Security Protocols Patents (Class 726/14)
-
Patent number: 8583935Abstract: Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.Type: GrantFiled: January 23, 2013Date of Patent: November 12, 2013Assignee: Lone Star WiFi LLCInventor: Scott C. Harris
-
Patent number: 8583914Abstract: In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a session key to use with communications between the client and the proxy and between the proxy and the server. Encrypted data may then be received from the client at the proxy. The proxy can decrypt the encrypted data for processing using the session key. In one embodiment, the decrypted data is not altered. The proxy then sends the encrypted data that was received from the client to the server without re-encrypting the data that was decrypted. Because the proxy did not alter the data in its processing of the decrypted data and the same session key is used between communications for the proxy and the server, the encrypted data stream that was received from the client can be forwarded to the server.Type: GrantFiled: May 25, 2012Date of Patent: November 12, 2013Assignee: Cisco Technology, Inc.Inventors: Etai Lev Ran, Ajit Sanzgiri
-
Patent number: 8578158Abstract: An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a command determination unit that determines whether an entered command is a target of a command execution determination where it is determined that whether a command is executable based on whether the entered command is invoked by a user command or a system command, and determines whether the entered command is executable with reference to the command execution right information stored in the memory when the entered command is determined as the target of the command execution determination.Type: GrantFiled: December 10, 2010Date of Patent: November 5, 2013Assignee: Fujitsu LimitedInventors: Takashi Matsuda, Yoshiyuki Ohhira
-
Patent number: 8578099Abstract: The present invention is directed towards integrating cache managing and application firewall processing in a networked system. An integrated cache/firewall system comprises an application firewall operating in conjunction with a cache managing system in operation on an intermediary device. The application firewall processes a received HTTP response to a request by a networked entity serviced by the intermediary device. The application firewall generates metadata from the HTTP response and stores the metadata in cache with the HTTP response. When a subsequent request hits in the cache, the metadata is identified to a user session associated with the subsequent request. The application firewall can modify a cache-control header of the received HTTP response, and can alter the cookie-setting header of the cached HTTP response.Type: GrantFiled: June 15, 2012Date of Patent: November 5, 2013Assignee: Citrix Systems, Inc.Inventors: Anoop Kandi Reddy, Craig Steven Anderson, Prakash Khemani
-
Publication number: 20130291089Abstract: The present invention, relating to the field of network technologies, discloses a data communication method and device and data interaction system based on browser. The method includes: receiving request data input by a user by using a browser; generating a request data packet using the request data according to a preset private protocol; and sending the request data packet to a server. The client includes: a receiving unit, a generating unit, and a sending unit. The data interaction system includes a client and a server. According to the present invention, a request data packet is generated for request data according to a preset private protocol, and then sent to a server. In addition, during the data communication process, other protocol-specific fields in HTTP are not carried, thereby reducing data transmission amount, saving bandwidths, and improving data transmission efficiency.Type: ApplicationFiled: August 11, 2011Publication date: October 31, 2013Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Xiaofeng Wang, Jiong Tang
-
Patent number: 8572719Abstract: According to certain aspects, a method for performing remote backup operations is provided that includes receiving a first unidirectional connection request from a media agent module to a proxy device within an enterprise network, through a firewall. The method also includes receiving a second unidirectional connection request from a remote device coupled to an untrusted network, such as through a second firewall. Secure connections are established from the media agent module to the proxy and from the remote device to the proxy. Additionally, the method can include routing with the proxy device backup data from the remote computing device to the media agent over the secured connections. The method also may include storing the backup data on a storage device within the enterprise network. In certain embodiments, during establishment of the secure connections, identification of the media agent or the storage device is not exposed to the untrusted network.Type: GrantFiled: May 27, 2011Date of Patent: October 29, 2013Assignee: CommVault Systems, Inc.Inventor: Andrei Erofeev
-
Patent number: 8572720Abstract: A system, method, and device optionally includes a server that is isolated from open networks which assigns secure random socket connections, e.g., communication ports that have randomly selected addresses that are hidden from accessing devices. Optionally, the secure random socket connections are dynamically assigned, i.e., the secure random socket connections are closed and opened with each command to access data secured by the server.Type: GrantFiled: May 20, 2013Date of Patent: October 29, 2013Inventors: Wayne Odom, Karolyn Gee
-
