Security Protocols Patents (Class 726/14)
-
Patent number: 8522034Abstract: Methods and systems are disclosed for providing secure transmissions across a network comprising a transmitting device and a receiving device. At the transmitting device, a stream of watermark bits is generated. Next, a plurality of watermarks is generated, each of the plurality of watermarks comprising an index number and a portion of the stream of watermark bits. The watermarks are inserted into each header of a plurality of outgoing packets. At the receiving device, the plurality of outgoing packets are received and it is determined if a received packet is valid based on the watermark in the header of the received packet. The stream of watermark bits may be generated using a stream cipher such as RC4, a block cipher such as 3DES in CBC mode, or other equivalent pseudo-random stream generating techniques.Type: GrantFiled: August 19, 2011Date of Patent: August 27, 2013Assignee: Google Inc.Inventors: Úlfar Erlingsson, Xavier Boyen, Darrell Anderson, Wayne Gray
-
Publication number: 20130219485Abstract: The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may include a Secure Frame Layer transport and security protocol that includes stages for initially configuring a requester device and a responder device, identifying the requester device and the responder device to one another, and authenticating message frames communicated between the requester device and the responder device. Additionally, the unified transport and security protocols may further include a Secure Persistent User Datagram Protocol that includes modes for processing message frames received at the requester device and the responder device, recovering the requester device in response to packet loss, retransmitting lost packets sent between the requester device and the responder device, and updating location information for the requester device to restore a communications session between the requester device and the responder device.Type: ApplicationFiled: November 15, 2012Publication date: August 22, 2013Inventors: Kenneth W. Garrard, Karl E. Elliott, Andy Huang
-
Patent number: 8516566Abstract: Systems and methods for providing Kerberos pre-authentication are presented. According to a method embodiment, a request for authentication is received from a principal of an authentication service. The principal in the authentication service is authenticated. A key associated with the authenticated principal in the authentication service is provided to a Kerberos Key Distribution Center (KDC).Type: GrantFiled: January 18, 2008Date of Patent: August 20, 2013Assignee: Apple Inc.Inventor: Rahul Srinivas
-
Patent number: 8515066Abstract: A method for establishing an encrypted communication channel between a first apparatus and a second apparatus by using a session management apparatus. The method includes: establishing a first encrypted communication channel between the session management apparatus and the first apparatus by performing mutual authentication between the session management apparatus and the first apparatus; establishing a second encrypted communication channel between the session management apparatus and the second apparatus by performing mutual authentication between the session management apparatus and the second apparatus; and exchanging key information between the first apparatus and the second apparatus via the first encrypted communication channel and the second encrypted communication channel so as to establish an encrypted communication channel between the first apparatus and the second apparatus.Type: GrantFiled: November 4, 2004Date of Patent: August 20, 2013Assignee: NTT Communications CorporationInventors: Makoto Saito, Osamu Tokunaga, Toshiyuki Yamasaki, Shin Miyakawa, Yasuhiro Shirasaki, Takamasa Uchiyama, Satoshi Fukada, Takashi Egashira, Toshiaki Suzuki
-
Patent number: 8510824Abstract: A method for digital copyright protection includes stream media server negotiation with a copyright center to generate copyright object RO, RO carrying copyright service regulations and establishing encrypted communication channel information; subscriber equipment receiving RO, through the establishing encrypted communication channel information carried by RO to establish encrypted communication channel with stream media server; and stream media server transmitting media stream to subscriber equipment. The present disclosure also discloses a DRM system, subscriber equipment and multi-media server.Type: GrantFiled: September 29, 2008Date of Patent: August 13, 2013Assignee: Huawei Technologies Co., Ltd.Inventors: Jian Yang, Qin Zhao
-
Publication number: 20130198798Abstract: An e-mail firewall applies policies to e-mail messages between a first site and second sites in accordance with administrator selectable policies. The firewall includes a simple mail transfer protocol relay for causing the e-mail messages to be transmitted between the first site and selected ones of the second sites. Policy managers enforce-administrator selectable policies relative to one or more of encryption and decryption, signature, source/destination, content and viruses.Type: ApplicationFiled: August 27, 2012Publication date: August 1, 2013Applicant: AXWAY, INC.Inventors: Robert D. Dickinson, III, Sathvik Krishnamurthy
-
