Patents Examined by David Garcia Cervetti
  • Patent number: 11362824
    Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.
    Type: Grant
    Filed: May 23, 2019
    Date of Patent: June 14, 2022
    Assignee: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, David P. Maher
  • Patent number: 11354406
    Abstract: Methods and apparatus relating to a physics-based approach for attack detection and/or localization in closed-loop controls for autonomous vehicles are described. In an embodiment, multiple state estimators are used to compute a set of residuals to detect, classify, and/or localize attacks. This allows for determination of an attacker's location and the kind of attack being perpetrated. Other embodiments are also disclosed and claimed.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: June 7, 2022
    Assignee: INTEL CORPORATION
    Inventors: Marcio Juliato, Shabbir Ahmed, Manoj Sastry, Liuyang L. Yang, Vuk Lesi, Li Zhao
  • Patent number: 11356478
    Abstract: Techniques for phishing protection using cloning detection are described herein. The techniques described herein can include a server which hosts a website detecting that a fetcher is a cloning toolkit or an entity known for using a cloning toolkit. The techniques can also include a server which hosts a downloadable application (such as a mobile application) detecting that a fetcher for the application is a cloning toolkit or an entity known for using a cloning toolkit. The detection can be done in several ways, such as by analyzing data logs for patterns associated with cloning toolkits or entities known for using cloning toolkits. The techniques described herein can also include a part of an end user device (such as a part of a mobile device) detecting a clone (such as a clone website or application) that was cloned by a cloning toolkit. Then, upon detection, security actions can be taken.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 7, 2022
    Assignee: Lookout, Inc.
    Inventors: Jeremy Boyd Richards, Brian James Buck
  • Patent number: 11341269
    Abstract: Methods for secure random selection of t client devices from a set of N client devices and methods for secure computation of inputs of t client devices randomly selected from N client devices are described. Such random selection method may include determining an initial binary vector b of weight t by setting the first t bits to one: bi=1, 1?i?t, and all further bits to zero: bi=0, t<i?N; each client device i (i=1, . . . , N) of the set of N client devices jointly generating a random binary vector b of weight t in an obfuscated domain on the basis of the initial binary vector b including: determining a position n in the binary vector; determining a random number r in {n, n+1, . . . N}; and, using the random number to swap binary values at positions n and r of the binary vector b.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: May 24, 2022
    Assignee: FLYTXT B.V.
    Inventor: Thijs Veugen
  • Patent number: 11334547
    Abstract: Some embodiments are directed to a data retrieval device 210 for data-obliviously copying a subarray of a first array to a second array. The length of the second array is more than one and less than the length of the first array. The length of the subarray is at most the length of the second array. For each first element at a first index in the first array, the data retrieval device selects a second index in the second array for the first index in the first array; data-obliviously computes a choice bit indicative of whether to copy the first element to the second index in the second array; and replaces a second element at the second index in the second array by a replacement element, the replacement element being data-obliviously set to the first element or the second element based on the choice bit.
    Type: Grant
    Filed: August 9, 2019
    Date of Patent: May 17, 2022
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventor: Meilof Geert Veeningen
  • Patent number: 11328039
    Abstract: An electronic apparatus includes: an input module configured to input an export instruction and an electronic apparatus identifier, the export instruction instructing to export an application, the electronic apparatus identifier corresponding to one different electronic apparatus; a controller module configured to generate an activation key on a basis of the electronic apparatus identifier where the export instruction is input, the activation key being for activating the application only in the one different electronic apparatus, control to output a package file including the application and the activation key, and inactivate the application after a certain replacement transition time period passes, the certain replacement transition time period starting from an output time point of the package file; and an output module configured to output the package file controlled by the controller module.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: May 10, 2022
    Assignee: KYOCERA DOCUMENT SOLUTIONS INC.
    Inventors: Hiroshi Nakamura, Satoshi Imai, Aya Kamakura, Hiroshi Yoshimoto
  • Patent number: 11310043
    Abstract: A receiver in a communication system may include a buffer and hardware. The buffer may be configured to store a communication signal comprising one or more pulses representative of data. The hardware may be configured to determine whether a data authentication pulse has been superimposed over at least one of the one or more pulses, and authenticate, based on the determination of whether the data authentication pulse has been superimposed over at least one of the one or more pulses, the one or more pulses as a valid representation of the data.
