Security Protocols Patents (Class 726/14)
  • Patent number: 8800024
    Abstract: A method is provided in one example embodiment that includes intercepting a network flow to a destination node having a network address and sending a discovery query based on a discovery action associated with the network address in a firewall cache. A discovery result may be received and metadata associated with the flow may be sent to a firewall before releasing the network flow. In other embodiments, a discovery query may be received from a source node and a discovery result sent to the source node, wherein the discovery result identifies a firewall for managing a route to a destination node. Metadata may be received from the source node over a metadata channel. A network flow from the source node to the destination node may be intercepted, and the metadata may be correlated with the network flow to apply a network policy to the network flow.
    Type: Grant
    Filed: October 17, 2011
    Date of Patent: August 5, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 8799984
    Abstract: A client-side user agent operates in conjunction with an identity selector to institute and exercise privacy control management over user identities managed by the identity selector. The user agent includes the combination of a privacy enforcement engine, a storage of rulesets expressing user privacy preferences, and a preference editor. The editor enables the user to direct the composition of privacy preferences relative to user identities. The preferences can be applied to individual cards and to categorized groups of attributes. The engine evaluates the proper rulesets against the privacy policy of a service provider. The privacy preferences used by the engine are determined on the basis of specifications in a security policy indicating the attribute requirements for claims that purport to satisfy the security policy.
    Type: Grant
    Filed: May 27, 2009
    Date of Patent: August 5, 2014
    Assignee: Open Invention Network, LLC
    Inventor: Gail-Joon Ahn
  • Patent number: 8799985
    Abstract: Architecture that provides additional data that can be obtained and employed in security models in order to provide security to services over the service lifecycle. The architecture automatically propagates security classifications throughout the lifecycle of the service, which can include initial deployment, expansion, moving servers, monitoring, and reporting, for example, and further include classification propagation from the workload (computer), classification propagation in the model, classification propagation according to the lineage of the storage location (e.g., virtual hard drive), status propagation in the model and classification based on data stored in the machine.
    Type: Grant
    Filed: March 19, 2010
    Date of Patent: August 5, 2014
    Assignee: Microsoft Corporation
    Inventors: Anders B. Vinberg, John Neystadt, Yair Tor, Oleg Ananiev
  • Patent number: 8800025
    Abstract: An integrated virtual desktop and security management system provides the virtual desktop server functionality and, more importantly, security management for computing devices and servers in the corporate data network. The computing devices include computers running virtual desktop client software and computers running a complete operating system and applications. The system in this invention can intercept data packets exchanged among the computing devices and servers and also can scrutinize virtual machine computing and networking activities, and therefore, possess the capability of analyzing, logging, reporting, and permitting or denying computing and networking activities of devices in the corporate data network.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: August 5, 2014
    Inventors: Hei Tao Fung, Hsingyi Lee
  • Patent number: 8800040
    Abstract: A computer-implemented method for prioritizing the monitoring of malicious uniform resource locators for new malware variants may comprise: 1) identifying at least one malicious uniform resource locator, 2) collecting priority information relating to the malicious uniform resource locator, wherein the priority information comprises information relevant to prioritizing monitoring of the malicious uniform resource locator for new malware variants, 3) determining, based on the priority information, a monitoring-priority level for the malicious uniform resource locator, and then 4) allocating, based on the monitoring-priority level, a monitoring resource for monitoring the malicious uniform resource locator. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: August 5, 2014
    Assignee: Symantec Corporation
    Inventors: Xiao Dong Tan, Fan Bai, Yin Ming Mei
  • Patent number: 8800023
    Abstract: Enabling a client computer to perform an operation is disclosed. Login information is received from a client computer. The login information is confirmed by querying a trusted agent on the client computer.