Patent number: 8498419Abstract: A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the secure area. The system includes a plurality of perimeter Radio Frequency Sentry Devices (RFSDs) that are employed to establish the boundaries of said secure area around said wireless LAN. The wireless LAN being secured may be an industry standard IEEE 802.11a, 801.11b or 802.11g based wireless LAN or any other wireless LAN that uses packet based communication protocols. The said RFSDs may be stand-alone devices or they may be connected to a wired or wireless Local Area Network.Type: GrantFiled: May 23, 2011Date of Patent: July 30, 2013Assignee: Bella Tosso AG, L.L.C.Inventor: Sameer Tiwari
-
Patent number: 8495727Abstract: The claimed subject matter provides a system and/or a method that facilitates authenticating a data communication. An interface component can receive data related to a real time data communication between two or more clients. A verification component can employ a human interaction proof (HIP) to a client participating within the real time data communication, wherein a human identity of the client is authenticated as a function of a response to the HIP.Type: GrantFiled: August 7, 2007Date of Patent: July 23, 2013Assignee: Microsoft CorporationInventors: Rajesh Ramanathan, Amritansh Raghav, Craig M. Combel
-
Patent number: 8495721Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for specifying a data network security policy. In one aspect, a system includes a device-agnostic firewall policy that defines one or more rules for regulating data traffic on a data network. The device-agnostic firewall policy includes a policy definition and a security component. The policy definition delineates regulation of the data network traffic to be implemented by a firewall and a policy token definition that delineates a token used in the policy definition. The security component is implemented in hardware, in software executed on a data processing device, or in a combination thereof and is configured to permit a first group of one or more individuals to change both the policy definition and the policy token definition and a second group of one or more individuals to change the policy token definition while restricting the second group from changing the policy definition.Type: GrantFiled: June 30, 2010Date of Patent: July 23, 2013Assignee: Google Inc.Inventors: Peter Moody, Paul A. Watson
-
Patent number: 8495706Abstract: According to one embodiment, a television apparatus includes a receiving module, a display controller, a receiving controller, an obtaining module, a storage module, and a controller. The receiving module receives an operation for putting the television apparatus into a waiting state to connect to an external device. The display controller displays identification information identifying the television apparatus, security information generated randomly, and displays screen information received from the external device. The receiving controller receives the request for connection and the security information. The obtaining module obtains external-device identification information identifying the external device if communication with the external device is initiated. The storage module stores the external-device identification information.Type: GrantFiled: May 19, 2011Date of Patent: July 23, 2013Assignee: Kabushiki Kaisha ToshibaInventor: Tomohiro Kanda
-
Patent number: 8489892Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.Type: GrantFiled: March 17, 2008Date of Patent: July 16, 2013Assignee: Thomson LicensingInventors: Stephane Onno, Olivier Heen
-
Patent number: 8489889Abstract: A computing device receives a command to restrict access to encrypted data. The computing device generates a new record that can access the encrypted data. The computing device encrypts the record information for the new record using a public key of a trusted entity. The computing device prevents access to the encrypted data for a previously generated record or records.Type: GrantFiled: September 17, 2010Date of Patent: July 16, 2013Assignee: Symantec CorporationInventors: Vincent E. Moscaritolo, Jonathan D. Callas
-
Patent number: 8490175Abstract: A security method and system for Layer Independent Passive Clustering (LIPC) is presented. The inventive method and system maintains the states in the LIPC cluster formation protocol while adding a ‘Trusworthy’ event to each state and provides a methodology that depends on the state of the transmitting node to quantify Trustworthy and derive a Trust Confidence Value (TCV) to represent the level of confidence in quantifying ‘Trustworthy’. The invention dynamically computes a degree of trustworthiness for each participating network node and eliminates nodes from participating in the PC cluster formation protocol and packet forwarding if they do not meet established trust metrics. The security solution can also apply to PC-based Mobile Ad hoc Networks (MANETs). The novel system and method applies a multidimensional set of security algorithms to protect the LIPC cluster formation protocol from malicious attacks that compromise cluster formation and secure routing.Type: GrantFiled: December 6, 2011Date of Patent: July 16, 2013Assignee: Telcordia Technologies, Inc.Inventors: Melbourne Barton, Taek Jin Kwon
-
