Abstract: Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity. Secure and remote operation includes authenticating at least one remote computer for connection to at least one computer over the network and/or at least one local computer for connection to at least one remote computer over the network; establishing a secure connection between the at least one local computer and the at least one remote computer over the network; and integrating a desktop of at least one remote computer on a display of at least one local computer. The connections may be made over a public network, as well as through multiple firewalls without loss of functionality.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: February 25, 2014
    Assignee: Western Digital Technologies, Inc.
    Inventors: Lambertus Hesselink, Dharmarus Rizal, Eric S. Bjornson
  • Patent number: 8656481
    Abstract: A method for configuring Internet Protocol Security (IPsec) protocol. The method includes configuring IPsec phase 1 Security Associations (SA) lifetimes and soft phase 2 SA lifetimes in a manner enabling efficient Dead Peer Detection recovery of secure communication between client and server in the event of a communication disruption and thereby preventing undesirable sustained periods of non-communication between client and server.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: February 18, 2014
  • Patent number: 8655315
    Abstract: The present invention provides a SMS authentication method. The SMS authentication method includes transferring the authentication message into different types of authentication codes and/or review codes, sending the authentication codes and/or review codes to the authentication request end and the user via different types, providing the authentication codes input by the user and the authentication codes from the authentication service supply end to the authentication service supply end by the authentication request end, and making the user determine according to the review codes whether the authentication procedure is correct. Hence, the SMS authentication method of the present invention prevents the authentication information from being illegally recorded or stole during the transmission of the authentication message and prevents the phone number from being stole or forged.
    Type: Grant
    Filed: January 31, 2011
    Date of Patent: February 18, 2014
    Assignee: Chunghwa Telecom Co., Ltd.
    Inventors: Chu-Fa Huang, Jui-Min Jiang
  • Patent number: 8656490
    Abstract: A method and apparatus for safe and secure access to dynamic domain name systems. In one embodiment a method comprises transmitting a DNS query to a dynamic DNS server. The DNS query comprises a domain name. A DNS answer is received from the dynamic DNS server in response to transmitting the DNS query. The DNS answer comprises an IP address. A request is transmitted to a host at the IP address in response to receiving the DNS answer. A digital certificate is received in response to transmitting the request. The received digital certificate is then compared with each of a plurality of digital certificates stored in memory. The IP address is transmitted to a client computer system if the received digital certificate compares equally with one of the plurality of digital certificates.
    Type: Grant
    Filed: September 14, 2010
    Date of Patent: February 18, 2014
    Assignee: Symantec Corporation
    Inventor: William E. Sobel
  • Patent number: 8656480
    Abstract: The present invention relates to a subscriber station security-related parameter negotiation method in a wireless portable Internet system. The subscriber station security-related parameter negotiation method includes security-related parameters in transmitting/receiving basic capability negotiation request messages and basic capability negotiation response messages such that the subscriber station and the base station negotiate the subscriber station security-related parameters. The security-related parameters include an authorization policy support subfield used to negotiate an authorization policy between the subscriber station and the base station, and message authentication code mode subfields used to negotiate a message authentication code mode.
    Type: Grant
    Filed: February 14, 2006
    Date of Patent: February 18, 2014
    Assignees: Samsung Electronics Co., Ltd, Electronics and Telecommunications Research Institute, KT Corporation, SK Telecom Co., Ltd, Hanaro Telecom., Inc.
    Inventors: Seok-Heon Cho, Tae-Yong Lee, Sun-Hwa Lim, Chul-Sik Yoon, Jun-Hyuk Song, Ji-Cheol Lee, Yong Chang
  • Patent number: 8656492
    Abstract: Systems, methods, and apparatus for network intrusion detection are provided. A device configured to facilitate network intrusion detection may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions. The at least one processor may be configured to access the at least one memory and execute the computer-executable instructions to (i) identify a communication, the communication comprising one of (a) a communication received by the device or (b) a communication generated by the device; (ii) identify a type associated with the communication; (iii) determine, based at least in part upon the identified type, a list of acceptable content for the communication; (iv) analyze, based at least in part upon the determined list, the content of the communication; and (v) determine, based at least in part upon the analysis, whether the content is acceptable content.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: February 18, 2014
    Assignee: General Electric Company
    Inventors: John Boot, Matthew Thomson, Bradley Richard Ree