Stand-alone Patents (Class 726/16)
  • Publication number: 20130212671
    Abstract: In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each with their own processing units and memories, and a defined set of interfaces that interconnect the two sub-systems and the external world. One sub-system is designed to provide a familiar environment for running computer applications. The other sub-system is designed to provide a secure bridge between the first sub-system and users via input and output devices.
    Type: Application
    Filed: February 14, 2012
    Publication date: August 15, 2013
    Applicant: Janus Technologies, Inc.
    Inventors: Chen-Hua Wang, Sofin Raskin, Leonid Rozenboim
  • Patent number: 8510849
    Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: August 13, 2013
    Assignee: Intertrust Technologies Corporation
    Inventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
  • Patent number: 8510825
    Abstract: Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in the BIOS of the client. The policy data describes one or more policies which the client should follow. When an operating system agent detects that a condition, specified by a particular policy of the one or more policies, has been met, the operating system agent performs one or more actions specified by the particular policy, such as disabling the client, retrieving a file from the client, erasing a file from the client, or encrypting a file on the client. The operating system agent is one or more software modules that execute in the operating system of the client.
    Type: Grant
    Filed: August 7, 2009
    Date of Patent: August 13, 2013
    Assignee: Absolute Software Corporation
    Inventors: Anahit Tarkhanyan, Ravi Gupta, Gaurav Banga
  • Patent number: 8510856
    Abstract: An image forming device is provided with a use permission determining portion, an authentication process requesting portion and a job executing portion. The use permission determining portion performs determination whether or not use of the image processing device should be permitted for a user who wants to use the image processing device. The authentication process requesting portion requests the authentication server via a network to act for the determination when the use permission determining portion cannot perform the determination. The job executing portion performs the image processing of process specifics designated by the user when a determination result indicating that the user can use the image forming device is obtained.
    Type: Grant
    Filed: February 9, 2006
    Date of Patent: August 13, 2013
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventor: Akira Murakawa
  • Patent number: 8505082
    Abstract: When a plurality of information processing apparatuses having an authentication function executes a cooperative job, user authentication information is transmitted from a cooperative information source processing apparatus to a destination cooperative information processing apparatus that executes the cooperative job. It is determined whether or not a user account with authentication information that is the same as the transmitted authentication information exists in the destination cooperative information processing apparatus. The determined result is then notified to the cooperative information source processing apparatus. In this case, when the cooperative information source processing apparatus is notified that a user account with the same authentication information does not exist, the cooperative information source processing apparatus creates a user account based on the authentication information.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: August 6, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kou Hiraike
  • Patent number: 8504842
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for receiving, by a computing system that is locked, input from a user that provides an unlocking pattern. During entry of the unlocking pattern, a display of the computing system does not provide a visual indication of an action that will be performed upon the user completing the unlocking pattern. The computing system compares the provided unlocking pattern to a plurality of stored unlocking patterns to determine whether the provided unlocking pattern matches any of the stored unlocking patterns. The stored unlocking patterns are associated with respective actions that are performed upon completion of the respective unlocking patterns. The unlocking patterns are associated with a same level of unlocked security access to the computing system. The computing system responds by unlocking the computing system and performing the action that is associated with the matching unlocking pattern.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: August 6, 2013
    Assignee: Google Inc.
    Inventor: John W. Meacham
  • Publication number: 20130198831
    Abstract: A candidate identifier for a process is generated and an attempt is made to have a named object created that has a name that is the candidate identifier. In response to the attempt succeeding and the named object being created, the candidate identifier is used as an identifier for the process. In response to the attempt not succeeding and the named object not being created, the generating and attempting are repeated.