Patent number: 8490154Abstract: There is provided a computer-implemented method for authentication, the method comprising: defining a demanded level of security in an authorization service of a server; providing at least one authentication mechanism comprising at least one instance for at least one client; providing a policy comprising a security level for the at least one instance; receiving at least one request from the client to the server; authenticating the request based on the policy and the demanded level of security by the authentication service; and permitting the request if the demanded level of security is reached.Type: GrantFiled: September 21, 2007Date of Patent: July 16, 2013Assignee: SAP AGInventors: Laurent Y. Gomez, Ivonne Thomas
-
Patent number: 8490172Abstract: According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method also includes receiving a data packet from a first host. The method further includes determining that a first security association (SA) instance associated with the data packet is in an inactive state. The method further includes identifying a second SA instance that is both associated with the data packet and in an active state. The method further includes forwarding the data packet to the second SA instance.Type: GrantFiled: May 25, 2011Date of Patent: July 16, 2013Assignee: Genband US LLCInventors: Allain Legacy, Matthew Peters
-
Patent number: 8484712Abstract: The invention relates to a personal token including a microprocessor and a memory, said personal token storing and running a software entity which constitutes an end-point for communication over the internet. The software entity constitutes an end-point according to a signaling protocol over the internet and the signaling protocol is of the type intended when the session for real-time conferencing is initiated between end-points.Type: GrantFiled: June 8, 2007Date of Patent: July 9, 2013Assignee: Gemalto SAInventor: Herve Ganem
-
Patent number: 8484456Abstract: An electronic messaging system, including: a first message transfer server for receiving a message for a party, mapping the destination address of the message to a trusted address for the party, and substituting the trusted address for the destination address; and a second message transfer server for establishing an authenticated transport session with the first message transfer server to receive the message and transfer the message to a location corresponding to the trusted address.Type: GrantFiled: December 8, 2005Date of Patent: July 9, 2013Assignee: Alien Camel Pty Ltd.Inventors: Sydney Gordon Low, Matthew Iain Walker
-
Patent number: 8484711Abstract: System and method configured to provide an access management system configuration that provides the benefits of single sign-on while reducing internal hardware and administration maintenance costs. The system is reconfigured to provide an access control module that directs authentication network traffic such that access management agents are not required to be installed on the application server for each protected application. The system provides a redirection of a login request from the application server to an external security gateway that authenticates the user via policy and sends authenticated user credentials on a back channel to the access control module to obtain a session cookie which is redirected back to the user so the user can establish a session with the application. The solution reduces the plethora of agents to be maintained and upgraded in order to remain compatible with the evolving hosting software, reducing both hardware and administration maintenance costs.Type: GrantFiled: October 31, 2012Date of Patent: July 9, 2013Assignee: FMR LLCInventors: Michael Timothy Coletta, Kevin W. Park, Jon Alexander Lenzer
-
Patent number: 8484715Abstract: A network access method and system and a network connection device are provided. A network connection device connected between a first network and a second network obtains first network attribute information about a first network device according to an access request for accessing the second network from the first network device on the first network. The network connection device performs authentication on whether the first network device has a right to access the second network based on the first network attribute information. If the authentication is passed, the network connection device connects the first network device into the second network. If the authentication is not passed, the network connection device prohibits the first network device from accessing the second network.Type: GrantFiled: January 14, 2009Date of Patent: July 9, 2013Assignee: Huawei Technologies Co., Ltd.Inventor: Ru Liang
-
Publication number: 20130174246Abstract: A method in one embodiment includes establishing a first secure tunnel between a scanner and a configuration manager, and a second secure tunnel between the scanner and a scan controller, where the scanner is located in a public network and the configuration manager and the scan controller are located in a private network, communicating scanner configuration information between the scanner and the configuration manager over the first secure tunnel, and communicating scan information between the scanner and the scan controller over the second secure tunnel. The secure tunnels may be established from within the private network, by forwarding a first origination port and a second origination port to a first destination port and a second destination port, respectively. The first and second origination ports may be located in the public network, and the first and second destination ports may be located in the private network.Type: ApplicationFiled: December 29, 2011Publication date: July 4, 2013Inventors: Sven Schrecker, Brian Robison
