Management Patents (Class 726/6)
-
Patent number: 8505081Abstract: An apparatus and method for identity reuse operable in a communications system, the method comprising selecting an identity value for a device; registering the device onto a network with the selected identity value; determining if the registration of the device is successful; and establishing a communication session for the device and deregistering the selected identity value upon termination of the communication session if the registration is successful, or determining whether to try a different identity value if the registration is not successful. In one aspect, the apparatus and method further comprising waiting a predetermined time period before either re-registering with the selected identity value or registering with the different identity value.Type: GrantFiled: September 16, 2010Date of Patent: August 6, 2013Assignee: QUALCOMM IncorporatedInventors: Philip Hawkes, Anand Palanigounder
-
Patent number: 8505086Abstract: The present disclosure is directed to a system and method for managing communications with robots. In some implementations, a computer network, where operators interface with the network to control movement of robots on a wireless computer network includes a network arena controller and a plurality of robot controllers. The network arena controller is configured to provide firewall policies to substantially secure communication between robot controllers and the associated robots. Each controller is included in a different robot and configured to wirelessly communicate with the network arena controller. Each robot controller executes firewall policies to substantially secure wireless communication.Type: GrantFiled: April 21, 2008Date of Patent: August 6, 2013Assignee: Innovation First, Inc.Inventors: David Anthony Norman, Robert H. Mimlitch, III, Corey Lee Chitwood, Richard D. Torrance, Mark J. Lambert, Brandon Lee Martus, Lester E. Heath, III
-
Patent number: 8503326Abstract: Systems and methods to monitor and analyze customer premises equipment downtime in a Voice over Internet Protocol service network are disclosed. Example methods for a dynamic host configuration protocol server disclosed herein include assigning a replacement Internet protocol address to a residential gateway, the replacement Internet protocol address to replace a first Internet protocol address assigned to at least one of the residential gateway or customer premises equipment associated with the residential gateway, sending a first address change message to a session border controller, and sending a second address change message to a lost subscriber time server, the first and second address change messages to indicate that the first Internet protocol address has been replaced by the replacement Internet protocol address.Type: GrantFiled: July 9, 2012Date of Patent: August 6, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Mehrad Yasrebi, James Jackson, Bernard Ku
-
Patent number: 8504841Abstract: Apparatus and method for managing password information associated with a service account are disclosed. In some embodiments, a service account management system is configured to include a security account utility and a password information data store. In some embodiments, a security account utility is used when registering, tracking, and adjusting password change information. In some embodiments, notification of a password change date is transmitted to a service account owner and a security auditor for enforcement. Use of a security account management system with a middleware application is also disclosed.Type: GrantFiled: October 27, 2011Date of Patent: August 6, 2013Assignee: United Services Automobile Association (USAA)Inventors: David Cato, Tammy Sanclemente
-
Publication number: 20130198822Abstract: Disclosed are various embodiments for authentication management services, where authentication services of network sites may support authentication management clients associated with different authentication management services. An authentication request is obtained by way of an authentication protocol from an authentication management client executed in a client computing device. The authentication request specifies a security credential associated with a user account. The user account at the client computing device is authenticated for access to at least one secured resource of a network site in response to the authentication request and in response to the authentication management client being supported.Type: ApplicationFiled: February 1, 2012Publication date: August 1, 2013Applicant: AMAZON TECHNOLOGIES, INC.Inventors: Daniel W. Hitchcock, Brad Lee Campbell
-
Publication number: 20130198824Abstract: Disclosed are various embodiments for recovery and other management functions relating to security credentials which may be centrally managed. Account data, which includes multiple security credentials for multiple network sites for a user, is stored by a service in an encrypted form. A request for the account data is obtained from a client. The request specifies a security credential for accessing the account data. The account data is sent to the client in response to determining that the client corresponds to a preauthorized client and in response to determining that the security credential for accessing the account data is valid.Type: ApplicationFiled: February 1, 2012Publication date: August 1, 2013Applicant: Amazon Technologies, Inc.Inventors: Daniel W. Hitchcock, Brad Lee Campbell