    Type: Application
    Filed: January 27, 2012
    Publication date: August 1, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Daniel B. Jump, Brian T. Carver, David C. LeBlanc
  • Publication number: 20130198832
    Abstract: Mechanisms are provided to efficiently and effectively authenticate a user of a device. Passcode information such as passwords, pins, and access codes are obtained along with biometric information to periodically authenticate a user of a device. A user identity confidence score may be generated and continually modified by using data such as passcode information, biometric information, and/or user physical interaction characteristics information. If the user identify confidence score falls beneath a particular threshold, additional user authentication information may be requested.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: DELL Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse
  • Publication number: 20130198833
    Abstract: A method of and system for securely executing an application on a computer system such that a user of the computer system cannot access or view unauthorized content available on the computer system or accessible using the computer system. To securely execute an such method and system may terminate any unauthorized processes executing (i.e., running) on the computer system application prior to execution of the application, and may configure the application such that unauthorized content cannot be accessed, including configuring the application such that unauthorized processes cannot be initiated (i.e., launched) by the application. Further, such system and method may terminate any unauthorized processes detected during execution of the application, and may disable any functions of the computer system that are capable of accessing unauthorized content, including disabling any functions capable of initiating processes on the computer system.
    Type: Application
    Filed: October 30, 2012
    Publication date: August 1, 2013
    Applicant: Software Secure, Inc.
    Inventor: Software Secure, Inc.
  • Patent number: 8499346
    Abstract: A method of providing secure authentication of a service user at a self-service terminal is described. The method comprises: detecting attempted access by the service user to a restricted function on the self-service terminal and ascertaining if a predefined operating system account is present on the terminal. In the event that the predefined operating system account is not present, then the method comprises permitting access to the restricted function by the service user. In the event that the predefined operating system account is present, then the method comprises requesting the service user to provide login credentials and authenticating the login credentials using the operating system account. If the login credentials are not authenticated, access to the restricted function is denied; whereas, if the login credentials are authenticated, access to the restricted function is permitted.
    Type: Grant
    Filed: December 18, 2009
    Date of Patent: July 30, 2013
    Assignee: NCR Corporation
    Inventors: Andrew D. J. Kilgore, Ranjith T. Suresh, Stefano Cipollone
  • Patent number: 8495705
    Abstract: A computer-implemented method for data-loss prevention may include: 1) identifying data associated with a user, 2) determining that the data is subject to a data-loss-prevention scan, 3) identifying a data-loss-prevention reputation associated with the user, and then 4) performing a data-loss-prevention operation based at least in part on the data-loss-prevention reputation associated with the user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 20, 2010
    Date of Patent: July 23, 2013
    Assignee: Symantec Corporation
    Inventors: Amit Verma, Anindya Banerjee, Rajorshi Ghosh Choudhury, Sumesh Jaiswal
  • Patent number: 8495379
    Abstract: A method and system manage a hierarchy of passwords for users accessing a hierarchy of access control devices. First, a codeword is acquired and a syndrome of the codeword is determined. Next, the codeword is randomly modified with a probability p to produce a modified codeword. The modified codeword is selected and assigned to a user as a password, if the modified codeword is recoverable.
    Type: Grant
    Filed: January 22, 2009
    Date of Patent: July 23, 2013
    Assignee: Mitsubishi Electric Research Laboratories, Inc.
    Inventors: Shantanu Rane, Yige Wang, Jonathan S. Yedidia, Anthony Vetro
  • Publication number: 20130185787
    Abstract: A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects.
    Type: Application
    Filed: March 6, 2013
    Publication date: July 18, 2013
    Inventors: J. Bradley Chen, Matthew T. Harren, Matthew Papakipos, David C. Sehr, Bennet S. Yee, Gregory Dardyk
  • Patent number: 8490154
    Abstract: There is provided a computer-implemented method for authentication, the method comprising: defining a demanded level of security in an authorization service of a server; providing at least one authentication mechanism comprising at least one instance for at least one client; providing a policy comprising a security level for the at least one instance; receiving at least one request from the client to the server; authenticating the request based on the policy and the demanded level of security by the authentication service; and permitting the request if the demanded level of security is reached.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: July 16, 2013
    Assignee: SAP AG
    Inventors: Laurent Y. Gomez, Ivonne Thomas
  • Patent number: 8489892
    Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.