-
Patent number: 8479277Abstract: An information processing apparatus includes: a connecting section; an information storage; a request accepting section; a searching section; a setting information storage; a determining section; and a process executing section.Type: GrantFiled: March 27, 2008Date of Patent: July 2, 2013Assignee: Fuji Xerox Co., Ltd.Inventors: Yoshiyuki Yoda, Masaki Kurokawa, Eiji Shimoichi, Yuriko Inakawa, Eiji Nishi, Noriyuki Tatsuma, Akira Okamoto, Takanari Ishimura, Akihide Oshima, Atsuhiro Itoh, Fumio Harada
-
Patent number: 8479259Abstract: An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the enterprises services from third parties. In the first layer, an implementation of the Secure Sockets Layer (SSL) version of HTTPS provides communications security, including authentication of the enterprise web server and the security of the transmitted data. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a “stateless” public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems.Type: GrantFiled: September 30, 2009Date of Patent: July 2, 2013Assignees: Verizon Business Global LLC, Verizon Patent and Licensing Inc.Inventors: Carol Y. Devine, Gerald A. Shifrin, Richard W. Shoulberg
-
Patent number: 8479278Abstract: The invention provides a data processing system for the support of secure networking on a single, virtualized hardware platform. The data processing system comprises a Network Interface Controller NIC to control access to a physical network; a first operating system comprising an NIC driver to manage the NIC, and a first Virtual Network Interface Controller VNIC driver. The system further comprises at least one second operating system comprising at least one second VNIC driver associated with a networking stack; and a Virtual Machine Monitor VMM to enable concurrent operation of the first and second operating systems, and to emulate a virtual network, the VMM comprising first and second VNICs to provide access to the virtual network by the first and second operating systems through the first and second VNIC drivers, respectively.Type: GrantFiled: October 2, 2009Date of Patent: July 2, 2013Assignee: Virtuallogix SAInventors: Vladimir Grouzdev, Philippe Gautron
-
Patent number: 8474053Abstract: A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a multi-nodal application (called execution units) are allowed to execute to insure data security. The security manager preferably checks the security relationships for security violations when new execution units start execution, when data moves to or from an execution unit, and when an execution unit requests external services. Where the security manager determines there is a security violation based on the security relationships, the security manager may move, delay or kill an execution unit to maintain data security.Type: GrantFiled: June 7, 2010Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Michael J. Branson, John M. Santosuosso
-
Patent number: 8473417Abstract: Communicating program data between a first device and a second device comprises disassembling a first program file comprising program data into at least one logical data unit, partitioning each of the at least one logical data unit into at least one protocol data unit and computing a first fingerprint over the payload portion of the at least one protocol data unit of the at least one logical data unit. The format of the at least one protocol data unit is defined by a communication protocol and includes a payload portion.Type: GrantFiled: June 6, 2011Date of Patent: June 25, 2013Assignee: Oracle America, Inc.Inventor: Eduard de Jong
-
Patent number: 8474034Abstract: An apparatus comprising a processor configured to implement an anti-replay check for a plurality of received packets and a plurality of corresponding sequence numbers; and a circular buffer coupled to the processor and comprising a bitmap, wherein the bitmap is slided in a circular manner by updating a low index that points to a first sequence number for a first received packet and a high index that points to a last sequence number for a last received packet without bit-shifting, and wherein, when the update results in the new value of one of the low index and the high index exceeding the end of the circular buffer, the one of the low index and the high index wraps around from the beginning of the circular buffer.Type: GrantFiled: April 19, 2011Date of Patent: June 25, 2013Assignee: Futurewei Technologies, Inc.Inventors: Xiangyang Zhang, Xiaoyong Yi
-
Patent number: 8468220Abstract: A computer executed method is disclosed for sorting a plurality of internet protocol (IP) addresses. The method includes dividing the range of IP addresses into a plurality of clusters representing a plurality of contiguous sub-ranges, assigning each IP address to the cluster associated with the sub-range that includes that IP address, and assigning the IP addresses in each cluster to one of a plurality of pages. If one of the pages has a size less than a page size limit, the method includes duplicating on that page at least one of the IP addresses assigned to that page. For each page, the IP addresses assigned to that page are ordered by numeric value. A network appliance incorporating aspects of the method is also disclosed.Type: GrantFiled: July 27, 2009Date of Patent: June 18, 2013Assignee: Techguard Security LLCInventor: David Edward Maestas