Patent number: 8572756Abstract: A CAPTCHA method executed by a CAPTCHA system is provided, comprising: receiving a CAPTCHA request comprising category information of an application service from an application server; responding to the application server with a token identifying the CAPTCHA request and a CAPTCHA image comprising a distorted advertisement word associated to the category information and a series of randomly generated and distorted characters, both the advertisement word and the characters being a CAPTCHA text intended to be typed by a user via a user equipment connected to the application server; receiving from the application server the token and a CAPTCHA answer submitted from the user equipment by the user; and verifying the token and the answer and returning to the application server a result of the verification. This provides an improved CAPTCHA system and method with better advertising effects and security.Type: GrantFiled: April 1, 2011Date of Patent: October 29, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Hui Hu, Hao Fang, Qingyan Liu
-
Patent number: 8572721Abstract: In a method and system for routing packets between clients, a packet is received from a first client connected to a secure sockets layer virtual private network (an SSL/VPN) network appliance. An identification is made, responsive to an inspection of the received packet, of i) a type of connection required for transmission of the received packet to a destination address identified by the received packet and ii) a second client connected via an SSL/VPN connection to the SSL/VPN network appliance and associated with the identified destination address. A request is made for establishment by the second client of a connection of the identified type within the SSL/VPN connection. The received packet is transmitted to the second client via the established connection of the identified type.Type: GrantFiled: August 3, 2006Date of Patent: October 29, 2013Assignee: Citrix Systems, Inc.Inventors: Arkesh Kumar, James Harris, Ajay Soni
-
Patent number: 8572735Abstract: An attack resistant continuous network service trustworthiness controller comprising: state estimation module(s), response selection module(s), actuation module(s), and client dispatcher communication module(s) for maintaining the availability and integrity of online server(s). The state estimation module(s) are configured to generate state estimate(s) for online server(s) using behavior data obtained using sensor module(s). The response selection module(s) are configured to determine corrective action(s) to maintain the availability and integrity of online server(s) when state estimate(s) indicate that the integrity of an online server(s) is compromised. The actuation module(s) are configured to activate actuator(s) based upon the corrective action(s). Client dispatcher communication module(s) are configured to communicate online server availability information to a client dispatcher.Type: GrantFiled: March 31, 2008Date of Patent: October 29, 2013Assignee: George Mason Research Foundation, Inc.Inventors: Anup K. Ghosh, Yih Huang, Arun Sood
-
Patent number: 8572723Abstract: The disclosure herein provides data security on a parallel computer system using virtual private networks connecting the nodes of the system. A mechanism sets up access control data in the nodes that describes a number of security classes. Each security class is associated with a virtual network. Each user on the system is associated with one of the security classes. Each database object to be protected is given an attribute of a security class. Database objects are loaded into the system nodes that match the security class of the database object. When a query executes on the system, the query is sent to a particular class or set of classes such that the query is only seen by those nodes that are authorized by the equivalent security class. In this way, the network is used to isolate data from users that do not have proper authorization to access the data.Type: GrantFiled: February 14, 2012Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: Eric Lawrence Barsness, David L. Darrington, Amanda Randles, John Matthew Santosuosso
-
Patent number: 8566953Abstract: A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the file is generated by displaying published identified objects according to associated viewing rights. A viewer at a client is presented with the named object view of the report, according to the viewing rights, such that the viewer's attention is focused on the published objects.Type: GrantFiled: September 24, 2007Date of Patent: October 22, 2013Assignee: Microsoft CorporationInventors: John Campbell, Boaz Chen, Daniel Battagin, Eran Megiddo, Yariv Ben-Tovim
-
Patent number: 8566919Abstract: A method for protecting a Web application running on a first local Web Server bases from hacker attacks, said Web Server being connectable to at least one client, the method comprising the following steps: —providing a plurality of preset rules on said Server, which correspond to specific characteristics of HTTP requests; —receiving an HTTP request on said server from the client, said HTTP request comprising a plurality of characteristics; —analyzing said characteristics of said received HTTP request in accordance with said rules provided on said server; —rejecting said HTTP request, if said rules identify said HTTP request as harmful request; —accepting said HTTP request, if said rules identify said HTTP request as trustable request; —classifying said HTTP request as doubtful request, if said rules identify said request neither as harmful request nor as trustable request; —evaluating the characteristics of said doubtful local request; —generating a learned rule on basis of the edge base evaluation.Type: GrantFiled: March 2, 2007Date of Patent: October 22, 2013Assignee: Riverbed Technology, Inc.Inventor: Alexander Meisel