    Type: Grant
    Filed: March 17, 2008
    Date of Patent: July 16, 2013
    Assignee: Thomson Licensing
    Inventors: Stephane Onno, Olivier Heen
  • Patent number: 8490093
    Abstract: Determining execution rights for a process. A user selects a process for execution. A driver intercepts the execution and communicates with a service or its remote agent. Configuration data is accessed to determine an execution role specifying whether the process should be denied execution or should execute with particular rights to access or modify system resources. The execution role is provided to the driver, and the driver allows or denies execution of the process in accordance with the provided execution role.
    Type: Grant
    Filed: February 5, 2007
    Date of Patent: July 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Mark Russinovich, Bryce Cogswell, Wesley G. Miller
  • Publication number: 20130179964
    Abstract: Systems, methods and products directed toward providing security in hybrid information handling device environments are described herein. One aspect an information handling device comprising: one or more processors; and one or memories storing program instructions accessible by the one or more processors; wherein, responsive to execution of program instructions stored in the one or more memories, the one or more processors are configured to: ascertain a resume request for resuming to a secondary operating environment; and prior to resuming the information handling device to the secondary operating environment, initiate a primary operating environment security application. Other embodiments are described herein.
    Type: Application
    Filed: January 5, 2012
    Publication date: July 11, 2013
    Applicant: Lenovo (Singapore) Pte. Ltd.,
    Inventors: Jennifer Zawacki, Steven R. Perrin, Scott E. Kelso, James S. Rutledge, Matthew P. Roper, Jian Li, Yi Zhou
  • Patent number: 8484450
    Abstract: Various embodiments disclosed herein are directed to gaming devices having a secured basic input/output system (BIOS) and methods for determining the validity of the gaming device's BIOS. According to one embodiment, the gaming device includes a secured module for authenticating the BIOS of the gaming device. During the boot-up process, the secured module selects a challenge from a plurality of challenges, and the selected challenge is issued to the BIOS. The BIOS generates a response to the challenge, and the secured module determines whether the BIOS response matches the calculated response of the secured module. If the BIOS response matches the secured module response, the gaming device continues the boot process. Otherwise, the boot process is halted by the gaming device.
    Type: Grant
    Filed: December 2, 2009
    Date of Patent: July 9, 2013
    Assignee: Bally Gaming, Inc.
    Inventors: Anand Singh, Pravinkumar Patel, Anthony E. Green, Raymond C. Cammilleri, Peter R. Pitts
  • Patent number: 8484735
    Abstract: an apparatus comprises a data display unit which causes a display device to output display data that indicates a drawing screen complying with the display request, a reliability decision unit which decides a legality of a transmission source of the display request, and which makes an output request for information capable of confirming a reliability of the display data that the data display unit causes the display device to output, on the basis of a result of the decision, and an output unit which outputs the information capable of confirming the reliability of the display data as complies with the output request from the reliability decision unit, separately from the display data that is caused to be outputted by the data display unit.
    Type: Grant
    Filed: March 4, 2008
    Date of Patent: July 9, 2013
    Assignee: Fujitsu Limited
    Inventors: Kouichi Yasaki, Naoki Nishiguchi, Kazuaki Nimura
  • Patent number: 8484721
    Abstract: Some embodiments of the present invention provide a system that presents an alternate computing environment on a host computing device. During operation, this system detects the presence of a removable storage device which is in communication with an interface of the host computing device. The system also locates code which implements the alternate computing environment on the removable storage device. Finally, the system runs the code which presents the alternate computing environment through an environment player on the host device, wherein the environment player prevents a user of the alternate computing environment from interacting directly with a native computing environment of the host computing device.
    Type: Grant
    Filed: August 3, 2009
    Date of Patent: July 9, 2013
    Assignee: Moka5, Inc.