    Type: Grant
    Filed: August 16, 2011
    Date of Patent: August 5, 2014
    Assignee: EMC Corporation
    Inventors: Jeffery Gordon Heithcock, David William Barry, II, Dennis Bishop Jones
  • Patent number: 8793762
    Abstract: A method of playing content across a network includes receiving, at a media player, an input from a user selecting media located on a network, sending a request across a network comprised of devices employing a common security protocol, the request to identify peer devices on the network, receiving a response across the network from a peer device, and accessing the media from a content memory of the peer device. A method of tracking valid peers on a secure media network, includes receiving, at a media player, an input from a user selecting media located on a peer device on the network, performing an authentication test of the peer player, determining if a latency associated with the peer player meets a criteria, and updating a latency log on the media player to include the peer player.
    Type: Grant
    Filed: August 11, 2011
    Date of Patent: July 29, 2014
    Assignee: Secure Content Storage Association LLC
    Inventors: Aaron Marking, Kenneth Goeller, Jeffrey Bruce Lotspiech
  • Patent number: 8793486
    Abstract: A method for buffering SSL handshake messages prior to computing a message digest for the SSL handshake includes: conducting, by an appliance with a client, an SSL handshake, the SSL handshake comprising a plurality of SSL handshake messages; storing, by the appliance, the plurality of SSL handshake messages; providing, by the appliance to a message digest computing device in response to receiving a client finish message corresponding to the SSL handshake, the plurality of SSL handshake messages; receiving, by the appliance from the message digest computing device, a message digest corresponding to the provided messages; determining by the appliance, the message digest matches a message digest included in the SSL client finish message; and completing, by the appliance with the client, the SSL handshake. Corresponding systems are also described.
    Type: Grant
    Filed: January 9, 2012
    Date of Patent: July 29, 2014
    Assignee: Citrix System, Inc.
    Inventors: Tushar Kanekar, Sivaprasad Udupa
  • Publication number: 20140208413
    Abstract: A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server. In specific embodiments, a security module may add information about the application to traffic flow. A trapping module may monitor for a memory condition and identify the memory condition. The trapping module may also, responsive to identifying the memory condition, initiate a virtual environment for the application, and check the integrity of the traffic flow.
    Type: Application
    Filed: January 23, 2013
    Publication date: July 24, 2014
    Inventors: Steve Grobman, Raj Samani, Ofir Arkin, Sven Schrecker
  • Patent number: 8788820
    Abstract: The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An active software agent is utilized to fetch passwords and user identifiers from a user computing system and to use the passwords and identifiers to extract required information from the secure site. The password sites and identifiers are encrypted and an encryption key is stored at a network mode remote from the user's computer and is fetched in order to enable the passwords and identifiers to be decrypted so that the active agent can use them to obtain the required information.
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: July 22, 2014
    Assignee: Ewise Systems Pty Ltd
    Inventors: Alexander Grinberg, Mike Kontorovich, Mark Chazan, Colin Reyburn
  • Publication number: 20140201829
    Abstract: A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module implementing a second security architecture different from the first security architecture. The network interface further includes a file-based application programming interface defining a plurality of attributes of the network interface and including at least one attribute associated with data security managed by one of the first and second security modules. The file-based application programming interface includes at least one attribute from among the plurality of attributes that is associated with selecting between the first or second security modules.
    Type: Application
    Filed: March 18, 2014
    Publication date: July 17, 2014
    Applicant: UNISYS CORPORATION
    Inventor: Michael Kain
  • Patent number: 8782752
    Abstract: Servers are configured to operate in two or more threshold security planes with each such threshold security plane implementing at least a portion of a corresponding threshold security protocol involving at least a subset of the servers. The servers are implemented on at least one processing device comprising a processor coupled to a memory. Multiple ones of the servers may be implemented on a single processing device, or each of the servers may be implemented on a separate processing device. At least one of the servers may be part of at least two of the threshold security planes. A given request for a protected resource is processed through each of the planes in order for a corresponding user to obtain access to the protected resource. By way of example, the security planes may comprise two or more of an authentication plane, an access control plane and a resource plane.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: July 15, 2014
    Assignee: EMC Corporation
    Inventors: Ari Juels, Nirav Mehta
  • Patent number: 8782771
    Abstract: Providing for employing a real time firewall to secure components of an automation control network from unauthorized communication to or from such components is disclosed herein. A monitoring component can inspect at least a portion of an instance of communication directed toward or originating from a component of the automation control network. Such inspection can, e.g., be a deep packet inspection based on information received from a communication request and/or response protocol. A filtering component can selectively admit or deny propagation of the instance of communication based on the inspection and a predetermined security criterion. In such a manner, the subject innovation can provide for limited access to network components from office network machines and for securing components of an automation control network from influence by unauthorized entities.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: July 15, 2014
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Chao Chen, Steven J. Scott
  • Publication number: 20140196141
    Abstract: At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model includes a plurality of message model sections. A representation of the at least one of an HTTP request message and an HTTP response message is parsed into message sections in accordance with the message model sections of the HTTP message model. A plurality of security rules are bounds to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition, which is based, at least in part, on a corresponding given one of the message sections. The at least one of an HTTP request message and an HTTP response message is processed in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.
