Stand-alone Patents (Class 726/16)
-
Publication number: 20130212671Abstract: In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each with their own processing units and memories, and a defined set of interfaces that interconnect the two sub-systems and the external world. One sub-system is designed to provide a familiar environment for running computer applications. The other sub-system is designed to provide a secure bridge between the first sub-system and users via input and output devices.Type: ApplicationFiled: February 14, 2012Publication date: August 15, 2013Applicant: Janus Technologies, Inc.Inventors: Chen-Hua Wang, Sofin Raskin, Leonid Rozenboim
-
Patent number: 8510849Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: GrantFiled: June 14, 2010Date of Patent: August 13, 2013Assignee: Intertrust Technologies CorporationInventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
-
Patent number: 8510825Abstract: Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in the BIOS of the client. The policy data describes one or more policies which the client should follow. When an operating system agent detects that a condition, specified by a particular policy of the one or more policies, has been met, the operating system agent performs one or more actions specified by the particular policy, such as disabling the client, retrieving a file from the client, erasing a file from the client, or encrypting a file on the client. The operating system agent is one or more software modules that execute in the operating system of the client.Type: GrantFiled: August 7, 2009Date of Patent: August 13, 2013Assignee: Absolute Software CorporationInventors: Anahit Tarkhanyan, Ravi Gupta, Gaurav Banga
-
Patent number: 8510856Abstract: An image forming device is provided with a use permission determining portion, an authentication process requesting portion and a job executing portion. The use permission determining portion performs determination whether or not use of the image processing device should be permitted for a user who wants to use the image processing device. The authentication process requesting portion requests the authentication server via a network to act for the determination when the use permission determining portion cannot perform the determination. The job executing portion performs the image processing of process specifics designated by the user when a determination result indicating that the user can use the image forming device is obtained.Type: GrantFiled: February 9, 2006Date of Patent: August 13, 2013Assignee: Konica Minolta Business Technologies, Inc.Inventor: Akira Murakawa
-
Patent number: 8505082Abstract: When a plurality of information processing apparatuses having an authentication function executes a cooperative job, user authentication information is transmitted from a cooperative information source processing apparatus to a destination cooperative information processing apparatus that executes the cooperative job. It is determined whether or not a user account with authentication information that is the same as the transmitted authentication information exists in the destination cooperative information processing apparatus. The determined result is then notified to the cooperative information source processing apparatus. In this case, when the cooperative information source processing apparatus is notified that a user account with the same authentication information does not exist, the cooperative information source processing apparatus creates a user account based on the authentication information.Type: GrantFiled: February 26, 2010Date of Patent: August 6, 2013Assignee: Canon Kabushiki KaishaInventor: Kou Hiraike
-
Patent number: 8504842Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for receiving, by a computing system that is locked, input from a user that provides an unlocking pattern. During entry of the unlocking pattern, a display of the computing system does not provide a visual indication of an action that will be performed upon the user completing the unlocking pattern. The computing system compares the provided unlocking pattern to a plurality of stored unlocking patterns to determine whether the provided unlocking pattern matches any of the stored unlocking patterns. The stored unlocking patterns are associated with respective actions that are performed upon completion of the respective unlocking patterns. The unlocking patterns are associated with a same level of unlocked security access to the computing system. The computing system responds by unlocking the computing system and performing the action that is associated with the matching unlocking pattern.Type: GrantFiled: March 23, 2012Date of Patent: August 6, 2013Assignee: Google Inc.Inventor: John W. Meacham
-
Publication number: 20130198831Abstract: A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.Type: ApplicationFiled: January 27, 2012Publication date: August 1, 2013Applicant: MICROSOFT CORPORATIONInventors: Daniel B. Jump, Brian T. Carver, David C. LeBlanc
-