    Inventors: Monica Sin-Ling Lam, Constantine P. Sapuntzakis
  • Patent number: 8484673
    Abstract: A method to reduce bandwidth necessary for renewal of subscriptions for reception of broadcast services including: defining a plurality of sets of subscriber identification numbers, each set being associated with a product; splitting a set of subscriber identification numbers into groups of subscribers; searching for an available subscriber identification number related to the desired product at the time of initialization of a new subscriber; confirming that an inhibit duration has elapsed between the end of the previous subscription and the start of the new subscription; sending an initialization message to the new subscriber addressed with his unique identification address and containing the subscriber identification number of, and rights to, his product; preparing a group rights renewal message for the product to the group containing the subscriber identification number, this message comprising the group header containing this subscriber and a compressed bitmap allowing to individually address each of the
    Type: Grant
    Filed: May 19, 2009
    Date of Patent: July 9, 2013
    Assignee: Nagravision S.A.
    Inventor: Guy Moreillon
  • Publication number: 20130174247
    Abstract: A simple, customizable and intuitive virtual combination unlock method and system. More specifically, an unlock system and method is disclosed which includes a virtual combination lock, where the virtual combination lock includes several rows of user-selectable images such as pictures or icons as the virtual combination wheels. In certain embodiments, the images are accessed via the user's database. To unlock the device, the user touches and drags pre-selected images into alignment with each other. Security can be adjusted by changing the number of images that need to be aligned to unlock the device.
    Type: Application
    Filed: January 4, 2012
    Publication date: July 4, 2013
    Inventor: Roy Stedman
  • Patent number: 8479280
    Abstract: An image processing device includes: a reading unit to read information stored in a detachable storage medium; a transmission unit to transmit image data outwardly; a determination unit to determine, in a case where the transmission unit transmits the image data, whether or not the information stored in the detachable storage medium is necessary; and a control unit to execute, in a case where the determination unit determines that the information stored in the detachable storage medium is necessary, control to maintain a state capable of reading the information stored in the detachable storage medium until the reading unit reads from the detachable storage medium the information necessary to transmit the image data.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: July 2, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yoshihide Terao
  • Publication number: 20130167220
    Abstract: A security application is described for determining conditions within a computer application that would create the desire to allow or disallow access to certain system functions or features by the application. The security application analyzes the conditions and sets a lock that enables the application to perform only certain types of actions that would be considered secure by the security application.
    Type: Application
    Filed: June 16, 2011
    Publication date: June 27, 2013
    Applicant: ADOBE SYSTEMS INCORPORATED
    Inventor: Deneb Meketa
  • Publication number: 20130167221
    Abstract: A motion-based authentication method is operative in a mobile computing device having a display interface and that includes an accelerometer. Normally, the device software includes a locking mechanism that automatically locks the display interface after a configurable timeout. The authentication method operates to un-lock the display interface (and thus allow the user access to the device) by movement of the device in a predetermined series of physical movements and without display-based entry of a password or other access code on the display itself. In this manner, the user can un-lock the device without display-based entry of a password (on the display itself) by simply holding the device and performing the necessary movement(s) to generate the unique code.
    Type: Application
    Filed: December 24, 2011
    Publication date: June 27, 2013
    Applicant: LogMeln, Inc.
    Inventors: Zoran Vukoszavlyev, Marton B. Anka
  • Publication number: 20130160110
    Abstract: Techniques are described for device locking with activity preservation at a specified level within a multi-level hierarchy of device states. Such locking enables a user to share a device with another user while specifying a particular level of access to the device, such as access to a particular class of applications, a specific application, or a specific task within an application. Determination of the authorized activity may be based on a currently active application, or on the particular user gesture. The level of functionality made available may be based on the number of times a user gesture is repeated. Gestures may include a selection of a hardware or software control on the device, issuance of a voice command, and the like.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: Microsoft Corporation
    Inventors: Stuart Schechter, Alince Jane Bernheim Brush, Oriana Riva, Karin Strauss, Eiji Hayashi
  • Patent number: 8468594
    Abstract: The present invention discloses methods, media, and systems for handling hard-coded credentials, the system including: an interception module configured for: intercepting credential usage upon receiving an application request for application credentials in order to provide access to a host application; a configuration/settings module configured for reading system configurations and settings for handling the application credentials; a credential-mapping module configured for: applying appropriate credential-mapping logic based on the system configurations and settings; and upon determining that the application credentials need to be replaced, obtaining appropriate credentials from a secured storage.