-
Patent number: 8566922Abstract: A system for isolating a data communication network has been developed. The system includes an internal computer system with an internal computer that is in data communication with the internal computer system, and an external computer system with an external computer that is in data communication with the external computer system. The internal and external computers are connected with an ethernet adapter that only allows transmission of data from the internal computer system and prohibits the receipt of data by the internal computer system.Type: GrantFiled: May 25, 2011Date of Patent: October 22, 2013Inventor: Barry W. Hargis
-
Patent number: 8566899Abstract: Techniques for securing checked-out virtual machines in a virtual desktop infrastructure (VDI) are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for securing a checked-out guest virtual machine including receiving a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a client network element. The method for securing a checked-out guest virtual machines may also include configuring a security module for the guest virtual machine in order to secure the guest virtual machine and providing the security module to the guest virtual machine when the guest virtual machine is checked-out.Type: GrantFiled: March 16, 2011Date of Patent: October 22, 2013Assignee: Symantec CorporationInventors: Bruce McCorkendale, William E. Sobel, Matthew R. Barnes
-
Patent number: 8566457Abstract: On the content delivery side, a user management control unit manages authentication information and the distribution of a delivery list at the time of delivering service, the acceptance of a content select request, and charging and settlement on a user basis. On the other hand, an encrypted content control unit creates a content key and an encrypted content using the content key on the basis of a content key creating condition from a copyright owner or copyright manager. Then, an encrypted content key control unit encrypts the corresponding content key using medium information, or medium information and terminal device unique key information presented at the content request, delivers the key to the requester. Then, a content delivery control unit delivers the corresponding encrypted content to the requester at the content request.Type: GrantFiled: July 23, 2007Date of Patent: October 22, 2013Assignees: Kabushiki Kaisha Toshiba, Toshiba Communication Systems CorporationInventors: Shinichi Kurihara, Koji Nakashima
-
Patent number: 8560722Abstract: Techniques for limiting the risk of loss of sensitive data from a mobile device are provided. In one aspect, a method for managing sensitive data on a mobile device is provided. The method includes the following steps. A sensitivity of a data item to be transferred to the mobile device is determined. It is determined whether an aggregate sensitivity of data items already present on the mobile device plus the data item to be transferred exceeds a current threshold sensitivity value for the mobile device. If the aggregate sensitivity exceeds the current threshold sensitivity value, measures are employed to ensure the aggregate sensitivity remains below the current threshold sensitivity value for the mobile device. Otherwise the data item is transferred to the mobile device.Type: GrantFiled: March 18, 2011Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Stephen Carl Gates, Youngja Park, Josyula R. Rao, Wilfried Teiken
-
Patent number: 8560712Abstract: A method for detecting and applying security policy to active client requests within a secure user session begins by applying a first heuristic to a plurality of requests for a particular resource to identify a pattern indicating of an active client. In one embodiment, the heuristic evaluates a frequency of requests for the particular resource across one or more secure user sessions. Later, upon receipt of a new request for the particular resource, a determination is then made whether the new request is consistent with the pattern. If so, an action is taken with respect to a secure session policy. In one embodiment, the action bypasses the secure session policy, which policy is associated with an inactivity time-out that might otherwise have been triggered upon receipt of the new request. In addition, a second heuristic may be applied to determine whether a response proposed to be returned (in response to the new request) is expected by the active client. If so, the response is returned unaltered.Type: GrantFiled: May 5, 2011Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Christopher John Hockings, Trevor Scott Norvill, Scott Anthony Exton
-
Patent number: 8561166Abstract: Community based defense, in which multiple security devices operate as a part of a single community in providing security defense i.e. avoiding redundant security checks and enables efficient deployment and utilization of resources. The devices in a community communicate with each other to determine their roles and the security policies to enforce, based on the specific role they have undertaken. Thus primary player may operate with a larger set of security policies. However, the secondary players (operating on smaller policy sets) may periodically check the operational status of the primary player and assumes the role of primary, if needed. Later, it may gracefully relinquish the temporary role back to former primary, once the primary is up and operational.Type: GrantFiled: January 7, 2007Date of Patent: October 15, 2013Assignee: Alcatel LucentInventors: Seenu Banda, Ankur Prakash
-