-
Publication number: 20130198823Abstract: Disclosed are various embodiments for providing managed security credentials to network sites for authentication. Multiple accounts of a user are maintained for multiple network sites. A secured resource of a network site is to be accessed by a computing device. One of the accounts is identified according to a domain name of the network site. The account is associated with a different network site having a different domain name from the domain name. The computing device is automatically authenticated with the network site using a security credential associated with the account.Type: ApplicationFiled: February 1, 2012Publication date: August 1, 2013Applicant: Amazon Technologies, Inc.Inventors: Daniel W. Hitchcock, Brad Lee Campbell
-
Publication number: 20130198825Abstract: The invention allows to secure access to data or services that are available for devices and applications via a device implementing the method. In order to secure the access to data or to one or more services that is/are accessed via a network device, the invention proposes a method that among others avoids unauthorized access to a data or one or more services and a device implementing the method.Type: ApplicationFiled: March 21, 2011Publication date: August 1, 2013Inventor: Dirk Feytons
-
Publication number: 20130198821Abstract: Disclosed are various embodiments for account management for multiple network sites. Multiple accounts of a user are maintained for multiple network sites in a computing device. A secured resource of a network site is to be accessed by the computing device. A new account is created, or an existing account is upgraded, in response to determining that the accounts are not capable of accessing the secured resource. A set of information about the user is provided to the network site to create, or upgrade, the account.Type: ApplicationFiled: February 1, 2012Publication date: August 1, 2013Applicant: AMAZON TECHNOLOGIES, INC.Inventors: Daniel W. Hitchcock, Brad Lee Campbell
-
Publication number: 20130198826Abstract: A computing machine including a sensor to capture a fingerprint image from a user and generate a password in response to the user accessing the sensor, a component to create a package of the fingerprint image and the password, and a processor to authenticate the fingerprint image from the package before decrypting an encryption of the password if a request for the password has been received before a predefined time has elapsed.Type: ApplicationFiled: October 15, 2010Publication date: August 1, 2013Applicant: Hewlett-Packard Development Company, L.P.Inventor: James Robert Waldron
-
Patent number: 8499166Abstract: A system for controlling access to a protected network includes a network access control module coupled to the network and configured to restrict access to the network to an authorized user through a computer coupled to the network. The system also includes a communication device associated with the computer, which automatically transmits a unique identifier corresponding to the communication device to the network access control module when a user uses the communication device to request access to the network via the computer. When the network access control module receives the unique identifier it is configured to authenticate the communication device, to authenticate the user via the communication device when the communication device is authenticated, and when the user is authenticated, to submit log-on information to a log-on interface of the computer associated with the communication device so that the user can access the network via the computer.Type: GrantFiled: July 13, 2012Date of Patent: July 30, 2013Assignee: Avatier CorporationInventors: Scott L. Chiou, Nelson A. Cicchitto
-
Patent number: 8499156Abstract: The invention discloses a method for implementing encryption and transmission of information and system thereof. The method comprises the following steps when a sender sends information to a receiver: a client of the sender encrypts the information by using a unique identifier of a receiver identity as a public key; the sender sends the encrypted information to the receiver; the receiver receives the encrypted information, and a client of the receiver performs decryption by using a user private key; wherein the client of the receiver obtains the user private key by one-off registration and the user private key matches with the unique identifier of the receiver identity. The system comprises an information transmission platform, a sender and a receiver connected to each other by the information transmission platform, clients provided in the sender and the receiver, and a registration component.Type: GrantFiled: May 20, 2009Date of Patent: July 30, 2013Assignee: City University of Hong KongInventors: Shek Duncan Wong, Xiaokang Xiong
-
Patent number: 8498414Abstract: A trusted domain name server is introduced to provide a secure route optimization procedure for MIPv6. A trusted authority registers network addresses of a mobile node with corresponding fully qualified domain names. The trusted domain name server can later be queried to compare the domain of a network address for a mobile node with the domain of a network address for another network node.Type: GrantFiled: December 15, 2010Date of Patent: July 30, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventor: Angelo Rossi