    Type: Application
    Filed: January 6, 2014
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Ji, Lin Luo, Vugranam C. Sreedhar, Shun Xiang Yang, Yu Zhang
  • Patent number: 8776210
    Abstract: A system and method are disclosed for improving a statistical message classifier. A message may be tested with a machine classifier, wherein the machine classifier is capable of making a classification on the message. In the event the message is classifiable by the machine classifier, the statistical message classifier is updated according to the reliable classification made by the machine classifier. The message may also be tested with a first classifier. In the event that the message is not classifiable by the first classifier, it is tested with a second classifier, wherein the second classifier is capable of making a second classification. In the event that the message is classifiable by the second classifier, the statistical message classifier is updated according to the second classification.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: July 8, 2014
    Assignee: SonicWALL, Inc.
    Inventors: Jonathan J Oliver, Scott Roy, Scott D. Eikenberry, Bryan Kim, David A. Koblas, Brian K. Wilson
  • Patent number: 8776237
    Abstract: Methods and apparatus are provided for end-to-end security in heterogeneous networks. Hop-by-hop protection techniques ensure that each hop of a signaling path is satisfying one or more predefined security criteria. An end-to-end path is secured at each node by identifying a next hop in the end-to-end path; determining, in response to a received call setup request, if a vendor associated with the next hop in the end-to-end path has satisfied one or more predefined security criteria; and routing the call to the next hop if the vendor has satisfied the one or more predefined criteria. A look-up table can be used to determine whether a vendor has satisfied the one or more predefined security criteria. The look-up table can identify one or more of: (i) vendors that have achieved a predefined security rating; (ii) members in a predefined consortium or business group; and (iii) signatories to a predefined contract or technical specification.
    Type: Grant
    Filed: February 17, 2006
    Date of Patent: July 8, 2014
    Assignee: Alcatel Lucent
    Inventor: Eric H. Grosse
  • Patent number: 8776211
    Abstract: Devices, systems, methods, and other embodiments associated with processing commands according to authorization are described. In one embodiment, a chip includes an unsecure module configured to control unsecure firmware to process a command on data flowing in a datapath. The unsecure module processes commands from untrusted sources and trusted sources. The chip includes a secure module configured to determine if a command is from a trusted source and when the command is from a trusted source, the secure module controls secure firmware to further process the data flowing in the datapath. When the command is from an untrusted source, the secure module controls the secure firmware to not process the data flowing in the datapath.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: July 8, 2014
    Assignee: Marvell International Ltd.
    Inventors: Phuc Thanh Tran, Bing Xiao, Tze Lei Poo, Peter Nhat Dinh
  • Patent number: 8776208
    Abstract: Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between devices. A firewall may thus provide greater granularity of security and integrate more closely with other security methods to provide better overall security with fewer conflicts.
    Type: Grant
    Filed: March 22, 2012
    Date of Patent: July 8, 2014
    Assignee: Microsoft Corporation
    Inventors: Eran Yariv, Gerardo Diaz-Cuellar, David Abzarian
  • Publication number: 20140189846
    Abstract: Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone or motor vehicle, e.g.).