Patent number: 8560679Abstract: A selected time interval of previously stored events generated by a number of computer network devices are replayed and cross-correlated according to rules. Meta-events are generated when the events satisfy conditions associated with one or more of the rules. The rules used during replay may differ from prior rules used at a time when the events occurred within a computer network that included the computer network devices. In this way, new rules can be tested against true event data streams to determine whether or not the rules should be used in a live environment (i.e., the efficacy of the rules can be tested and/or debugged against actual event data).Type: GrantFiled: February 18, 2011Date of Patent: October 15, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Hugh S. Njemanze, Debabrata Dash, Shijie Wang
-
Publication number: 20130269023Abstract: A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a firewall system and service can be implemented in conjunction with a content delivery network (CDN) having a plurality of distributed content servers. The CDN servers receive requests for content identified by the customer for delivery via the CDN. The CDN servers include firewalls that examine those requests and take action against security threats, so as to prevent them from reaching the customer site. The CDN provider implements the firewall system as a managed firewall service, with the operation of the firewalls for given customer content being defined by that customer, independently of other customers. In some embodiments, a customer may define different firewall configurations for different categories of that customer's content identified for delivery via the CDN.Type: ApplicationFiled: May 17, 2013Publication date: October 10, 2013Inventors: John A. Dilley, Prasanna Laghate, John Summers, Thomas Devanneaux
-
Patent number: 8555370Abstract: A microchip for a computer configured to connect to at least one network of computers. The microchip includes at least a first internal hardware firewall configured to deny access to at least a first protected portion of said microchip from said network, and at least one general purpose microprocessor including at least two general purpose core or general purpose processing units. At least a first core or processing unit is located within the first protected portion of the microchip. At least a second core or processing unit is located within a second portion of the microchip that is not protected by at least said first internal hardware firewall. At least the second core or processing unit is separated from the first core or processing unit by at least the first internal hardware firewall and is located between at least the first internal hardware firewall and the at least one network.Type: GrantFiled: August 24, 2012Date of Patent: October 8, 2013Inventor: Frampton E Ellis
-
Patent number: 8555056Abstract: A method and system for including security information with a packet is disclosed. A packet is detected as it exits a first network and enters a second network. The first network is configured to support a network security technique, and the second network is not configured to support the network security technique. Network security information associated with the network security technique is included with the packet. A network device is configured to include network security information in overhead of a packet. A method for identifying a first network device in a network is also disclosed. Identification information of the first network is communicated to a second network device.Type: GrantFiled: January 24, 2011Date of Patent: October 8, 2013Assignee: Cisco Technology, Inc.Inventors: Michael R. Smith, Padmanabha Nallur, Wilson Kok, Michael Fine
-
Patent number: 8555373Abstract: A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The software security component establishes state-less data identifying each packet that requires high-speed processing and loads a data table in the hardware component. The hardware component may then allow packets matching data of the data table to bypass the software component while passing other non-matching packets to the software component for more sophisticated state analysis.Type: GrantFiled: February 14, 2008Date of Patent: October 8, 2013Assignee: Rockwell Automation Technologies, Inc.Inventors: Brian A. Batke, Sivaram Balasubramanian
-
Publication number: 20130263249Abstract: A network element (NE) comprising a memory device configured to store instructions, and a processor configured to execute the instructions by dividing a first plurality of data packets of a data flow into a first plurality of sub-flows, and causing the first plurality of sub-flows to be transmitted to a second NE via a network, wherein the first plurality of sub-flows are transmitted using a first Internet Protocol Security (IPsec) security association (SA) cluster comprising a plurality of parallel sub-SAs. The disclosure also includes a NE comprising a processor configured to create an IPsec SA cluster comprising a first plurality of sub-SAs between the NE and a second NE using an internet key exchange (IKE) or an IKEv2, wherein the first sub-SAs are unidirectional, and wherein the first sub-SAs are configured to transport a first plurality of data packets in a common direction.Type: ApplicationFiled: March 28, 2013Publication date: October 3, 2013Applicant: Futurewei Technologies, Inc.Inventors: Jifei Song, Xiaoyong Yi, Xiangyang Zhang
-