-
Publication number: 20130191893Abstract: User access to a help system is provided in an anonymous manner. A provider organization distributes unique pre-generated unique user access codes to potential users. The user access codes include a general information portion and a random portion. When accessing the system for the first time, the user enters their unique user access code, a username, and password. The system associates the username with the password and with the user access code. Subsequent, the user logs into the system using the username and password. Data may be compiled and stored in association with the user access code for later retrieval and analysis to calculate statistics for provider organizations.Type: ApplicationFiled: January 19, 2012Publication date: July 25, 2013Inventors: Daniel J. Sutton, Paul S. Winter
-
Publication number: 20130191897Abstract: This invention includes apparatus, systems, and methods to add a new device to a secure enclave, without requiring the new device to enter close proximity to the security entity and protected area. A new device is able to gain access to the secure enclave by first obtaining a temporary credential from an existing device in the field. The new device presents the temporary credential to the security entity which authenticates, provisions, and if appropriate fully associates the new devices to the secure enclave. The invention also includes a process for creating and distributing the temporary credentials to existing devices in the field including using secure connections to transmit electronic version of the temporary credentials and methods to securely distribute physical copies of the credentials. This invention enables rapid deployment of new devices, or replenishment of lost or damaged devices in the field without compromising the security of the device or the secure enclave.Type: ApplicationFiled: December 28, 2012Publication date: July 25, 2013Applicant: CUMMINGS ENGINEERING CONSULTANTS, INC.Inventor: CUMMINGS ENGINEERING CONSULTANTS, INC.
-
Publication number: 20130191896Abstract: A system for provisioning an output device, may include a processor; a memory; and a records display program. The records display program may be executed by the processor to maintain an indication of availability dates and times of one or more output devices connected to the network; to receive an output device invitation indicating a first output device to reserve at a meeting conducted over a conferencing system; to determine whether the first output device is available for reservation during a date and time period of the meeting; and to communicate to the first output device activation information indicating that the first output device is to become active at a first predetermined date and time related to the date and time period of the meeting and login information including a first credential for the first output device to use for logging into the conferencing system for the meeting.Type: ApplicationFiled: January 25, 2012Publication date: July 25, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Darryl M. Adderly, Christopher T. Carlin, Michelle Davis, Dale J. Heeks, Ryan E. Smith
-
Publication number: 20130191898Abstract: A system providing features for facilitating the authentication and verification of a consumer, facilitating and sharing trust between the consumer and third parties, and for continuously updating such information. The system can create an online identity credential based on verifying the identity of an individual subject. The system can include adding first, second, and third party information to the credential, analyzing the data in the credential to create metadata stored within the credential, continuously and periodically updating the elements and metadata of the identity credential, and for sharing selected data and metadata elements of the credential with second and third parties. The system can be used as a standalone identity credential or in support of biometric identity applications. The system can include rewards to encourage subjects to continuously verify their identity.Type: ApplicationFiled: January 4, 2013Publication date: July 25, 2013Inventor: Harold H. Kraft
-
Publication number: 20130191899Abstract: Systems and methods for One-Time Password (OTP) authentication with infinite nested hash chains are described. In one aspect, a methodology includes a client device that provides a one-time password (OTP) authentication server with certain registration information. The client device generates, via the OTP authentication server, an authenticated OTP with infinite nested hash chains, These generating operations use a first hash function (hA (?)) for updating a seed chain, a second hash function (hB (•)) for OTP production, an OTP seed number stOTP for a tth authentication, and two authentication seeds of numbers s2t?1Auth and s2tAuth, for the tth authentication.Type: ApplicationFiled: November 17, 2010Publication date: July 25, 2013Applicant: KING SAUD UNIVERSITYInventors: Mohamed Hamdy Khalil Eldefrawy, Khaled Soliman Alghathbar, Muhammad Khurram Khan
-