-
Publication number: 20130152191Abstract: A firewall cluster comprises three or more firewall processing nodes, which report primary node status based on the reporting node's membership in a preexisting cluster. A controller uses the reported status to assign a primary node in the distributed firewall cluster.Type: ApplicationFiled: December 13, 2011Publication date: June 13, 2013Inventors: David Andrew Bright, Michael James Silbersack, Aaron Christopher Bucher
-
Patent number: 8462786Abstract: A method is provided for constructing a packet classifier for a computer network system. The method includes: receiving a set of rules for packet classification, where a rule sets forth values for fields in a data packet and a decision for data packets having matching field values; representing the set of rules as a directed graph; partitioning the graph into at least two partitions; generating at least one lookup table for each partition of the graph; and instantiating the lookup tables from one partition on a first content-addressable memory and the lookup tables from the other partition on a second content-addressable memory device.Type: GrantFiled: August 13, 2010Date of Patent: June 11, 2013Assignee: Board of Trustees of Michigan State UniversityInventors: Alex X. Liu, Chad R. Meiners, Eric Torng
-
Patent number: 8463880Abstract: Systems and methods of removing a tunnel created when a client having an active IP session with a first portal point in a first subnet of a network, disconnects from the first portal point and reconnects to a second portal point in a second subnet of the network, the client maintaining an IP address assigned to it by the first subnet, embodiments of the method including the steps of determining whether data is scheduled to transfer from the second portal point to the client; if no data is scheduled, disconnecting the client from the second portal point; deactivating the IP session, whereby the IP address is released to the first subnet; removing the tunnel; reconnecting the client to the second portal point; and activating a second IP session between the client and the second portal point, whereby a second IP address is assigned to the client by the second subnet.Type: GrantFiled: March 24, 2008Date of Patent: June 11, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventor: Sankarlingam Dandabany
-
Patent number: 8464330Abstract: An agent device is connected with one or more image-forming devices in a local network having a firewall provided therein. A management device carries out remote management of the image-forming devices in the local network through the Internet. The agent device includes a command receiving unit which starts connection with the management device and receives a management command from the management device via the firewall, the command being sent by the management device in response to the connection. An image-forming-device communication unit receives device-state information of a corresponding one of the image-forming devices according to the management command. A command response transmitting unit transmits the device-state information to the management device through the Internet.Type: GrantFiled: December 15, 2008Date of Patent: June 11, 2013Assignee: Ricoh Company, Ltd.Inventor: Tatsuya Imai
-
Patent number: 8464329Abstract: A security device for SIP communications operates to inhibit the effect of malicious attacks and/or inadvertent erroneous events on the provision of SIP-based services within a private network and between private and public networks. The security device acts as a conventional Firewall, NAT and PAT to isolate SIP User Agents on the private network from SIP User Agents on the public network and to Blacklist undesired callers. Also, the security device preferably includes a virus scanner to scan attachments to sessions and/or other communications to identify and block virus contaminated data and the security device includes a hardened SIP stack to scan for and detect malformed SIP messages to prevent malicious attacks and/or inadvertent erroneous messages from adversely impacting the operation of SIP services.Type: GrantFiled: February 21, 2006Date of Patent: June 11, 2013Assignee: Watchguard Technologies, Inc.Inventor: Richard Melvin Fogel
-
Patent number: 8458786Abstract: Systems, methods and apparatus for tunneling in a cloud based security system. In an aspect, tunnel session data describing authentication and unauthenticated sessions, and location data describing tunnel identifiers for tunnels, locations, and security policies specific to the locations are accessed. Tunnel packets are received, and for each tunnel packet it is determined, from the tunnel identifier associated with the packet, whether a session entry in the session data exists for the tunnel identified by the tunnel identifier. In response to determining that a session entry does not exist in the session data, then a session entry is created for the tunnel identifier, an authentication process to determine a location to be associated with the session entry is performed, and an entry in the location data for the location is associated with the session entry.Type: GrantFiled: August 13, 2010Date of Patent: June 4, 2013Assignee: Zscaler, Inc.Inventors: Kailash Kailash, Jose Raphel, Srikanth Devarajan