Patent number: 8549617Abstract: An integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise VPN connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services. The multi-service client integrates with an operating system of the device to provide a VPN handler to establish a VPN connection with a remote VPN security device. The VPN network client includes to data acceleration module exchange network packets with the VPN handler and apply at least one acceleration service to the network packets, and a VPN control application that provides a unified user interface that allows a user to configure both the VPN handler and the data acceleration module.Type: GrantFiled: December 14, 2010Date of Patent: October 1, 2013Assignee: Juniper Networks, Inc.Inventors: Yin Wei, Subramanian Iyer, Richard Campagna, James Wood
-
Patent number: 8549615Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.Type: GrantFiled: December 1, 2008Date of Patent: October 1, 2013Assignee: Telefonaktiebolaget L M EricssonInventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Patent number: 8549162Abstract: The object of the present invention is to provide an image forming apparatus that can transmit and receive data without any process part of an application corresponding to various communication protocols and easily add a communication protocol and an application. An image forming apparatus according to the present invention includes connection request mediation means for, in response to a connection notice from a plurality of communication protocol daemons to transmit and receive data in accordance with respective different communication protocols, mediating connection instead of the communication protocol daemons by informing the application that a connection request is provided to the communication protocol daemons and a shared memory being used for delivery of received data and transmitted data between the application and the plurality of communication protocol daemons and being shared by the communication protocol daemon.Type: GrantFiled: April 30, 2010Date of Patent: October 1, 2013Assignee: Ricoh Company, Ltd.Inventor: Hiroyuki Matsushima
-
Patent number: 8549613Abstract: A system and method for enabling access to a computer server operating within a private network, in which the computer server is isolated by access restrictions that prevent incoming connections from a public network. In one embodiment, the method includes identifying a remote client operating in a public network outside the private network, initiating a secure communication channel with the remote client, and instructing the remote client to initiate a Point-to-Point Protocol (PPP) session with the computer server via the secure communication channel.Type: GrantFiled: May 28, 2008Date of Patent: October 1, 2013Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8549610Abstract: Data traffic is routed from a customer edge (CE) router to an Ethernet services router via a generic routing encapsulation (GRE) tunnel. Upon routing the data traffic from the CE router to the Ethernet services router, the data traffic is routed from the Ethernet services router to an aggregation switch. Upon routing the data traffic from the Ethernet services router to the aggregation switch, the data traffic is routed from the aggregation switch to a service switch through a security module, the security module configured to filter the data traffic. The filtered data traffic is routed from the service switch to the Ethernet services router. Upon routing the filtered data traffic from the service switch to the Ethernet services router, the filtered data traffic is routed from the Ethernet services router to a provider edge (PE) router.Type: GrantFiled: December 11, 2009Date of Patent: October 1, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Christopher O'Brien, Joseph Blanda, Jr., William Rehrmann, Markus Weber
-
Patent number: 8549614Abstract: Techniques are provided for sending from a client in a first network device a session initiate message over a first secure network connection that is configured to initiate a communications session with a client in a second network device. The session initiate message is configured to supply connection information for the second network device to establish a second secure network connection with the first network device. A session accept message is received from the client in the second network device over the first secure network connection that is configured to accept the communications session with the client in the first network device. The session accept message is configured to supply connection information for the first network device to establish the second secure network connection with the second network device. The second secure network connection is established between the first network device and the second network device using the connection information.Type: GrantFiled: December 4, 2009Date of Patent: October 1, 2013Assignee: Cisco Technology, Inc.Inventors: Rajesh Kumar, Michel Khouderchah, Baseer Khan
-
Patent number: 8549282Abstract: A method for efficiently decrypting asymmetric SSL pre-master keys is divided into a key agent component that runs in user mode, and an SSL driver running in kernel mode. The key agent can take advantage of multiple threads for decoding keys in a multi-processor environment, while the SSL driver handles the task of symmetric decryption of the SSL encrypted data stream. The method is of advantage in applications such as firewalls with deep packet inspection in which all encrypted data traffic passing through the firewall must be decrypted for inspection.Type: GrantFiled: June 22, 2007Date of Patent: October 1, 2013Assignee: Trend Micro IncorporatedInventors: Dale Sabo, Gerrard Eric Rosenquist
-