Publication number: 20130191895Abstract: Novel tools and techniques for automated recovery of information from commercial web portals, including commercial web portals requiring credentials for access. In some instances images are captured and pushed to external processes for improving system performance. In some instances access to automated software agent remote control modules is balanced across a system comprising a plurality of processors hosting the automated software agent remote control modules. Some instances provide provisioning of credentials, in particular indicating credentials available for an unlimited or a select limited number of users and monitoring credential use of those credentials usable by a select number of users. Some instances provide cache management optimizes retrieval of data by external processes and ensures reliability of such data to reduce unnecessary web portal inquiries.Type: ApplicationFiled: January 23, 2012Publication date: July 25, 2013Applicant: RECONDO TECHNOLOGY, INC.Inventors: John L. Magee, David Cannon, Darin Omtvedt, Robert Larivee, Cory Harper, Harold Piskiel
-
Publication number: 20130191894Abstract: Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications.Type: ApplicationFiled: January 19, 2012Publication date: July 25, 2013Applicant: MICROSOFT CORPORATIONInventors: Vadim Eydelman, Brian Kress, Matthias Leibmann, Moustafa Noureddine, Lei Yu, Haibo Luo
-
Publication number: 20130191900Abstract: Provided is a communication apparatus (121) that securely manages passwords for utilizing a server apparatus. A generator (203) generates a random table having the same number of rows and the same number of columns as a password table associated with a server name specified in an authentication request received by a receiver (202). An acceptor (205) accepts a key from a user to whom the random table is presented by a presenter (204). An identification unit (206) identifies, from the key and the random table, the user's of selection order of elements in the table. An acquirer (207) selects and arranges elements in the password table in the identified selection order, thereby acquiring a password. An output unit (208) displays the acquired password on a display or transmits the acquired password to the server apparatus, thereby allowing the user to utilize the server apparatus.Type: ApplicationFiled: August 30, 2011Publication date: July 25, 2013Inventor: Hideharu Ogawa
-
Patent number: 8495717Abstract: A secure key distribution server (SKDS) determines identity of a requesting server without use of a shared secret by resolving the fully qualified domain name (FQDN) to a network address and comparing it with the network address of a key request. A credential string may also be used as part of the identification. Once identity is established, keys may be securely distributed. The SKDS may also be implemented in a peer-to-peer configuration.Type: GrantFiled: April 24, 2009Date of Patent: July 23, 2013Assignee: Amazon Technologies, Inc.Inventors: Jacob Beacham, Jesper M. Johansson, Cyrus Durgin
-
Patent number: 8495715Abstract: Techniques for credential auditing are provided. Histories for credentials are evaluated against a principal credential policy for a user and an enterprise credential policy for an enterprise as a whole. An audit trail is produced within a report for the histories. The report indicates whether compliance with the principal and enterprise credential policies occurred and if not at least one reason is provided as to why compliance was not met within the histories.Type: GrantFiled: February 23, 2009Date of Patent: July 23, 2013Assignee: Oracle International CorporationInventors: Larry Hal Henderson, Brett A. Berger
-
Patent number: 8495369Abstract: When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may be certified as legitimate measured by a portable apparatus with a GPS reception function employed by a user. When transmitting information related to the position and the time acquired from a portable phone terminal having the GPS function and a network function by means of the GPS function to the server apparatus, authentication is carried out between the portable phone terminal and the server apparatus. The position/time information is transmitted to the server apparatus, only if the server apparatus is authenticated as a legitimate counterpart for connection. A secret key holding section is provided for holding different secret keys for different apparatuses.Type: GrantFiled: June 17, 2003Date of Patent: July 23, 2013Assignee: Sony CorporationInventors: Masayuki Takada, Takayasu Muto
-
Patent number: 8495371Abstract: In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network aggregation device includes one or more optical Ethernet switches that can be adaptively configured to support authentication of one or more ONTs. For example, the optical network aggregation device may include a controller with an authentication unit for managing ONT authentication and an optical Ethernet interface for transmitting and receiving data over the optical network. The authentication unit may exchange authentication request messages via the optical Ethernet interface with an ONT and grant the ONT access to the provider network based on the exchange, thereby preventing rogue devices from gaining access to the provider network.Type: GrantFiled: January 6, 2010Date of Patent: July 23, 2013Assignee: Calix, Inc.Inventors: Berkay Baykal, Shaun Noel Missett
-