    Type: Grant
    Filed: February 12, 2008
    Date of Patent: June 18, 2013
    Assignee: Cyber-Ark Software Ltd
    Inventors: Yair Sade, Roy Adar
  • Patent number: 8468591
    Abstract: Methods and systems for performing an authenticated boot (310); performing a continuous data protection (350); performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (110a, 110b, 110c) (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function (330), role and rule-based policies (225), validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors (220) and other virtual machine monitors or managers.
    Type: Grant
    Filed: October 15, 2007
    Date of Patent: June 18, 2013
    Assignee: Computer Protection IP, LLC
    Inventor: Ariel Silverstone
  • Patent number: 8468342
    Abstract: The present invention proposes a computer system and a method capable of performing integrity detection, comprising: a running mode unit which comprises an integrity detection boot variable to determine whether or not to initiate an integrity detection boot mode by judging said running mode unit; an EFI integrity detection unit (5), which is used for performing an integrity detection on EFI image codes in the integrity detection boot mode, and comprises an integrity metric value for being compared with an EFI integrity calculated value generated after the EFI integrity detection unit performs the integrity detection on the EFI image codes, to determine the integrity of the EFI image codes; an operating system integrity detection unit (6); and an integrity management unit. The present invention is based on the EFI BIOS to perform the integrity detection on the operating system during the pre-boot stage, having better reliability and security.
    Type: Grant
    Filed: March 15, 2006
    Date of Patent: June 18, 2013
    Assignee: Lenovo (Beijing) Limited
    Inventors: Yi Zhang, Jian Zhou, Zhenxin Xi, Hongping Tian
  • Publication number: 20130152192
    Abstract: A portable computer terminal having an operating system configured to switch from a first state to a second state in response to a first command from a user and to switch from the second state to the first state in response to a second command from the user, the second command including inputting an identification code of the user, the operating system being capable, in the first state, of causing execution in interactive manner of an application selected from a set of applications, the operating system being capable, in a second state, of causing execution in interactive manner of an application of said set of applications in compliance with an access condition, wherein the access condition is determined as a function of said first command.
    Type: Application
    Filed: June 14, 2012
    Publication date: June 13, 2013
    Applicant: OBERTHUR TECHNOLOGIES
    Inventor: Paul DISCHAMP
  • Patent number: 8464050
    Abstract: Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating system activity, by a running process, relating to a dependent code module. Loading of the dependent code module is selectively authorized by authenticating a cryptographic hash value of the dependent code module with reference to a multi-level whitelist. The multi-level whitelist includes a global whitelist database remote from the computer system, maintained by a trusted service provider and which contains cryptographic hash values of approved code modules known not to contain viruses or malicious code; and a local whitelist database that includes cryptographic hash values of a subset of the approved code modules. The running process is allowed to load the dependent code module when the cryptographic hash value matches one of the cryptographic hash values of the approved code modules.
    Type: Grant
    Filed: April 3, 2012
    Date of Patent: June 11, 2013
    Assignee: Fortinet, Inc.