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Applicant: Elwha LLC
    Inventors: Philip Lionel Barnes, Hon Wah Chin, Howard L. Davidson, Kimberly D.A. Hallman, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Brian Lee, Richard T. Lord, Robert W. Lord, Craig J. Mundie, Nathan P. Myhrvold, Nicholas F. Pasch, Eric D. Rudder, Clarence T. Tegreene, Marc Tremblay, David B. Tuckerman, Charles Whitmer, Lowell L. Wood, JR.
  • Patent number: 8769662
    Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS.
    Type: Grant
    Filed: October 22, 2012
    Date of Patent: July 1, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Lusheng Ji, Dan Pei, Jia Wang
  • Patent number: 8769265
    Abstract: A system and method for providing persistence in a secure network access by using a client certificate sent by a client device to maintain the identity of a target. A security handshake is performed with a client device to establish a secure session. A target is determined. A client certificate is associated with the target. During subsequent secure sessions, the client certificate is used to maintain persistent communications between the client and a target. A session ID can be used in combination with the client certificate, by identifying the target based on the session ID or the client certificate, depending on which one is available in a client message.
    Type: Grant
    Filed: March 4, 2013
    Date of Patent: July 1, 2014
    Assignee: F5 Networks, Inc.
    Inventors: John R. Hughes, Richard Roderick Masters, Robert George Gilde
  • Patent number: 8769286
    Abstract: A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.
    Type: Grant
    Filed: September 20, 2011
    Date of Patent: July 1, 2014
    Assignee: Daon Holdings Limited
    Inventors: Conor Robert White, Christopher Eric Holland, Jason Scott Cramer, Christopher James Mort, John Francis Oakley, III
  • Patent number: 8769261
    Abstract: A method provides subscriber-specific activation of network-based mobility management using an authentication server. According to the method, network-based mobility management is enforced, even if the mobile terminal supports terminal-based mobility management. This gives a network provider complete control over mobility management in his network, preventing configuration problems during the configuration of mobile terminals. In the method, after the successful authentication of a subscriber, the authentication server transmits an authentication confirmation message to an authentication client in an access network. The received authentication confirmation message contains an activation attribute for activating network-based mobility management, if the authentication server does not provide a common mobile key for terminal-based mobility management.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: July 1, 2014
    Assignee: Siemens Aktiengesellschaft
    Inventors: Rainer Falk, Christian Günther, Dirk Kröselberg
  • Patent number: 8763075
    Abstract: A method and apparatus for network access control includes an apparatus for granting a computing device access to a network, the apparatus having a plurality of substantially similar access devices, wherein each access device comprises a status-determination module to determine an access status based at least in part on whether the computing device is compliant with an access policy, an access-grant module configured for receiving an access status corresponding to the computing device from one or more of the access devices, and granting the computing device access to the network according to at least one of the access status determined by the status-determination module or the received access status.
    Type: Grant
    Filed: March 7, 2012
    Date of Patent: June 24, 2014
    Assignee: Adtran, Inc.
    Inventors: Thomas F. Guevin, Sohil Babubhai Thakkar, Duane Charles Compton, Patrick Joseph Foy
  • Patent number: 8762541
    Abstract: Devices, systems and methods that route a communication link to a proper destination are disclosed. The method may include connecting the communication link to a first destination; requesting a response from the first destination; validating the response from the first destination; and disconnecting the communication link to the first destination if the response from the first destination is not valid. The method may also include connecting the communication link to a second destination; requesting a response from the second destination; and disconnecting the communication link to the second destination if the response from the second destination is not valid. The devices, systems and methods may provide hunt group, call center and conference call features as discussed later herein.
    Type: Grant
    Filed: February 25, 2005
    Date of Patent: June 24, 2014
    Assignee: Siemens Enterprise Communications, Inc.
    Inventor: Mallikarjuna Samayamantry
  • Patent number: 8763107
    Abstract: Apparatus, methods and software that implement cross-connected, server-based, IP-connected, point-to-point connectivity between remotely located firewall-protected devices. The apparatus, methods, and software allow user computers to communicate with remotely located firewall-protected devices that without the necessity to configure the firewalls. The apparatus methods, and software are implemented using a relay server that runs software that implements communication between an arbitrary number of firewall-protected devices and an arbitrary number of firewall-protected user computers that are remotely-located from the devices.