Patent number: 8495714Abstract: Systems and methods system for a user accessing an unsecure Wifi access point are provided. In an embodiment, the present invention requests that the customer perform authentication of the access point to which he is connected. On initial connection to the access point, the customer provides his username/password and chooses a memorable information element (e.g., image or phrase). A site specific cookie is delivered to the customer device after a successful authentication. On subsequent connections, the site specific cookie is validated and the MAC address of the customer device is used to retrieve the memorable information element. If the customer recognizes his memorable image, he confirms that he is on a bona fide access point. In a further embodiment, if the customer connects at a location and/or time of day which breaks a previously observed pattern, MAC authentication is not accepted and a full authentication (e.g., user/password) is required.Type: GrantFiled: February 1, 2012Date of Patent: July 23, 2013Assignee: Bridgewater Systems Corp.Inventors: D. Mark Jones, Eamonn Garry
-
Publication number: 20130185780Abstract: This technology provides methods, non-transitory computer readable medium and apparatuses that generate a OneTime Password (OTP) such that no hardware token is used. The technology uses some functions and parameters generated and transmitted to the client machine, by the server. The server generates a token for each session, cyclic groups G1 and G2 of elements and sends this to client machine. The client generates a first OTP using a predefined function on the token and the hash value of user password, such that retrieving the hash value of the password from the first OTP is a discrete log problem. A second OTP is generated using a bilinear mapping on the first OTP, and an element of G1, such that generating first OTP from second OTP is a bilinear inverse problem.Type: ApplicationFiled: June 25, 2012Publication date: July 18, 2013Applicant: INFOSYS LIMITEDInventors: Vijayaraghavan Varadharajan, Sivakumar Kuppusamy, Kanika Pasricha, Rajarathnam Nallusamy
-
Publication number: 20130185777Abstract: Systems and techniques for authenticating joint friends of users of wireless devices. An authenticating authority delivers a token to a wireless device for each party identified as a friend of a user of the wireless device, such as through relationships in an online social network. Two wireless devices can use information relating to the tokens to determine information relating to joint friends of the users of the devices, such as the identities of joint friends or simply the numbers of joint friends. Tokens can be further refined to allow for analysis that provides information relating to the degree of intimacy of the relationship between a user and a party identified as a friend.Type: ApplicationFiled: January 17, 2012Publication date: July 18, 2013Inventors: Nadarajah Asokan, Markus Miettinen
-
Publication number: 20130185778Abstract: Provided is an off-line two-factor user authentication system with a reduced risk of leakage of authentication information. The two-factor user authentication system is designed to use, as a password, a one-time-password derivation rule to be applied to certain pattern elements included in a presentation pattern at specific positions so as to create a one-time password, and further use, as a second authentication factor, information identifying a client to be used by a user. A plurality of pattern seed values each adapted to uniquely specify a presentation pattern in combination with a client ID, and a plurality of verification codes corresponding to respective ones of the pattern seed values, are stored in an off-line two-factor authentication client. A presentation pattern is created based on a selected one of the pattern seed values and a client ID, and an entered one-time password is verified based on a verification code corresponding to the selected pattern seed value.Type: ApplicationFiled: October 5, 2010Publication date: July 18, 2013Inventors: Shigetomo Tamai, Toru Takano, Tsuyoshi Kobayashi
-
Publication number: 20130185782Abstract: Systems and methods for emulating credentials are disclosed. In some cases, the systems include an access credential reader and an access credential writer. The access credential reader is communicably coupled to the access credential writer. The access credential reader is operable to receive information from an access credential, and to transfer at least a portion of the information to the access credential writer. The access credential writer is operable to transfer at least the portion of the information to an emulation access credential.Type: ApplicationFiled: February 21, 2013Publication date: July 18, 2013Applicant: XCEEDID CORPORATIONInventor: XCEEDID CORPORATION
-
Publication number: 20130185779Abstract: Provided is a two-actor user authentication system with a reduced risk of leakage of authentication information. The two-factor user authentication system is designed to use, as a password, a one-time-password derivation rule to be applied to certain pattern elements included in a presentation pattern at specific positions so as to create a one-time password, and further use, as a second authentication factor, information identifying a client to be used by a user. An authentication server is operable to generate a pattern seed value adapted to uniquely specify a presentation pattern in combination with a client ID, and transmit the pattern seed value to an authentication-requesting client. The authentication-requesting client is operable to create a presentation pattern based on a client ID acquired therefrom, and display the presentation pattern to allow a user to enter thereinto a one-time password based on the presentation pattern.Type: ApplicationFiled: October 5, 2010Publication date: July 18, 2013Inventors: Shigetomo Tamai, Toru Takano, Tsuyoshi Kobayashi