Publication number: 20130198832Abstract: Mechanisms are provided to efficiently and effectively authenticate a user of a device. Passcode information such as passwords, pins, and access codes are obtained along with biometric information to periodically authenticate a user of a device. A user identity confidence score may be generated and continually modified by using data such as passcode information, biometric information, and/or user physical interaction characteristics information. If the user identify confidence score falls beneath a particular threshold, additional user authentication information may be requested.Type: ApplicationFiled: January 31, 2012Publication date: August 1, 2013Applicant: DELL Products L.P.Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse
-
Publication number: 20130198833Abstract: A method of and system for securely executing an application on a computer system such that a user of the computer system cannot access or view unauthorized content available on the computer system or accessible using the computer system. To securely execute an such method and system may terminate any unauthorized processes executing (i.e., running) on the computer system application prior to execution of the application, and may configure the application such that unauthorized content cannot be accessed, including configuring the application such that unauthorized processes cannot be initiated (i.e., launched) by the application. Further, such system and method may terminate any unauthorized processes detected during execution of the application, and may disable any functions of the computer system that are capable of accessing unauthorized content, including disabling any functions capable of initiating processes on the computer system.Type: ApplicationFiled: October 30, 2012Publication date: August 1, 2013Applicant: Software Secure, Inc.Inventor: Software Secure, Inc.
-
Patent number: 8499346Abstract: A method of providing secure authentication of a service user at a self-service terminal is described. The method comprises: detecting attempted access by the service user to a restricted function on the self-service terminal and ascertaining if a predefined operating system account is present on the terminal. In the event that the predefined operating system account is not present, then the method comprises permitting access to the restricted function by the service user. In the event that the predefined operating system account is present, then the method comprises requesting the service user to provide login credentials and authenticating the login credentials using the operating system account. If the login credentials are not authenticated, access to the restricted function is denied; whereas, if the login credentials are authenticated, access to the restricted function is permitted.Type: GrantFiled: December 18, 2009Date of Patent: July 30, 2013Assignee: NCR CorporationInventors: Andrew D. J. Kilgore, Ranjith T. Suresh, Stefano Cipollone
-
Patent number: 8495705Abstract: A computer-implemented method for data-loss prevention may include: 1) identifying data associated with a user, 2) determining that the data is subject to a data-loss-prevention scan, 3) identifying a data-loss-prevention reputation associated with the user, and then 4) performing a data-loss-prevention operation based at least in part on the data-loss-prevention reputation associated with the user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 20, 2010Date of Patent: July 23, 2013Assignee: Symantec CorporationInventors: Amit Verma, Anindya Banerjee, Rajorshi Ghosh Choudhury, Sumesh Jaiswal
-
Patent number: 8495379Abstract: A method and system manage a hierarchy of passwords for users accessing a hierarchy of access control devices. First, a codeword is acquired and a syndrome of the codeword is determined. Next, the codeword is randomly modified with a probability p to produce a modified codeword. The modified codeword is selected and assigned to a user as a password, if the modified codeword is recoverable.Type: GrantFiled: January 22, 2009Date of Patent: July 23, 2013Assignee: Mitsubishi Electric Research Laboratories, Inc.Inventors: Shantanu Rane, Yige Wang, Jonathan S. Yedidia, Anthony Vetro
-
Publication number: 20130185787Abstract: A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects.Type: ApplicationFiled: March 6, 2013Publication date: July 18, 2013Inventors: J. Bradley Chen, Matthew T. Harren, Matthew Papakipos, David C. Sehr, Bennet S. Yee, Gregory Dardyk
-
Patent number: 8490154Abstract: There is provided a computer-implemented method for authentication, the method comprising: defining a demanded level of security in an authorization service of a server; providing at least one authentication mechanism comprising at least one instance for at least one client; providing a policy comprising a security level for the at least one instance; receiving at least one request from the client to the server; authenticating the request based on the policy and the demanded level of security by the authentication service; and permitting the request if the demanded level of security is reached.Type: GrantFiled: September 21, 2007Date of Patent: July 16, 2013Assignee: SAP AGInventors: Laurent Y. Gomez, Ivonne Thomas
-
Patent number: 8489892Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.Type: GrantFiled: March 17, 2008Date of Patent: July 16, 2013Assignee: Thomson LicensingInventors: Stephane Onno, Olivier Heen
-