    Type: Grant
    Filed: August 3, 2009
    Date of Patent: June 24, 2014
    Assignee: Omnimetrix, LLC
    Inventor: Harold M. Jarrett, Jr.
  • Patent number: 8762447
    Abstract: Systems, methods and apparatus are provided through which in some aspects a method to provide secure communications between a plurality of computers over a public network includes establishing a connection over the public network between the plurality of computers by mimicking hypertext transport protocol (HTTP) enterprise tunnel (HET) server protocol and changing the connection to a multiplexing protocol.
    Type: Grant
    Filed: May 2, 2008
    Date of Patent: June 24, 2014
    Assignee: General Electric Company
    Inventor: Ofir Oren-Dahan
  • Patent number: 8755066
    Abstract: At an extended function server side, user information is received, and a user authentication process is executed. When the authenticity is established, an extended function table is read out, and an extended function list is generated in correspondence with users, based on the extended function table. Then, determination is made as to whether there is an extended function list set in correspondence with a user. When there is an extended function list set in correspondence with a user, the extended function list is transmitted. At the MFP side, the extended function list transmitted from the extended function server is received. Then, the received extended function list is registered.
    Type: Grant
    Filed: May 29, 2009
    Date of Patent: June 17, 2014
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventor: Takao Shudo
  • Patent number: 8756701
    Abstract: A data security manager in a multi-nodal environment enforces processing constraints stored as security relationships that control how different pieces of a multi-nodal application (called execution units) are allowed to execute to insure data security. The security manager preferably checks the security relationships for security violations when new execution units start execution, when data moves to or from an execution unit, and when an execution unit requests external services. Where the security manager determines there is a security violation based on the security relationships, the security manager may move, delay or kill an execution unit to maintain data security.
    Type: Grant
    Filed: February 20, 2013
    Date of Patent: June 17, 2014
    Assignee: International Business Machines Corporation
    Inventors: Michael J. Branson, John M. Santosuosso
  • Patent number: 8755522
    Abstract: Approaches for combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes for secure transmission of the information are disclosed. In some implementations, first information and second information may be received. A first data slice representing a portion of the first information may be generated based on a first cryptographic scheme. A second data slice representing a portion of the second information may be generated based on a second cryptographic scheme different than the first cryptographic scheme. A first header may be generated such that the first header may specify the first cryptographic scheme for the first data slice and the second cryptographic scheme for the second data slice. A first data packet may be generated such that the first data packet may include the first header, the first data slice, and the second data slice.
    Type: Grant
    Filed: August 16, 2013
    Date of Patent: June 17, 2014
    Assignee: Luminal, Inc.
    Inventors: Josha Stella, Dominic Zippilli, Matthew Brinkman
  • Patent number: 8756676
    Abstract: A system and method whereby an unregistered, anonymous user at an organization's website makes a submission/inquiry and is able to access a secure response containing private information without pre-registering or establishing an account with the organization. A response to the user is made via an unsecured e-mail notification that provides the user with an HTTPS link to an authentication page. The user then enters his/her user identification, for example, the user email address and password which was associated with the original submission/inquiry. Once the email address and password is authenticated, the secure response message is displayed on the user's web browser in SSL. Each response is provided on a per-submission basis.
    Type: Grant
    Filed: October 1, 2010
    Date of Patent: June 17, 2014
    Assignee: Citicorp Development Center, Inc.
    Inventors: Sikun Lan, Yong K. Huang, Kent Frazier, Roy Sykes, Joseph Zusman
  • Patent number: 8756682
    Abstract: According to some embodiments of the invention, a method for network protection is provided. The method includes receiving with a network security software a request from an entity to stop at least a portion of unauthorized network traffic from being transmitted through a firewall. The entity lacks control over the firewall and the network security software is operable to control the firewall. The method also includes using the network security software to automatically determine that the entity is an authorized entity authorized to make the request. The method also includes initiating a block of the unauthorized network traffic at the firewall in response to the automatic determination.