-
Publication number: 20130185781Abstract: The present disclosure provides a method and a device for realizing remote login. The method includes: a terminal server responding to a login request to an internal system from an end user, and recording and saving login information of the end user for logging in to the internal system; and the terminal server judging and analyzing the way the end user logs in to the internal system according to the login information and pre-configured rule, and allowing the end user to log in to and access the internal system if the analyzed result matches the pre-configured rule. The method and device allows for implementations of the SSO authentication and user bind authentication on the aspect of the data flow in the terminal server, simplifies the process of logging in to and accessing the internal system, and improves the information security of the system.Type: ApplicationFiled: December 20, 2012Publication date: July 18, 2013Applicant: SANGFOR NETWORKS COMPANY LIMITEDInventor: Sangfor Networks Company Limited
-
Patent number: 8490199Abstract: Methods, apparatuses, and techniques for detecting and discouraging cheating in an online game session are described. Aspects include playing an online game. During play of the game one of the players detects suspected cheating behavior by another online game player. Game information is collected about the activity of all players in the online game, the game information includes a period of the game during which the suspected cheating behavior occurred. The game information is communicated to a game cheat monitoring entity that evaluates the game information to determine if there was cheating activity, and if there was cheating activity appropriate action is taken.Type: GrantFiled: October 29, 2007Date of Patent: July 16, 2013Assignee: Sony Computer Entertainment America LLCInventor: Gary Zalewski
-
Patent number: 8489878Abstract: Communication across domains is described. In at least one implementation, a determination is made that an amount of data to be communicated via an Iframe exceeds a threshold amount. The data is divided into a plurality of portions that do not exceed the threshold amount. A plurality of messages is formed to communicate the divided data across domains.Type: GrantFiled: March 13, 2012Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Scott Isaacs, George Moore, Danny Thorpe, Vasileios Zissimopoulos
-
Patent number: 8489892Abstract: A device receives protected content and a license for the content, unprotects the content using an input key and retrieves a rule associated with the input key. The device then processes the content to create new content, retrieves at least one output key associated with the input key in the retrieved rule, protects the content using the output key and sends the newly protected content and the corresponding license. It is thus possible to impose a work flow as it is necessary for a device to store a particular key in order to access the content and as the rule imposes a particular output key depending on the input key. In a preferred embodiment, the content is scrambled using a symmetrical key that is encrypted by an asymmetrical key in the license. An alternate embodiment uses watermarking techniques instead of encryption. The invention finds particular use in video processing.Type: GrantFiled: March 17, 2008Date of Patent: July 16, 2013Assignee: Thomson LicensingInventors: Stephane Onno, Olivier Heen
-
Patent number: 8490166Abstract: Locating social networking system accounts for user of the social networking system permits the users to locate and access their accounts even if they cannot provide a user login ID or a login email address associated with their social networking system account. The social networking system locates a user account by receiving a user name associated with the user and a friend name of a friend connected to the user in the social networking system and identifying a user account wherein the identified user account has a user name matching the received user name and the identified user account is connected with another user in the social networking system who has a user name matching the received friend name.Type: GrantFiled: December 29, 2010Date of Patent: July 16, 2013Assignee: Facebook, Inc.Inventor: Jonathan H. Frank
-
Patent number: 8490165Abstract: The different illustrative embodiments provide a method, a computer program product, and an apparatus for restoring secure sessions. A determination is made whether cached information for a session for the requestor is stored at the data processing system using a session cookie responsive to receiving a request at a data processing system from a requestor to access a resource. Access to the resource is controlled using the cached information and a number of privileges for the requestor associated with the cached information responsive to a determination that the cached information for the session is stored at the data processing system. A migration cookie is requested from the requestor responsive to an absence of a determination that the cached information for the session is stored at the data processing system. The cached information is generated for the session using the migration cookie.Type: GrantFiled: June 23, 2010Date of Patent: July 16, 2013Assignee: International Business Machines CorporationInventor: John Clay Richard Wray