    Inventors: Andrew F. Fanton, John J. Gandee, William H. Lutton, Edwin L. Harper, Kurt E. Godwin, Anthony A. Rozga
  • Patent number: 8464083
    Abstract: According to an example embodiment, a method may include, in response to an idle time of a computing device meeting or exceeding a power-save time threshold value, placing the computing device into a low-power state; in response to receiving an input to the computing device after the computing device has been placed into the low-power state, exiting the low-power state; determining whether the idle time meets or exceeds a lockout threshold value that is greater than the power-save time threshold value; after having exited from the low-power state, if the idle time meets or exceeds the lockout threshold value, requiring a user to perform a successful predetermined authentication to the computing device before allowing the user to access applications in the computing device; and if the idle time does not meet or exceed the lockout threshold value, allowing the user to access applications in the computing device without requiring the user to perform the successful predetermined authentication to the computing de
    Type: Grant
    Filed: September 27, 2010
    Date of Patent: June 11, 2013
    Assignee: Google Inc.
    Inventors: Sameer Nanda, David James
  • Publication number: 20130145454
    Abstract: Disclosed are a portable information terminal for materializing limitation of its use more effectively and method and program for controlling the terminal The portable information terminal comprises a mail address storing unit for storing mail addresses, a mail reception unit for receiving mails, a certification information generation unit for generating certification information and a terminal lock controlling unit for limiting a predetermined function or operation, wherein when a mail address of an originator of transmission of a mail received by the mail reception unit coincides with an address stored in the mail address storing unit, the predetermined function or operation is limited by certification information the certification information generating unit generates.
    Type: Application
    Filed: November 21, 2012
    Publication date: June 6, 2013
    Applicant: Hitachi Consumer Electronics Co., Ltd.
    Inventor: Hitachi Consumer Electronics Co., Ltd.
  • Publication number: 20130145453
    Abstract: A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a mobile computing device through a launcher. The configuration includes mapping one or more applications with a guest access code. The configuration receives, through a display screen of a mobile computing device, an access code, and determines whether the received access code corresponds with the guest access code. The configuration identifies the mapped applications corresponding to the guest access code and provides for display, on a screen of the mobile computing device, the identified applications.
    Type: Application
    Filed: December 5, 2011
    Publication date: June 6, 2013
    Inventor: Steven C. Lemke
  • Publication number: 20130145455
    Abstract: It is described a method for accessing a secure storage of a mobile device, the method comprising: providing a generic interface for accessing the secure storage; accessing the secure storage using the generic interface by a first application of the mobile device; accessing the secure storage using the generic interface by a second application of the mobile device. Further, a corresponding secure electronic storage and a system is described.
    Type: Application
    Filed: November 27, 2012
    Publication date: June 6, 2013
    Applicant: NXP B.V.
    Inventor: NXP B.V.
  • Patent number: 8458800
    Abstract: A commercial off-the-shelf smartphone is adapted, through software modifications only, to provide multiple operating domains or domains that provide differing levels of security and reliability. Each operating domain is isolated from the others. Detection of unauthorized modification is provided. Cross domain activity notification is provided.
    Type: Grant
    Filed: October 1, 2010
    Date of Patent: June 4, 2013
    Assignee: ViaSat, Inc.
    Inventors: Franklin David Van Voorhees, Phil Mar, Steven R. Hart, Ty Lindteigen, Paul Wren
  • Patent number: 8448239
    Abstract: A storage controller includes a command pointer register. The command pointer register points to a chain of commands in memory, and also includes a security status field to indicate a security status of the first command in the command chain. Each command in the command chain may also include a security status field that indicates the security status of the following command in the chain.
    Type: Grant
    Filed: March 5, 2011
    Date of Patent: May 21, 2013
    Assignee: Micron Technology, Inc.
    Inventors: Dennis M. O'Connor, Mark N. Fullerton, Ray Richardson
  • Publication number: 20130125231
    Abstract: A wireless key device is configured to execute a digital credential management method to manage a plurality of digital credentials. According to this digital credential management method, the wireless key device polls an access terminal for an access terminal identification which uniquely identifies the access terminal. The wireless key device identifies a filter based on the access terminal identification, and selects a subset of the plurality of digital credentials based on the filter. The wireless key device renders a list of the subset of the plurality of digital credentials on a display, receives a user input selecting one of the subset of the plurality of digital credentials, and transmits the selected credential to the access terminal.