    Type: Grant
    Filed: December 20, 2004
    Date of Patent: June 17, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Sebastian Glania
  • Patent number: 8752174
    Abstract: Disclosed herein are systems, methods, and computer-readable storage media for a honeypot addressing cyber threats enabled by convergence of data and communication services in an enterprise network. Suspicious incoming VoIP calls from the Internet to the enterprise network are intercepted and directed to a VoIP honeypot that acts as a network decoy and responds automatically during call sessions for the suspicious incoming VOIP calls while tracing the suspicious incoming VOIP calls. Suspicious outgoing VoIP calls from the enterprise network to the Internet are also intercepted and directed to the VoIP honeypot. Moreover, an unsolicited VoIP call is redirected to the VoIP honeypot when the unsolicited VoIP call has been received by a user agent in the enterprise network and a human user of the user agent confirms that the unsolicited VoIP call was unsolicited.
    Type: Grant
    Filed: December 27, 2010
    Date of Patent: June 10, 2014
    Assignee: Avaya Inc.
    Inventors: John F Buford, Venkatesh Krishnaswamy
  • Patent number: 8751675
    Abstract: Techniques presented herein provide approaches for managing rack servers. In one embodiment, a message is received from a management controller of a rack server and via a switch port, where the message requests a lease for a network address under a first protocol. Upon determining that the management controller is a supported device, the switch port is configured to allow network traffic under at least a second protocol.
    Type: Grant
    Filed: June 21, 2011
    Date of Patent: June 10, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Sriranjan Bose, Gururaja Nittur, Chidananda Satya Kumar Patchava
  • Patent number: 8752137
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: June 10, 2014
    Assignee: Bladelogic, Inc.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Allen Solin, Carl Adams
  • Patent number: 8752129
    Abstract: In one embodiment, the methods and apparatuses to assign a routing address to a wireless computer that is in a different logical network from the routing addresses of other wireless computers within the same physical wireless network; and to prevent a wireless computer from learning the routing address of another wireless computer within the same physical wireless network.
    Type: Grant
    Filed: October 12, 2005
    Date of Patent: June 10, 2014
    Inventor: Alex I. Alten
  • Patent number: 8745723
    Abstract: The system and method described herein may provide unified transport and security protocols. In particular, the unified transport and security protocols may include a Secure Frame Layer transport and security protocol that includes stages for initially configuring a requester device and a responder device, identifying the requester device and the responder device to one another, and authenticating message frames communicated between the requester device and the responder device. Additionally, the unified transport and security protocols may further include a Secure Persistent User Datagram Protocol that includes modes for processing message frames received at the requester device and the responder device, recovering the requester device in response to packet loss, retransmitting lost packets sent between the requester device and the responder device, and updating location information for the requester device to restore a communications session between the requester device and the responder device.
    Type: Grant
    Filed: November 15, 2012
    Date of Patent: June 3, 2014
    Assignee: Aunigma Network Security Corp.
    Inventors: Kenneth W. Garrard, Karl E. Elliott, Andy Huang
  • Patent number: 8745717
    Abstract: An electronic device, system and method for automatically managing wireless connections with a plurality of other devices are provided. The electronic device may be a security token access device and may be adapted to wirelessly pair and optionally securely pair with other devices. Connection information, which may comprise security information, is maintained at the electronic device for each connected device. When a connected device becomes stale, the electronic device implements one or more steps to manage the stale device's connection.
    Type: Grant
    Filed: December 12, 2011
    Date of Patent: June 3, 2014
    Assignee: BlackBerry Limited
    Inventor: Neil Patrick Adams
  • Patent number: 8745381
    Abstract: Methods, systems, and computer readable media for accelerating stateless IPsec traffic generation by performing ESP rehashing of ESP packets are disclosed. A first ESP packet is generated by encrypting a portion of the packet and adding ESP headers and trailers to the encrypted portion, hashing the encrypted portion and the ESP header to compute a first ESP integrity check value (ICV), and adding the ESP ICV as a trailer to the ESP packet. At least one second ESP packet is generated by modifying parameters in the first ESP packet. The first and second ESP packets are transmitted to a device under test.