-
Patent number: 8489889Abstract: A computing device receives a command to restrict access to encrypted data. The computing device generates a new record that can access the encrypted data. The computing device encrypts the record information for the new record using a public key of a trusted entity. The computing device prevents access to the encrypted data for a previously generated record or records.Type: GrantFiled: September 17, 2010Date of Patent: July 16, 2013Assignee: Symantec CorporationInventors: Vincent E. Moscaritolo, Jonathan D. Callas
-
Patent number: 8490093Abstract: Determining execution rights for a process. A user selects a process for execution. A driver intercepts the execution and communicates with a service or its remote agent. Configuration data is accessed to determine an execution role specifying whether the process should be denied execution or should execute with particular rights to access or modify system resources. The execution role is provided to the driver, and the driver allows or denies execution of the process in accordance with the provided execution role.Type: GrantFiled: February 5, 2007Date of Patent: July 16, 2013Assignee: Microsoft CorporationInventors: Mark Russinovich, Bryce Cogswell, Wesley G. Miller
-
Patent number: 8490164Abstract: An authenticating device communicating with a server device includes: a dividing unit that divides secret information into plural secret fragments by a threshold secret sharing scheme; a first generating unit that generates plural cryptographic fragments by encrypting the secret fragments using first plural passwords; a first transmitting unit that transmits the cryptographic fragments to the server device; a first receiving unit that receives the cryptographic fragments from the server device, a second generating unit that generates plural secret fragment candidates by decrypting the cryptographic fragments using second plural passwords; a third generating unit that obtains a verifying information candidate by the threshold secret sharing scheme using a group of the secret fragment candidates; a second transmitting unit that transmits the verifying information candidate to the server device; and a second receiving unit that receives result information of comparing the verifying information candidate with verType: GrantFiled: March 21, 2007Date of Patent: July 16, 2013Assignee: Kabushiki Kaisha ToshibaInventors: Toshinari Takahashi, Kentaro Umesawa, Shinji Yamanaka
-
Patent number: 8490163Abstract: A system, method, and computer program product enforce a universal security policy across several systems. In one embodiment, the system comprises a translation module that translates the universal security policy into local security rules enforceable by the security components of the several systems. The system also comprises a policy pushing module that transmits the translated local security rules to each of the several systems. Further, the system can include an analysis module for detecting local security rules in the several systems that are inconsistent with the universal security policy.Type: GrantFiled: September 8, 2006Date of Patent: July 16, 2013Assignee: IntApp, Inc.Inventors: Dan Harsell, Jeff Armbrecht
-
Patent number: 8489881Abstract: When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may be certified as legitimate measured by a portable apparatus with a GPS reception function employed by a user. When transmitting information related to the position and the time acquired from a portable phone terminal having the GPS function and a network function by means of the GPS function to the server apparatus, authentication is carried out between the portable phone terminal and the server apparatus. The position/time information is transmitted to the server apparatus, only if the server apparatus is authenticated as a legitimate counterpart for connection. A secret key holding section is provided for holding different secret keys for different apparatuses.Type: GrantFiled: May 28, 2008Date of Patent: July 16, 2013Assignee: Sony CorporationInventors: Masayuki Takada, Takayasu Muto
-
Patent number: 8489886Abstract: A method, data processing system and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.Type: GrantFiled: September 26, 2008Date of Patent: July 16, 2013Assignee: International Business Machines CorporationInventors: Vincent Boucher, Sebastien Chabrolles, Benoit Granier, Arnaud Mante
-
Patent number: 8490161Abstract: Provisioning VLAN services in a network patching system includes receiving a request to provide a VLAN service to an individual communication channel, determining whether a switch connector port connected to the individual communication channel via a patch cord is configured to provide the requested VLAN service, and initiating the requested VLAN service to the individual communication channel in response to determining that the switch connector port is configured to provide the requested VLAN service. Verification that a user associated with the individual communication channel is authorized to access the requested VLAN service may be performed prior to initiating the requested VLAN service. An administrator may be notified that a VLAN service has been requested and/or initiated. The user associated with the communication channel may be notified when the requested VLAN service has been initiated.Type: GrantFiled: January 7, 2008Date of Patent: July 16, 2013Assignee: CommScope Inc., of North CarolinaInventor: Daniel Warren Macauley