-
Patent number: 8458467Abstract: Application message payload data elements are transformed within a network infrastructure element such as a packet data router or switch. The network element has application message transformation logic for receiving one or more packets representing an input application message logically associated with OSI network model Layer 5 or above; extracting an application message payload from the input application message; identifying one or more first content elements in the application message payload; transforming the first content elements into one or more second content elements of an output application message; and forwarding the output application message to a destination that is identified in the input application message. Transformations performed in the network element can include field reordering, field enrichment, field filtering, and presentation transformation.Type: GrantFiled: April 5, 2006Date of Patent: June 4, 2013Assignee: Cisco Technology, Inc.Inventors: Vinod Dashora, Sandeep Kumar
-
Publication number: 20130139247Abstract: In one embodiment, a processor-implemented method for monitoring network traffic between a first device executing a software application and a second device coupled to the first device. The method includes: (a) the processor analyzing application-level data contained within traffic originating from and/or received by the first device, the application-level data including data provided to and/or provided by the software application; (b) based on the results of the analysis in step (a), the processor creating one or more access rules; (c) the processor receiving a request from the second device to access the first device, the request including application-level data; and (d) the processor determining whether the request received in step (c) complies with one or more of the access rules.Type: ApplicationFiled: November 29, 2012Publication date: May 30, 2013Applicant: BAYSHORE NETWORKS, INC.Inventor: BAYSHORE NETWORKS, INC.
-
Publication number: 20130138958Abstract: Monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example method of assigning a sample set to a network device operating on a network may include identifying the at least one network device, and identifying at least one object identifier associated with the at least one identified network device. The method may also include transmitting the at least one object identified to a memory location, and comparing the at least one object identifier to a plurality of sample sets and assigning relevancy scores to the plurality of sample sets based on the comparison. The method may also include assigning at least one sample set having a greater relevancy score than the other sample sets to the at least one network device. The sample sets may be SNMP sample sets.Type: ApplicationFiled: January 28, 2013Publication date: May 30, 2013Inventor: Corey Dana Mandell
-
Patent number: 8452954Abstract: Methods and systems to bind a computer device to one or more computer systems, such that only an authorized computer system may access a protected portion of the device. A processor within the computer system may provide a proxy environment to interface between the device and a trusted environment of the computer system, such as a management environment that is secure from the proxy environment. The device may be configured to authenticate the trusted environment through the proxy environment, and to verify integrity of messages exchanged with the trusted environment through the proxy environment. Authentication may include a SSL and/or TSL handshake protocol. The device may be configured to authenticate a certificate, such as an X.509 certificate, a certificate chain, and/or a hash thereof. The device may include computer memory, a printer, display, circuit board, keyboard, mouse, pointing device, and/or other physical device.Type: GrantFiled: April 8, 2010Date of Patent: May 28, 2013Assignee: Intel CorporationInventors: Robert W. Strong, Steve Grobman, Craig Owen
-
Patent number: 8453230Abstract: A communicating apparatus that is able to perform IP-FAX communication without making the user aware of the attack and without any difficulty, even if the device recognizes a DoS attack or the like. communication that uses a SIP server on a network is performed by a communicating unit. Unauthorized communication from the communication performed by the communicating unit is detected. A port number of a receiving port of the communicating unit is changed when the unauthorized communication is detected. it is determined whether or not the detected unauthorized communication has passed through the SIP server.Type: GrantFiled: July 1, 2011Date of Patent: May 28, 2013Assignee: Canon Kabushiki KaishaInventor: Hidenori Yokokura
-