    Type: Grant
    Filed: October 19, 2011
    Date of Patent: June 3, 2014
    Assignee: IXIA
    Inventor: Alexandru R. Badea
  • Patent number: 8745718
    Abstract: Information useful for authenticating an entity is sent over a back channel during the authentication of an entity to a RESTful service. The delivery of the entity-related information is triggered by the validation of a service ticket received by the authentication component of the RESTful service.
    Type: Grant
    Filed: October 2, 2012
    Date of Patent: June 3, 2014
    Assignee: Jericho Systems Corporation
    Inventors: Michael Dufel, Vijayababu Subramanium, Mizanul Chowdhury
  • Patent number: 8745706
    Abstract: Various embodiments of systems and methods for providing a secure communication are described herein. A client application generates a Distributed Ruby (DRb) request based on a request received from a user. The obtained DRb request is wrapped to obtain an HTTPS request, which includes the DRb request and one or more authentication information. The generated HTTPS request is forwarded to an HTTPS server, which verifies the HTTPS request based on the authentication information. The HTTPS request is then unwrapped to obtain the DRb request, which is executed by a DRb server to obtain a result of execution of the DRb request.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: June 3, 2014
    Assignee: Business Objects Software Limited
    Inventors: Alexei Potiagalov, Cheong-Wei Chu
  • Patent number: 8739274
    Abstract: A device that implements a method for performing integrated caching in a data communication network. The device is configured to receive a packet from a client over the data communication network, wherein the packet includes a request for an object. At the operating system/kernel level of the device, one or more of decryption processing of the packet, authentication and/or authorization of the client, and decompression of the request occurs prior to and integrated with caching operations. The caching operations include determining if the object resides within a cache, serving the request from the cache in response to a determination that the object is stored within the cache, and sending the request to a server in response to a determination that the object is not stored within the cache.
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: May 27, 2014
    Assignee: Citrix Systems, Inc.
    Inventors: Prakash Khemani, Prabakar Sundarrajan, Lakshmi Kumar, Kailash Kailash, Ajay Soni, Rajiv Sinha, Saravanakumar Annamalaisami
  • Patent number: 8739243
    Abstract: A device within the network receives a domain name service (DNS) request for an address of a first resource outside the network, the first resource associated with a security policy of the network. An address of a second resource within the network is returned to the device within the network in response the DNS request, the second resource address having previously been associated with the first resource address. A first encrypted connection is established between the device and the second resource, and a second encrypted connection is established between the second resource and the first resource, to facilitate encrypted communication traffic between the device and the first resource. The encrypted communication traffic passing between the device and the first resource is selectively decrypted and inspected depending on the address of the first resource.
    Type: Grant
    Filed: April 18, 2013
    Date of Patent: May 27, 2014
    Assignee: Phantom Technologies, Inc.
    Inventor: Paul Michael Martini
  • Patent number: 8739245
    Abstract: Systems, methods, and other embodiments associated with flexible supplicant access control are described. One example method includes collecting a network information associated with a network to which an endpoint is to be communicatively coupled. The network information comprises a network identification and information to facilitate the evaluation of network threats. The example method may also include classifying the network based, at least in part, on the network information, to assign a variable level access parameter (VLAP) to the network based on the policy locally configured on the endpoint or centrally managed by the administrator. The VLAP may establish three or more access levels for the network at the endpoint. The example method may also include communicating the network identification and the network VLAP to a second endpoint, a security agent, a security application, and so on.