Patent number: 8490093Abstract: Determining execution rights for a process. A user selects a process for execution. A driver intercepts the execution and communicates with a service or its remote agent. Configuration data is accessed to determine an execution role specifying whether the process should be denied execution or should execute with particular rights to access or modify system resources. The execution role is provided to the driver, and the driver allows or denies execution of the process in accordance with the provided execution role.Type: GrantFiled: February 5, 2007Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Mark Russinovich, Bryce Cogswell, Wesley G. Miller
-
Publication number: 20130179964Abstract: Systems, methods and products directed toward providing security in hybrid information handling device environments are described herein. One aspect an information handling device comprising: one or more processors; and one or memories storing program instructions accessible by the one or more processors; wherein, responsive to execution of program instructions stored in the one or more memories, the one or more processors are configured to: ascertain a resume request for resuming to a secondary operating environment; and prior to resuming the information handling device to the secondary operating environment, initiate a primary operating environment security application. Other embodiments are described herein.Type: ApplicationFiled: January 5, 2012Publication date: July 11, 2013Applicant: Lenovo (Singapore) Pte. Ltd.,Inventors: Jennifer Zawacki, Steven R. Perrin, Scott E. Kelso, James S. Rutledge, Matthew P. Roper, Jian Li, Yi Zhou
-
Patent number: 8484450Abstract: Various embodiments disclosed herein are directed to gaming devices having a secured basic input/output system (BIOS) and methods for determining the validity of the gaming device's BIOS. According to one embodiment, the gaming device includes a secured module for authenticating the BIOS of the gaming device. During the boot-up process, the secured module selects a challenge from a plurality of challenges, and the selected challenge is issued to the BIOS. The BIOS generates a response to the challenge, and the secured module determines whether the BIOS response matches the calculated response of the secured module. If the BIOS response matches the secured module response, the gaming device continues the boot process. Otherwise, the boot process is halted by the gaming device.Type: GrantFiled: December 2, 2009Date of Patent: July 9, 2013Assignee: Bally Gaming, Inc.Inventors: Anand Singh, Pravinkumar Patel, Anthony E. Green, Raymond C. Cammilleri, Peter R. Pitts
-
Patent number: 8484735Abstract: an apparatus comprises a data display unit which causes a display device to output display data that indicates a drawing screen complying with the display request, a reliability decision unit which decides a legality of a transmission source of the display request, and which makes an output request for information capable of confirming a reliability of the display data that the data display unit causes the display device to output, on the basis of a result of the decision, and an output unit which outputs the information capable of confirming the reliability of the display data as complies with the output request from the reliability decision unit, separately from the display data that is caused to be outputted by the data display unit.Type: GrantFiled: March 4, 2008Date of Patent: July 9, 2013Assignee: Fujitsu LimitedInventors: Kouichi Yasaki, Naoki Nishiguchi, Kazuaki Nimura
-
Patent number: 8484721Abstract: Some embodiments of the present invention provide a system that presents an alternate computing environment on a host computing device. During operation, this system detects the presence of a removable storage device which is in communication with an interface of the host computing device. The system also locates code which implements the alternate computing environment on the removable storage device. Finally, the system runs the code which presents the alternate computing environment through an environment player on the host device, wherein the environment player prevents a user of the alternate computing environment from interacting directly with a native computing environment of the host computing device.Type: GrantFiled: August 3, 2009Date of Patent: July 9, 2013Assignee: Moka5, Inc.Inventors: Monica Sin-Ling Lam, Constantine P. Sapuntzakis
-
Patent number: 8484673Abstract: A method to reduce bandwidth necessary for renewal of subscriptions for reception of broadcast services including: defining a plurality of sets of subscriber identification numbers, each set being associated with a product; splitting a set of subscriber identification numbers into groups of subscribers; searching for an available subscriber identification number related to the desired product at the time of initialization of a new subscriber; confirming that an inhibit duration has elapsed between the end of the previous subscription and the start of the new subscription; sending an initialization message to the new subscriber addressed with his unique identification address and containing the subscriber identification number of, and rights to, his product; preparing a group rights renewal message for the product to the group containing the subscriber identification number, this message comprising the group header containing this subscriber and a compressed bitmap allowing to individually address each of theType: GrantFiled: May 19, 2009Date of Patent: July 9, 2013Assignee: Nagravision S.A.Inventor: Guy Moreillon