    Type: Application
    Filed: November 14, 2011
    Publication date: May 16, 2013
    Applicant: UTC Fire & Security Corporation
    Inventor: Adam Kuenzi
  • Patent number: 8443436
    Abstract: A computer-implemented method for diverting children from restricted computing activities. The method may include maintaining a list of safe computing activities, maintaining a list of restricted computing activities, and detecting a child's attempt to perform a restricted computing activity identified in the list of restricted computing activities. The method may also include selecting a safe computing activity from the list of safe computing activities. The method may further include, in response to the child's attempt to perform the restricted computing activity, blocking the restricted computing activity and initializing the safe computing activity selected from the list of safe computing activities. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 21, 2009
    Date of Patent: May 14, 2013
    Assignee: Symantec Corporation
    Inventor: Anand Sankruthi
  • Publication number: 20130117838
    Abstract: Specialized hardware functions for high assurance processing are seldom integrated into commodity processors. Furthermore, as chips increase in complexity, trustworthy processing of sensitive information can become increasingly difficult to achieve due to extensive on-chip resource sharing and the lack of corresponding protection mechanisms. Embodiments in accordance with the invention allow for enhanced security of commodity integrated circuits, using minor modifications, in conjunction with a separate integrated circuit that can provide monitoring, access control, and other useful security functions. In one embodiment, a separate control plane, stacked using 3-D integration technology, allows for the function and economics of specialized security mechanisms, not available from a coprocessor alone, to be integrated with the underlying commodity computing hardware.
    Type: Application
    Filed: February 11, 2011
    Publication date: May 9, 2013
    Inventors: Timothy Evert LEVIN, Timothy Peter Sherwood, Theodore Douglas Huffmire, Cynthia Emberson Irvine, Ryan Charles Kastner, Thuy Diep Nguyen, Jonathan Kaveh Valamehr
  • Publication number: 20130117839
    Abstract: The disclosure generally describes computer-implemented methods, software, and systems for controlling access to applications on a device while the device is in motion. One example computer-implemented method includes identifying a request to access an application on a device, determining if the requested application is a motion-restricted application, upon determination that the requested application is a motion-restricted application, identifying a speed of movement associated with the device, and controlling access to the requested application based at least in part on the identified speed of movement of the device.
    Type: Application
    Filed: October 26, 2012
    Publication date: May 9, 2013
    Inventors: Steven W. White, Ashok Ramadass
  • Patent number: 8438632
    Abstract: A low-cost Multi Function Peripheral (MFP) prevents a user from forgetting to cancel an authenticated state. The MFP includes a scanner unit, a printer unit, a touch screen, and a reset key for initializing various settings. When the user is authenticated, the MFP accepts various operations. Under a state in which the user is authenticated, when the reset key is operated, a control unit executes a logout process.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: May 7, 2013
    Assignee: Murata Kikai Kabushiki Kaisha
    Inventors: Masayuki Kanou, Kenji Dokuni
  • Publication number: 20130111578
    Abstract: A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being transmitted to a receiving apparatus. Accordingly, a problem that the receiving apparatus receives the authentication start instruction from the relay apparatus before locking the authentication start video signal and cannot perform authentication processing normally, leading to a failure in authentication. A correction time is decided based on a resolution of the authentication start video signal transmitted from the receiving apparatus and a combination of receiving apparatuses and transmitting apparatuses connected to the relay apparatus.