Patent number: 8549625Abstract: A method for identifying malware or unauthorized software communications implemented within a computer infrastructure, the method including detecting an encrypted communication and determining identification data for the encrypted communication. Additionally, the method includes comparing the detected encrypted communication to at least one of a list of applications authorized for encrypted communications using the identification data and a list of authorized destinations of encrypted communications using the identification data. Furthermore, the method includes identifying the detected encrypted communication as an unauthorized encrypted communication in response to a determination that at least one of the detected encrypted communication is from an unauthorized application, which is not on the list of applications authorized for encrypted communications, based on the comparing and the detected encrypted communication is to an unauthorized destination, which is not on the list of authorized destinations.Type: GrantFiled: December 12, 2008Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventor: Gunter D. Ollmann
-
Patent number: 8543930Abstract: System, method and computer program product for verifying an avatar owner as a human user of an avatar in a virtual world environment in which humans interact through avatars via client devices in network communication with a server device. A request for challenging an avatar in the virtual world environment is received to determine whether that avatar is controlled by an application program user (bot). A user client device associated with a challenged avatar is identified and a Human Identification Proof (HIP) message for detecting a human user versus a bot controlling the challenged avatar is generated and communicated, for receipt at the identified user client device. It is determined from the response, whether the user is a bot or a human user. If a challenged avatar is determined to be a bot, then the server device prevents the challenged avatar from further interaction in the virtual world environment.Type: GrantFiled: September 12, 2012Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: David F. Champion, Jeffrey J. Smith, Kevin J. Smith, David T. Windell
-
Patent number: 8544080Abstract: An apparatus for establishing a virtual private network with an internet protocol multimedia subsystem (IMS) device that includes a key derivation module, a tunneling protocol module, a tunnel management module, and a security policies module. The apparatus includes a non-volatile memory configured to store a first routing table that maps host addresses and IMS addresses of security devices allowing access to those hosts, such that when an application running in the IMS device requests communication to a host address, the apparatus initiates a session with the IMS address to which the host address is mapped. The session is initiated by a message that includes a body that contains, for each tunneling protocol supported by the tunneling protocol module, data about the local tunnel endpoint (e.g.Type: GrantFiled: June 12, 2008Date of Patent: September 24, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventor: Jesus Javier Arauz Rosado
-
Patent number: 8542825Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.Type: GrantFiled: June 10, 2011Date of Patent: September 24, 2013Assignee: Adobe Systems IncorporatedInventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
-
Patent number: 8544079Abstract: This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.Type: GrantFiled: August 24, 2010Date of Patent: September 24, 2013Assignee: Tectia OyjInventors: Tero Kivinen, Tatu Ylonen
-
Publication number: 20130247170Abstract: Disclosed is a computer implemented method to report a bad host. A receiver host receives a packet from a sender host. The receiver host detects that the packet contains suspect hostile content. The receiver host transmits a negative trust report.Type: ApplicationFiled: September 14, 2012Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eric P. Fried, Anand Goyal, Sipla Kosanam, Suresh Sabarathinam
-
Patent number: 8539571Abstract: A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.Type: GrantFiled: November 15, 2010Date of Patent: September 17, 2013Assignee: Cisco Technology, Inc.Inventor: Michael R. Smith
-
Patent number: 8539233Abstract: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.Type: GrantFiled: May 24, 2007Date of Patent: September 17, 2013Assignee: Microsoft CorporationInventors: Kedarnath A. Dubhashi, James M. Alkove, Patrik Schnell, Alexandre V. Grigorovitch, Vikram Mangalore
-
Patent number: 8539544Abstract: A method, apparatus, and electronic device for conforming integrity of a client device 106 are disclosed. A memory 1100 may store a policy tag 404 associated with a subgroup of a group of policies 1102 and having a tag timestamp. A network interface 1060 may receive the certificate of health 300 from the client device 106. A processor 1010 may extract from the certificate of health a certificate timestamp 302 and a policy tag 304. The processor 1010 may access the tag timestamp. The processor 1010 may execute a comparison of the certificate timestamp 302 with the tag timestamp. The network interface 1060 may grant access to a network 104 based in part upon the comparison.Type: GrantFiled: May 30, 2008Date of Patent: September 17, 2013Assignee: Motorola Mobility LLCInventors: Sandilya Garimella, John D. Bruner, Venu M. Chukkapalli, Baba Srinivasan
-
Patent number: 8539230Abstract: An information processing apparatus includes a memory that stores command execution right information including execution right information indicating whether a command is executable, and a command determination unit that determines whether an entered command is a target of a command execution determination where it is determined that whether a command is executable based on whether the entered command is invoked by a user command or a system command, and determines whether the entered command is executable with reference to the command execution right information stored in the memory when the entered command is determined as the target of the command execution determination.Type: GrantFiled: December 10, 2010Date of Patent: September 17, 2013Assignee: Fujitsu LimitedInventors: Takashi Matsuda, Yoshiyuki Ohhira