-
Publication number: 20130174247Abstract: A simple, customizable and intuitive virtual combination unlock method and system. More specifically, an unlock system and method is disclosed which includes a virtual combination lock, where the virtual combination lock includes several rows of user-selectable images such as pictures or icons as the virtual combination wheels. In certain embodiments, the images are accessed via the user's database. To unlock the device, the user touches and drags pre-selected images into alignment with each other. Security can be adjusted by changing the number of images that need to be aligned to unlock the device.Type: ApplicationFiled: January 4, 2012Publication date: July 4, 2013Inventor: Roy Stedman
-
Patent number: 8479280Abstract: An image processing device includes: a reading unit to read information stored in a detachable storage medium; a transmission unit to transmit image data outwardly; a determination unit to determine, in a case where the transmission unit transmits the image data, whether or not the information stored in the detachable storage medium is necessary; and a control unit to execute, in a case where the determination unit determines that the information stored in the detachable storage medium is necessary, control to maintain a state capable of reading the information stored in the detachable storage medium until the reading unit reads from the detachable storage medium the information necessary to transmit the image data.Type: GrantFiled: February 26, 2007Date of Patent: July 2, 2013Assignee: Canon Kabushiki KaishaInventor: Yoshihide Terao
-
Publication number: 20130167220Abstract: A security application is described for determining conditions within a computer application that would create the desire to allow or disallow access to certain system functions or features by the application. The security application analyzes the conditions and sets a lock that enables the application to perform only certain types of actions that would be considered secure by the security application.Type: ApplicationFiled: June 16, 2011Publication date: June 27, 2013Applicant: ADOBE SYSTEMS INCORPORATEDInventor: Deneb Meketa
-
Publication number: 20130167221Abstract: A motion-based authentication method is operative in a mobile computing device having a display interface and that includes an accelerometer. Normally, the device software includes a locking mechanism that automatically locks the display interface after a configurable timeout. The authentication method operates to un-lock the display interface (and thus allow the user access to the device) by movement of the device in a predetermined series of physical movements and without display-based entry of a password or other access code on the display itself. In this manner, the user can un-lock the device without display-based entry of a password (on the display itself) by simply holding the device and performing the necessary movement(s) to generate the unique code.Type: ApplicationFiled: December 24, 2011Publication date: June 27, 2013Applicant: LogMeln, Inc.Inventors: Zoran Vukoszavlyev, Marton B. Anka
-
Publication number: 20130160110Abstract: Techniques are described for device locking with activity preservation at a specified level within a multi-level hierarchy of device states. Such locking enables a user to share a device with another user while specifying a particular level of access to the device, such as access to a particular class of applications, a specific application, or a specific task within an application. Determination of the authorized activity may be based on a currently active application, or on the particular user gesture. The level of functionality made available may be based on the number of times a user gesture is repeated. Gestures may include a selection of a hardware or software control on the device, issuance of a voice command, and the like.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Applicant: Microsoft CorporationInventors: Stuart Schechter, Alince Jane Bernheim Brush, Oriana Riva, Karin Strauss, Eiji Hayashi
-
Patent number: 8468594Abstract: The present invention discloses methods, media, and systems for handling hard-coded credentials, the system including: an interception module configured for: intercepting credential usage upon receiving an application request for application credentials in order to provide access to a host application; a configuration/settings module configured for reading system configurations and settings for handling the application credentials; a credential-mapping module configured for: applying appropriate credential-mapping logic based on the system configurations and settings; and upon determining that the application credentials need to be replaced, obtaining appropriate credentials from a secured storage.Type: GrantFiled: February 12, 2008Date of Patent: June 18, 2013Assignee: Cyber-Ark Software LtdInventors: Yair Sade, Roy Adar
-
Patent number: 8468591Abstract: Methods and systems for performing an authenticated boot (310); performing a continuous data protection (350); performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (110a, 110b, 110c) (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function (330), role and rule-based policies (225), validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors (220) and other virtual machine monitors or managers.Type: GrantFiled: October 15, 2007Date of Patent: June 18, 2013Assignee: Computer Protection IP, LLCInventor: Ariel Silverstone