Patent number: 8452974Abstract: An image processing apparatus includes a first partial information providing unit that provides first partial information to another device holding a first signing key KS corresponding to a first verification key KV, the first partial information constituting a part of a second verification key KV? (KV??KV) that is capable of verifying an electronic signature ? generated using the first signing key KS and being unable to identify the second verification key KV?; a second partial information acquisition unit that acquires second partial information which is generated by the another device using the first partial information and the first signing key KS, and which is unable to identify the first signing key KS and used for generating the remaining part of the second verification key KV?; and a second verification key generation unit that generates the second verification key KV? based on the first and second partial information.Type: GrantFiled: April 23, 2010Date of Patent: May 28, 2013Assignee: Sony CorporationInventor: Koichi Sakumoto
-
Patent number: 8448236Abstract: A system, method, and device optionally includes a server that is isolated from open networks which assigns secure random socket connections, e.g., communication ports that have randomly selected addresses that are hidden from accessing devices. Optionally, the secure random socket connections are dynamically assigned, i.e., the secure random socket connections are closed and opened with each command to access data secured by the server.Type: GrantFiled: December 7, 2012Date of Patent: May 21, 2013Inventors: Wayne Odom, Karolyn Gee
-
Patent number: 8448235Abstract: An initiating device: generates a message having an ISAKMP-based header that includes a security parameter index (SPI) field; identifies a key in the SPI field of the ISKMP-based header; and sends the message to a responding device. The responding device: receives the message; extracts the key identifier; and when a shared key is selected using the key identifier, uses the selected shared key to establish, with the initiating device, a session having a secure tunnel.Type: GrantFiled: June 30, 2011Date of Patent: May 21, 2013Assignee: Motorola Solutions, Inc.Inventors: Timothy M. Langham, Thomas J. Senese
-
Publication number: 20130124851Abstract: A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module implementing a second security architecture different from the first security architecture. The network interface further includes a file-based application programming interface defining a plurality of attributes of the network interface and including at least one attribute associated with data security managed by one of the first and second security modules. The file-based application programming interface includes at least one attribute from among the plurality of attributes that is associated with selecting between the first or second security modules.Type: ApplicationFiled: November 11, 2011Publication date: May 16, 2013Inventor: Michael T. Kain
-
Patent number: 8441974Abstract: The present invention relates to a method of providing a multicast broadcast service. A message for providing an MBS (Multicast Broadcast Service) between network constituent elements is defined by applying a message defined in a wireless channel, and functions and parameters to be performed by the network constituent elements are defined. Therefore, the MBS can be provided in a wideband wireless access network that is a field of a mobile communication system and includes a wire channel.Type: GrantFiled: September 7, 2007Date of Patent: May 14, 2013Assignees: Samsung Electronics Co., Ltd., Electronics and Telecommunications Research Inst.Inventors: Jung-Mo Moon, Mi-Young Yun, Sang-Ho Lee
-
Patent number: 8443440Abstract: A distributed and coordinated security system providing intrusion-detection and intrusion-prevention for the virtual machines (VMs) in a virtual server is described. The virtualization platform of the virtual server is enhanced with networking drivers that provide a “fast path” firewall function for pre-configured guest VMs that already have dedicated deep packet inspection security agents installed. A separate security VM is deployed to provide virtual security agents providing deep packet inspection for non pre-configured guest VMs. The network drivers are then configured to intercept the data traffic of these guest VMs and route it through their corresponding virtual security agents, thus providing a “slow-path” for intrusion detection and prevention.Type: GrantFiled: April 3, 2009Date of Patent: May 14, 2013Assignee: Trend Micro IncorporatedInventor: William Gerald McGee
-
Publication number: 20130117837Abstract: A method may include defining a filter for a network device, the filter including a rule and a particular number of prioritized fields, where at least one of the prioritized fields is formatted to accept input as a range of values. The method may also include receiving a rule modification for the filter, the rule modification including at least one input as a range of values, and performing a check for conflicts of the rule modification with the rule in the filter. The method may further include expanding the input range of values to form multiple rules equivalent to the rule modification with the input range of values, establishing backtracking links to integrate the multiple rules with the existing rule, and adding the multiple rules to the filter.Type: ApplicationFiled: December 21, 2012Publication date: May 9, 2013Applicant: JUNIPER NETWORKS, INC.Inventor: Juniper Network, Inc.