    Type: Application
    Filed: May 17, 2012
    Publication date: May 2, 2013
    Applicant: ONKYO CORPORATION
    Inventor: Hiroki OKADA
  • Patent number: 8434138
    Abstract: A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10^Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C?. If there is an initial mismatch, the validation server compensate for a lack of synchronization between counters C and C? within a look-ahead window, whose size can be set by a parameter s.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: April 30, 2013
    Assignee: Symantec Corporation
    Inventors: Nicolas Popp, David M'Raihi, Loren Hart
  • Patent number: 8434073
    Abstract: An exemplary method for preventing exploitation of byte sequences that violate compiler-generated instruction alignment may comprise: 1) identifying instantiation of a process, 2) identifying an address space associated with the process, 3) identifying, within the address space associated with the process, at least one control-transfer instruction, 4) determining that at least one byte preceding the control-transfer instruction is capable of resulting in an out-of-alignment instruction, and then 5) preventing the control-transfer instruction from being executed. In one example, the system may prevent the control-transfer instruction from being executed by inserting a hook in place of the intended instruction that executes the intended instruction and then returns control flow back to the instantiated process. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 3, 2008
    Date of Patent: April 30, 2013
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Bruce McCorkendale, William E. Sobel
  • Patent number: 8434158
    Abstract: Various embodiments of the present invention relates to systems, devices and methods of detecting tampering and preventing unauthorized access by incorporating programmability and randomness into a process of coupling, driving and sensing conductive wires that are arranged above sensitive areas in a secured system. Such a tampering detection system comprises a security mesh network, a random number generator, a security controller and a security monitor. The security mesh network includes a plurality of security elements made from the conductive wires. The security controller selects a subset of security elements, forms a security array, and generates a driving stimulus. The security monitor selects a SENSE node, monitors an output at the SENSE node, and generates a flag signal indicating the presence of a tampering attempt. Programmability and randomness are introduced to at least one of the system parameters including array configuration, driving stimulus, SENSE node, and detection mode via random numbers.
    Type: Grant
    Filed: August 29, 2011
    Date of Patent: April 30, 2013
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Jianxin Ma, Sung Ung Kwak, Irfan Azam Chaudhry
  • Patent number: 8433834
    Abstract: A module for controlling integrity properties of a data stream input into a device, such as a machine for manufacturing or a management system related to such machines. A plurality of control items are registered in a database. At least one activable control means executes a control of one integrity property according to one of several registered control items. A list is attached to the database with selectable links for activating at least one of the control means. Configuration means perform on at least one of the links a chronological selection according to a predefined management profile on integrity properties of the data stream in order to introduce a selectable relative time delay between activations of control items. Due to that configuration, the integrity control thus obtained is provided with high reliability as well as in a very flexible manner.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: April 30, 2013
    Assignee: Siemens Aktiegesellschaft
    Inventor: Ornella Tavani
  • Patent number: 8434126
    Abstract: A computer-implemented method for aiding parental-control-policy decisions may include identifying a computer resource. The computer resource may include any content subject to a parental-control-policy decision. The method may also include identifying a community usage repository. The community usage repository may include information relating to a plurality of children's usage of the computer resource. The method may further include analyzing the community usage repository to generate statistical data relating to the computer resource. The method may additionally include presenting the statistical data to a user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 2, 2009
    Date of Patent: April 30, 2013
    Assignee: Symantec Corporation
    Inventors: Adam Schepis, Keith Newstadt
  • Publication number: 20130103943
    Abstract: Private information can be displayed using alternate frame sequencing to prevent unauthorized viewing. The private information can be ascertained by an authorized user using an active shutter viewing device synchronized to the alternate frame sequencing display. Private information can be displayed on a portion of the display, while public information, including a basic user interface, can be displayed on a second portion visible to authorized and unauthorized users. For enhanced security, alternate frame sequencing synchronization parameters can be encrypted and exchanged between a display device and the viewing device. When and where to display private information using alternate frame sequencing can be determined using environmental sensors. A single display screen can be configured to simultaneously present private information to multiple users, each user permitted to view a portion of the private information according to the unique synchronization parameters employed by a user's viewing device.
    Type: Application
    Filed: October 21, 2011
    Publication date: April 25, 2013
    Inventors: Alexander Samson Hirsch, Michael Joseph Deluca
  • Patent number: 8429412
    Abstract: Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy.
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: April 23, 2013
    Assignee: SignaCert, Inc.
    Inventors: David Maurits Bleckmann, William Wyatt Starnes, Bradley Douglas Andersen