-
Patent number: 8468342Abstract: The present invention proposes a computer system and a method capable of performing integrity detection, comprising: a running mode unit which comprises an integrity detection boot variable to determine whether or not to initiate an integrity detection boot mode by judging said running mode unit; an EFI integrity detection unit (5), which is used for performing an integrity detection on EFI image codes in the integrity detection boot mode, and comprises an integrity metric value for being compared with an EFI integrity calculated value generated after the EFI integrity detection unit performs the integrity detection on the EFI image codes, to determine the integrity of the EFI image codes; an operating system integrity detection unit (6); and an integrity management unit. The present invention is based on the EFI BIOS to perform the integrity detection on the operating system during the pre-boot stage, having better reliability and security.Type: GrantFiled: March 15, 2006Date of Patent: June 18, 2013Assignee: Lenovo (Beijing) LimitedInventors: Yi Zhang, Jian Zhou, Zhenxin Xi, Hongping Tian
-
Publication number: 20130152192Abstract: A portable computer terminal having an operating system configured to switch from a first state to a second state in response to a first command from a user and to switch from the second state to the first state in response to a second command from the user, the second command including inputting an identification code of the user, the operating system being capable, in the first state, of causing execution in interactive manner of an application selected from a set of applications, the operating system being capable, in a second state, of causing execution in interactive manner of an application of said set of applications in compliance with an access condition, wherein the access condition is determined as a function of said first command.Type: ApplicationFiled: June 14, 2012Publication date: June 13, 2013Applicant: OBERTHUR TECHNOLOGIESInventor: Paul DISCHAMP
-
Patent number: 8464050Abstract: Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating system activity, by a running process, relating to a dependent code module. Loading of the dependent code module is selectively authorized by authenticating a cryptographic hash value of the dependent code module with reference to a multi-level whitelist. The multi-level whitelist includes a global whitelist database remote from the computer system, maintained by a trusted service provider and which contains cryptographic hash values of approved code modules known not to contain viruses or malicious code; and a local whitelist database that includes cryptographic hash values of a subset of the approved code modules. The running process is allowed to load the dependent code module when the cryptographic hash value matches one of the cryptographic hash values of the approved code modules.Type: GrantFiled: April 3, 2012Date of Patent: June 11, 2013Assignee: Fortinet, Inc.Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
-
Patent number: 8464083Abstract: According to an example embodiment, a method may include, in response to an idle time of a computing device meeting or exceeding a power-save time threshold value, placing the computing device into a low-power state; in response to receiving an input to the computing device after the computing device has been placed into the low-power state, exiting the low-power state; determining whether the idle time meets or exceeds a lockout threshold value that is greater than the power-save time threshold value; after having exited from the low-power state, if the idle time meets or exceeds the lockout threshold value, requiring a user to perform a successful predetermined authentication to the computing device before allowing the user to access applications in the computing device; and if the idle time does not meet or exceed the lockout threshold value, allowing the user to access applications in the computing device without requiring the user to perform the successful predetermined authentication to the computing deType: GrantFiled: September 27, 2010Date of Patent: June 11, 2013Assignee: Google Inc.Inventors: Sameer Nanda, David James
-
Publication number: 20130145454Abstract: Disclosed are a portable information terminal for materializing limitation of its use more effectively and method and program for controlling the terminal The portable information terminal comprises a mail address storing unit for storing mail addresses, a mail reception unit for receiving mails, a certification information generation unit for generating certification information and a terminal lock controlling unit for limiting a predetermined function or operation, wherein when a mail address of an originator of transmission of a mail received by the mail reception unit coincides with an address stored in the mail address storing unit, the predetermined function or operation is limited by certification information the certification information generating unit generates.Type: ApplicationFiled: November 21, 2012Publication date: June 6, 2013Applicant: Hitachi Consumer Electronics Co., Ltd.Inventor: Hitachi Consumer Electronics Co., Ltd.