-
Patent number: 8438380Abstract: A method for controlling a remote wireless device with a user device includes the user device sending a request message packet to the remote wireless device, where the remote wireless device verifies the request message packet and sends a reply message packet to the user device if the request message packet passes verification. The user device verifies the reply message packet and sends a control message packet to the remote wireless device if the reply message packet passes verification. The remote wireless device verifies the control message packet and sends an acknowledgment message packet to the user device if the control message packet passes verification.Type: GrantFiled: December 2, 2009Date of Patent: May 7, 2013Assignees: Ambit Microsystems (Shanghai) Ltd., Hon Hai Precision Industry Co., Ltd.Inventors: Chi-Ming Lu, Dong-Ming Li
-
Method and system for using neighbor discovery unspecified solicitation to obtain link local address
Patent number: 8438390Abstract: A system that facilitates enhancing security for a computer device by obtaining a link layer address of an IPv6 IPsec address. The system including a computer device having a software module, which performs the following steps: capturing multicast addresses and solicited multicast addresses for one or more IPv6 IPsec addresses; calculating the computer device identifier from the one or more multicast addresses and solicited multicast addresses; storing the computer device identifier for the one or more multicast addresses and solicited multicast addresses; sending a neighbor solicitation to one or more of the IPv6 IPsec addresses as a tentative target address simulating double address detection; capturing the neighbor advertisement response from the one or more IPv6 IPsec addresses and calculating a link-layer identifier; generating a neighbor cache with the link-layer identifier; and enabling IPv6 IPsec communication with the one or more IPv6 IPsec addresses using the link-layer identifier.Type: GrantFiled: December 22, 2010Date of Patent: May 7, 2013Assignee: Konica Minolta Laboratory U.S.A., Inc.Inventor: Maria Perez -
Patent number: 8438629Abstract: A packet security method and apparatus adjusts a security level of the packet according to a feature of the packet. The packet security method includes detecting a feature of a packet to be transmitted, determining a security level of the packet according to the detected feature, and generating a security packet according to the determined security level. The feature of the packet is at least one of a destination address of the packet, a transfer protocol of the packet, a packet size, an application for the packet, and a designated security level for the packet. According to the method, the security function is adoptively applied according to the feature of the packet being transmitted, and thus flexibility can be provided in the application of the security function to achieve an efficient use of resources.Type: GrantFiled: February 17, 2006Date of Patent: May 7, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Yung-ji Lee, Kyung-hee Lee
-
Patent number: 8438624Abstract: A method for modifying one or more system resources is provided. One or more licenses for modifying one or more system resources on a client device can be acquired. An authenticator can be generated and stored on a remote server. The authenticator can be transferred to the client device. The client device can be connected to the remote server and the remote server can authenticate the client device via the authenticator. The remote server can confirm the availability of one or more licenses, and based on the availability of one or more licenses, modify one or more system resources disposed in, on, or about the client device. After modifying the one or more system resources the remote server can decrement the remaining license count.Type: GrantFiled: March 3, 2009Date of Patent: May 7, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Paul J Broyles, Bernard D Desselle
-
Patent number: 8438627Abstract: A system, a method and computer-readable media for establishing connectivity over a plurality of access technologies. A system is provided that includes a client device. The client device is configured to communicate over a network by utilizing at least two access technologies. The system also includes a gateway in communication with the client device. The gateway includes multiple access technology termination nodes configured to support communications utilizing multiple access technologies. The gateway also includes a registration manager configured to assign the client device an address for identifying the client device. The registration manager is further configured to maintain the address assigned to the client device when the client device switches from utilizing a first access technology to utilizing a second access technology.Type: GrantFiled: October 3, 2006Date of Patent: May 7, 2013Assignee: Sprint Communications Company L.P.Inventors: Brent Hirschman, Jeremy Breau