-
Patent number: 8537380Abstract: An image forming apparatus includes: a forming unit that includes an image forming function for forming an image; a restricting unit that restricts usage of the image forming function based on presence or absence of usage authorization for the image forming function of the forming unit; an adjusting unit that executes an image quality adjusting process to improve a quality of the image formed by the forming unit; and a control unit that inhibits the adjusting unit from executing the image quality adjusting process in accordance with presence or absence of restriction of the usage of the image forming function by the restricting unit.Type: GrantFiled: October 29, 2009Date of Patent: September 17, 2013Assignee: Brother Kogyo Kabushiki KaishaInventor: Akihiro Yamada
-
Patent number: 8533775Abstract: A system and method for administering access to a central resource by a remote access device. A system includes a remote access device and a computer executing a hierarchical policy manager. The remote access device requests access to a central resource. The hierarchical policy manager determines a policy for allowing the device to access the resource by evaluating access policies at a plurality of precedence levels of a policy hierarchy. The hierarchical policy manager allows the device to access the resource based on the policy set at the highest precedence level of the policy hierarchy at which access control is specified.Type: GrantFiled: June 13, 2008Date of Patent: September 10, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Byron A. Alcorn, Roland M. Hochmuth, Jeffrey J. Walls, Valentin Popescu, Thomas J. Flynn, Quoc P. Pham
-
Patent number: 8533827Abstract: The present disclosure provides a method for scalable anti-replay windowing. According to one exemplary embodiment, the method may include receiving at least one data packet having at least one new sequence number. The method may also include comparing the at least one new sequence number to an anti-replay window configured to prevent packet replay, the anti-replay window having at least one existing sequence number. The method may further include shifting the contents of the anti-replay window by varying the location of a starting index and an ending index. Of course, additional embodiments, variations and modifications are possible without departing from this embodiment.Type: GrantFiled: November 21, 2011Date of Patent: September 10, 2013Assignee: Intel CorporationInventors: Paul Burkley, Keith Critchley
-
Patent number: 8528071Abstract: A system and method for providing for a number of different authentication methods. The system and method can be used in conjunction with a data communications network, where client devices gain access to the data communications network through a network access device. The different authentication methods can allow for authentication based on a physical address for the client device, and can allow for authentication based on a web authentication procedure, and can provide for an authentication method which utilizes a combination of authentication methods which includes authentication based on both the physical address of the client device and based on user credential information.Type: GrantFiled: August 24, 2004Date of Patent: September 3, 2013Assignee: Foundry Networks, LLCInventor: Philip Kwan
-
Patent number: 8528057Abstract: A method, and apparatus for executing the method, that includes creating a virtual account not limited to being associated with any one of a plurality of servers. The method further includes matching at least some authentication credentials of a first server of the plurality of servers with at least some authentication credentials of the virtual account.Type: GrantFiled: March 7, 2006Date of Patent: September 3, 2013Assignee: EMC CorporationInventor: Steven Harold Garrett
-
Patent number: 8528092Abstract: A system, method, and computer program product are provided for identifying unwanted activity utilizing a honeypot accessible via virtual local area network (VLAN) trunking. In use, a honeypot device is allowed to be accessed via VLAN trunking. Furthermore, unwanted data is identified, utilizing the honeypot device.Type: GrantFiled: March 8, 2012Date of Patent: September 3, 2013Assignee: McAfee, Inc.Inventors: Vinoo Thomas, Nitin Jyoti
-
Patent number: 8528070Abstract: A secure service delivery network, including a service delivery compartment connected to deliver services to a plurality of client networks. The secure service delivery network includes a first firewall connecting the service delivery compartment to a first virtual local area network. The secure service delivery network includes a plurality of firewalls each connecting one of the plurality of client networks to the first virtual local area network, whereby no communications between the plurality of client networks can be made over the first virtual local area network. A related method is also described.Type: GrantFiled: September 5, 2007Date of Patent: September 3, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Bryan E. Stiekes, Shawn A. Williams
-
Patent number: 8522007Abstract: A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache.Type: GrantFiled: March 6, 2012Date of Patent: August 27, 2013Assignee: Cisco Technology, Inc.Inventors: Santanu Sinha, Kenneth William Batcher