-
Publication number: 20130145453Abstract: A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a mobile computing device through a launcher. The configuration includes mapping one or more applications with a guest access code. The configuration receives, through a display screen of a mobile computing device, an access code, and determines whether the received access code corresponds with the guest access code. The configuration identifies the mapped applications corresponding to the guest access code and provides for display, on a screen of the mobile computing device, the identified applications.Type: ApplicationFiled: December 5, 2011Publication date: June 6, 2013Inventor: Steven C. Lemke
-
Publication number: 20130145455Abstract: It is described a method for accessing a secure storage of a mobile device, the method comprising: providing a generic interface for accessing the secure storage; accessing the secure storage using the generic interface by a first application of the mobile device; accessing the secure storage using the generic interface by a second application of the mobile device. Further, a corresponding secure electronic storage and a system is described.Type: ApplicationFiled: November 27, 2012Publication date: June 6, 2013Applicant: NXP B.V.Inventor: NXP B.V.
-
Patent number: 8458800Abstract: A commercial off-the-shelf smartphone is adapted, through software modifications only, to provide multiple operating domains or domains that provide differing levels of security and reliability. Each operating domain is isolated from the others. Detection of unauthorized modification is provided. Cross domain activity notification is provided.Type: GrantFiled: October 1, 2010Date of Patent: June 4, 2013Assignee: ViaSat, Inc.Inventors: Franklin David Van Voorhees, Phil Mar, Steven R. Hart, Ty Lindteigen, Paul Wren
-
Patent number: 8448239Abstract: A storage controller includes a command pointer register. The command pointer register points to a chain of commands in memory, and also includes a security status field to indicate a security status of the first command in the command chain. Each command in the command chain may also include a security status field that indicates the security status of the following command in the chain.Type: GrantFiled: March 5, 2011Date of Patent: May 21, 2013Assignee: Micron Technology, Inc.Inventors: Dennis M. O'Connor, Mark N. Fullerton, Ray Richardson
-
Publication number: 20130125231Abstract: A wireless key device is configured to execute a digital credential management method to manage a plurality of digital credentials. According to this digital credential management method, the wireless key device polls an access terminal for an access terminal identification which uniquely identifies the access terminal. The wireless key device identifies a filter based on the access terminal identification, and selects a subset of the plurality of digital credentials based on the filter. The wireless key device renders a list of the subset of the plurality of digital credentials on a display, receives a user input selecting one of the subset of the plurality of digital credentials, and transmits the selected credential to the access terminal.Type: ApplicationFiled: November 14, 2011Publication date: May 16, 2013Applicant: UTC Fire & Security CorporationInventor: Adam Kuenzi
-
Patent number: 8443436Abstract: A computer-implemented method for diverting children from restricted computing activities. The method may include maintaining a list of safe computing activities, maintaining a list of restricted computing activities, and detecting a child's attempt to perform a restricted computing activity identified in the list of restricted computing activities. The method may also include selecting a safe computing activity from the list of safe computing activities. The method may further include, in response to the child's attempt to perform the restricted computing activity, blocking the restricted computing activity and initializing the safe computing activity selected from the list of safe computing activities. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: October 21, 2009Date of Patent: May 14, 2013Assignee: Symantec CorporationInventor: Anand Sankruthi
-