    Type: Grant
    Filed: January 14, 2009
    Date of Patent: May 27, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Joseph Salowey, Hao Zhou, Jason Frazier
  • Patent number: 8739272
    Abstract: A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received. The session descriptor and the content tag may be correlated with a network policy, which may be applied to the network connection. In some embodiments, the content tag may be received with the session descriptor. The file may be tainted by another file in some embodiments, and the content tag may be associated with other file.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: May 27, 2014
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Robert Ma
  • Publication number: 20140143854
    Abstract: A method for balancing load among firewall security devices in a network is disclosed. Firewall security devices are arranged in multiple clusters. A switching device is configured with the firewall security devices by communicating control messages and heartbeat signals. Information regarding the configured firewall security devices is then included in a load balancing table. A load balancing function is configured for enabling the distribution of data traffic received by the switching device. A received data packet by the switching device is forwarded to one of the firewall security devices in a cluster based on the load balancing function, the load balancing table and the address contained in the data packet.
    Type: Application
    Filed: December 27, 2013
    Publication date: May 22, 2014
    Applicant: FORTINET, INC.
    Inventors: Edward Lopez, Joe Mihelich, Matthew F. Hepburn
  • Publication number: 20140143853
    Abstract: To isolate a terminal from a network immediately after a quarantine agent is uninstalled therefrom, a policy readout unit reads out a policy from a policy database and a policy check unit determines whether or not a terminal satisfies the policy that was read out. If it is determined that the terminal satisfies the read out policy, a quarantine server control unit instructs a bridge to destroy a packet with no VLAN tag among the packets sent from the terminal while controlling a quarantine agent to send a packet with a VLAN tag when sending the packet from the terminal.
    Type: Application
    Filed: July 9, 2012
    Publication date: May 22, 2014
    Applicant: NEC CORPORATION
    Inventor: Hisato Onodera
  • Publication number: 20140143855
    Abstract: The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely communicating data packets. Such a communication system (100) comprises a first device (124, 136), an intermediate device (110) and a second device (102). The first device (124, 136) communications via a first network (120), which is based on a first transport protocol and a first transport security protocol with the intermediate device (110). The second device (102) communications via a second network, which is based on a second transport protocol and a second transport security protocol with the intermediate device (110). The intermediate device (110) modifies packets received via first network to packets suitable for communication via the second network, and vice versa. The first device (124, 136) is able to reconstruct a header of a received packet as if the packet was sent via the second network (108) and its transport and security protocols.
    Type: Application
    Filed: July 24, 2012
    Publication date: May 22, 2014
    Applicant: KONINKLIJKE PHILIPS N.V.
    Inventors: Sye Loong Keoh, Oscar Garcia Morchon, Sandeep Shankaran Kumar, Martina Brachmann, Bozena Erdmann
  • Patent number: 8732818
    Abstract: End-to-end authentication capability based on public-key certificates is combined with the Session Initiation Protocol (SIP) to allow a SIP node that receives a SIP request message to authenticate the sender of request. The SIP request message is sent with a digital signature generated with a private key of the sender and may include a certificate of the sender. The SIP request message my also be encrypted with a public key of the recipient. After receiving the SIP request, the receiving SIP node obtains a certificate of the sender and authenticates the sender based on the digital signature. The digital signature may be included in an Authorization header of the SIP request, or in a multipart message body constructed according to the S/MIME standard.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: May 20, 2014
    Assignee: Microsoft Corporation
    Inventors: Jeremy T. Buch, David J. Simons
  • Patent number: 8732810
    Abstract: A persistent connection is used for real-time or near real-time data transfer from a push platform on a network to a mobile station. To establish and maintain the persistent connection between the mobile station and push platform on the network, various protocols are defined over a packet connection between the mobile station and push platform. The real-time or near real-time data is pushed or sent by the push platform to the mobile station, as the data becomes available from a data source. In particular, heartbeat messages are used to determine whether or not the persistent connection is alive and available for real-time or near real-time data transfer. When the persistent connection is lost, the mobile station uses a retry connection scheme based on the number of connection attempts made by the mobile station for establishing a new persistent connection to the push platform.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: May 20, 2014
    Assignee: Cellco Partnership
    Inventors: Venkat Gaddam, Shahid Ahmed, Sankar Shanmugam, SM Masudur Rahman, William Cory Hawkins