-
Patent number: 8490198Abstract: Techniques for the local personalization of content are presented. A content personalization service is dynamically pushed from a server environment to a client processing environment associated with a principal on demand. The content personalization service interjects itself between content that the principal attempts to view and access within the client processing environment and modifies and personalizes that content on behalf of the principal before the principal can view or access the content.Type: GrantFiled: May 18, 2007Date of Patent: July 16, 2013Assignee: Apple Inc.Inventors: Cameron Craig Morris, Lloyd Leon Burch
-
Patent number: 8488792Abstract: A wireless communications validation system comprises a validation module configured to determine an identity of an antenna disposed in a computer system and an identity of a wireless module disposed in the computer system, the validation module configured to validate permissible combination of the antenna with the wireless module.Type: GrantFiled: October 26, 2005Date of Patent: July 16, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Isaac Lagnado, Timothy Neill, Jeffrey Kevin Jeansonne, Harold S. Merkel
-
Publication number: 20130179951Abstract: Embodiments address various methods and apparatuses that attempt to minimize the time that the security communication between group members may be at risk due to a user joining or leaving. For example, embodiments include methods of minimizing the time for which a joining member receives a secure commonly shared key and other embodiments include methods of minimizing the time that a user leaving the group has access to data shared within the group through updating the secure commonly shared key.Type: ApplicationFiled: January 6, 2012Publication date: July 11, 2013Inventors: Ioannis Broustis, Violeta Cakulev, Ganapathy Subramanian Sundaram
-
Publication number: 20130179952Abstract: A method for selectively refreshing group membership for an identifier associated with an authenticated user. The identifier represents an application server security context, and it is generated to enable a user credential associated with the authenticated user to be persisted. Following such authentication, the client is provided with a time-bounded, renewable security token. The method begins by configuring an option whether group membership information is refreshed during renewal of an expired security token. During renewal of an expired security token, the method determines whether the option is set. If so, an attempt is made to refresh information. This attempt performs a set of checks to verify certain conditions. If these checks are valid, the identifier is refreshed and the security token renewed with updated group membership information. If any check is not valid, the identifier is refreshed and the security token renewed with existing information.Type: ApplicationFiled: January 11, 2012Publication date: July 11, 2013Applicant: International Business Machines CorporationInventors: William J. O'Donnell, Paul William Bennett, Elisa Ferracane, Michael Craig Thompson, Christopher Michael Dettlaff
-
Patent number: 8484673Abstract: A method to reduce bandwidth necessary for renewal of subscriptions for reception of broadcast services including: defining a plurality of sets of subscriber identification numbers, each set being associated with a product; splitting a set of subscriber identification numbers into groups of subscribers; searching for an available subscriber identification number related to the desired product at the time of initialization of a new subscriber; confirming that an inhibit duration has elapsed between the end of the previous subscription and the start of the new subscription; sending an initialization message to the new subscriber addressed with his unique identification address and containing the subscriber identification number of, and rights to, his product; preparing a group rights renewal message for the product to the group containing the subscriber identification number, this message comprising the group header containing this subscriber and a compressed bitmap allowing to individually address each of theType: GrantFiled: May 19, 2009Date of Patent: July 9, 2013Assignee: Nagravision S.A.Inventor: Guy Moreillon
-
Patent number: 8484327Abstract: A method and system for enterprise device management allows the administrator to set a policy of forbidden devices, monitor devices used in the organization, provide alerts and notification incase an unknown device is connected to a computer, and monitor or block connections of devices which do not comply with the said security policy. A method for device management in a computer system comprises detecting connection of a device to the computer system and determining a reaction to perform in response to the connection of the device to the computer system based on parameters related to the device and on device management rules.Type: GrantFiled: November 7, 2007Date of Patent: July 9, 2013Assignee: McAfee, Inc.Inventors: Eran Werner, Elad Zucker, Ben Matzkel