Publication number: 20130117838Abstract: Specialized hardware functions for high assurance processing are seldom integrated into commodity processors. Furthermore, as chips increase in complexity, trustworthy processing of sensitive information can become increasingly difficult to achieve due to extensive on-chip resource sharing and the lack of corresponding protection mechanisms. Embodiments in accordance with the invention allow for enhanced security of commodity integrated circuits, using minor modifications, in conjunction with a separate integrated circuit that can provide monitoring, access control, and other useful security functions. In one embodiment, a separate control plane, stacked using 3-D integration technology, allows for the function and economics of specialized security mechanisms, not available from a coprocessor alone, to be integrated with the underlying commodity computing hardware.Type: ApplicationFiled: February 11, 2011Publication date: May 9, 2013Inventors: Timothy Evert LEVIN, Timothy Peter Sherwood, Theodore Douglas Huffmire, Cynthia Emberson Irvine, Ryan Charles Kastner, Thuy Diep Nguyen, Jonathan Kaveh Valamehr
-
Publication number: 20130117839Abstract: The disclosure generally describes computer-implemented methods, software, and systems for controlling access to applications on a device while the device is in motion. One example computer-implemented method includes identifying a request to access an application on a device, determining if the requested application is a motion-restricted application, upon determination that the requested application is a motion-restricted application, identifying a speed of movement associated with the device, and controlling access to the requested application based at least in part on the identified speed of movement of the device.Type: ApplicationFiled: October 26, 2012Publication date: May 9, 2013Inventors: Steven W. White, Ashok Ramadass
-
Patent number: 8438632Abstract: A low-cost Multi Function Peripheral (MFP) prevents a user from forgetting to cancel an authenticated state. The MFP includes a scanner unit, a printer unit, a touch screen, and a reset key for initializing various settings. When the user is authenticated, the MFP accepts various operations. Under a state in which the user is authenticated, when the reset key is operated, a control unit executes a logout process.Type: GrantFiled: May 28, 2010Date of Patent: May 7, 2013Assignee: Murata Kikai Kabushiki KaishaInventors: Masayuki Kanou, Kenji Dokuni
-
Publication number: 20130111578Abstract: A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being transmitted to a receiving apparatus. Accordingly, a problem that the receiving apparatus receives the authentication start instruction from the relay apparatus before locking the authentication start video signal and cannot perform authentication processing normally, leading to a failure in authentication. A correction time is decided based on a resolution of the authentication start video signal transmitted from the receiving apparatus and a combination of receiving apparatuses and transmitting apparatuses connected to the relay apparatus.Type: ApplicationFiled: May 17, 2012Publication date: May 2, 2013Applicant: ONKYO CORPORATIONInventor: Hiroki OKADA
-
Patent number: 8434138Abstract: A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10^Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C?. If there is an initial mismatch, the validation server compensate for a lack of synchronization between counters C and C? within a look-ahead window, whose size can be set by a parameter s.Type: GrantFiled: December 6, 2011Date of Patent: April 30, 2013Assignee: Symantec CorporationInventors: Nicolas Popp, David M'Raihi, Loren Hart
-
Patent number: 8434073Abstract: An exemplary method for preventing exploitation of byte sequences that violate compiler-generated instruction alignment may comprise: 1) identifying instantiation of a process, 2) identifying an address space associated with the process, 3) identifying, within the address space associated with the process, at least one control-transfer instruction, 4) determining that at least one byte preceding the control-transfer instruction is capable of resulting in an out-of-alignment instruction, and then 5) preventing the control-transfer instruction from being executed. In one example, the system may prevent the control-transfer instruction from being executed by inserting a hook in place of the intended instruction that executes the intended instruction and then returns control flow back to the instantiated process. Corresponding systems and computer-readable media are also disclosed.Type: GrantFiled: November 3, 2008Date of Patent: April 30, 2013Assignee: Symantec CorporationInventors: Sourabh Satish, Bruce McCorkendale, William E. Sobel
-
Patent number: 8434158Abstract: Various embodiments of the present invention relates to systems, devices and methods of detecting tampering and preventing unauthorized access by incorporating programmability and randomness into a process of coupling, driving and sensing conductive wires that are arranged above sensitive areas in a secured system. Such a tampering detection system comprises a security mesh network, a random number generator, a security controller and a security monitor. The security mesh network includes a plurality of security elements made from the conductive wires. The security controller selects a subset of security elements, forms a security array, and generates a driving stimulus. The security monitor selects a SENSE node, monitors an output at the SENSE node, and generates a flag signal indicating the presence of a tampering attempt. Programmability and randomness are introduced to at least one of the system parameters including array configuration, driving stimulus, SENSE node, and detection mode via random numbers.Type: GrantFiled: August 29, 2011Date of Patent: April 30, 2013Assignee: Maxim Integrated Products, Inc.Inventors: Jianxin Ma, Sung Ung Kwak, Irfan Azam Chaudhry
-
Patent number: 8433834Abstract: A module for controlling integrity properties of a data stream input into a device, such as a machine for manufacturing or a management system related to such machines. A plurality of control items are registered in a database. At least one activable control means executes a control of one integrity property according to one of several registered control items. A list is attached to the database with selectable links for activating at least one of the control means. Configuration means perform on at least one of the links a chronological selection according to a predefined management profile on integrity properties of the data stream in order to introduce a selectable relative time delay between activations of control items. Due to that configuration, the integrity control thus obtained is provided with high reliability as well as in a very flexible manner.Type: GrantFiled: October 23, 2008Date of Patent: April 30, 2013Assignee: Siemens AktiegesellschaftInventor: Ornella Tavani
-
Patent number: 8434126Abstract: A computer-implemented method for aiding parental-control-policy decisions may include identifying a computer resource. The computer resource may include any content subject to a parental-control-policy decision. The method may also include identifying a community usage repository. The community usage repository may include information relating to a plurality of children's usage of the computer resource. The method may further include analyzing the community usage repository to generate statistical data relating to the computer resource. The method may additionally include presenting the statistical data to a user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: February 2, 2009Date of Patent: April 30, 2013Assignee: Symantec CorporationInventors: Adam Schepis, Keith Newstadt
-
Publication number: 20130103943Abstract: Private information can be displayed using alternate frame sequencing to prevent unauthorized viewing. The private information can be ascertained by an authorized user using an active shutter viewing device synchronized to the alternate frame sequencing display. Private information can be displayed on a portion of the display, while public information, including a basic user interface, can be displayed on a second portion visible to authorized and unauthorized users. For enhanced security, alternate frame sequencing synchronization parameters can be encrypted and exchanged between a display device and the viewing device. When and where to display private information using alternate frame sequencing can be determined using environmental sensors. A single display screen can be configured to simultaneously present private information to multiple users, each user permitted to view a portion of the private information according to the unique synchronization parameters employed by a user's viewing device.Type: ApplicationFiled: October 21, 2011Publication date: April 25, 2013Inventors: Alexander Samson Hirsch, Michael Joseph Deluca
-
Patent number: 8429412Abstract: Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.Type: GrantFiled: December 8, 2010Date of Patent: April 23, 2013Assignee: SignaCert, Inc.Inventors: David Maurits Bleckmann, William Wyatt Starnes, Bradley Douglas Andersen