    Type: Grant
    Filed: January 3, 2019
    Date of Patent: April 19, 2022
    Assignees: Rolls-Royce Corporation, Rolls-Royce North American Technologies, Inc.
    Inventors: John Joseph Costello, Richard Joseph Skertic, Wayne Thomas Padgett, Sr.
  • Patent number: 11301592
    Abstract: A processing module of a dispersed storage network determines an obfuscation method is determined from a plurality of obfuscation methods for a data segment. The method continues with the processing module obfuscating the data segment according to the obfuscation method to produce an obfuscated data segment. The obfuscated data segment is encrypted and dispersed storage error encoded to produce a set of encoded data slices. The set of encoded data slices is then transmitted for storage in the dispersed storage network.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: April 12, 2022
    Assignee: PURE STORAGE, INC.
    Inventors: S. Christopher Gladwin, Jason K. Resch, Thomas F. Shirley, Jr.
  • Patent number: 11288397
    Abstract: Textual masking for multiparty computation is provided. The method comprises receiving masked input data from a number of contributors, wherein the input data from each contributor has a unique contributor mask value. A unique analyst mask factor is received for each contributor, computed by an analyst as a difference between a uniform analyst mask value and the contributor mask value. An API call is received from the analyst to aggregate the input data from the contributors. The respective analyst mask factors are added to the input data from the contributors, and the data is aggregated and shuffled. Computational results received from the analyst based on the aggregated input data are published. In response to API calls from the contributors, the analyst mask factors are removed from the computational results, wherein computational results received by each contributor are masked only by the respective contributor mask value.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: March 29, 2022
    Assignee: International Business Machines Corporation
    Inventors: Padmanabhan Krishnan, Vaibhav Murlidhar Kulkarni, Gopikrishnan Varadarajulu, Rakhi S. Arora, Samir Katti
  • Patent number: 11288347
    Abstract: Systems and techniques for providing login from an alternate electronic device are presented. A system can receive hash data associated with first fingerprint data and a timestamp from a first electronic device in response to a determination that the first electronic device satisfies a defined criterion associated with a terminal computing request. The system can also form a correlation between the first electronic device and a second electronic device within a geographic area associated with the first electronic device based on the timestamp, first location data associated with the first electronic device, and second location data associated with the second electronic device. Furthermore, the system can initiate display of a graphical user interface on the second electronic device in response to a determination that second fingerprint data provided to the second electronic device within a timeframe associated with the timestamp matches the first fingerprint data associated with the hash data.
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: March 29, 2022
    Assignee: PayPal, Inc.
    Inventor: Jigar Gosalia
  • Patent number: 11281790
    Abstract: A method and system for encrypting and reconstructing data files, including related metadata, is disclosed. The method involves separately encrypting data and metadata as chaining processes and integrating a plurality of encryption/encoding techniques together with strategic storage distribution techniques and parsing techniques which results in the integrated benefits of the collection of techniques. As disclosed, the content data is separated from its metadata, encryption keys may be embedded in the metadata, and in a content data encryption chaining process, the method chunks, encrypts, shards, and stores content data and separately shards and stores metadata, and stored in a flexible, distributed, and efficient manner, at least in part to assure improved resiliency In addition, the processes are preferably implemented locally, including at the site of the content data or a proxy server.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: March 22, 2022
    Assignee: Myota, Inc.
    Inventor: Jaeyoon Chung
  • Patent number: 11283793
    Abstract: Techniques for securing user sessions using a time-based one-time password (TOTP) generated from a shared secret. The shared secret can be a cryptographic hash of one or more user credentials. In response to a successful authentication based on the user credential(s), a session is created. The authentication is performed in connection with an initial access request from a client application. A subsequent access request for a protected resource during the session is processed by extracting a session cookie and a TOTP and generating a corresponding TOTP using the shared secret. The TOTP can be generated by combining the shared secret with one or more additional parameters such as a Uniform Resource Locator associated with the resource, or the session cookie. Access to the protected resource is conditioned upon the session, which is identified by the session cookie, being valid and upon the TOTPs matching.
    Type: Grant
    Filed: October 18, 2018
    Date of Patent: March 22, 2022
    Assignee: Oracle International Corporation
    Inventors: Ranjan Khanna, Sreenivasa R. Chitturi
  • Patent number: 11276051
    Abstract: Systems and methods for conducting convenient and secure mobile transactions between a payment terminal and a mobile device, e.g., in a fueling environment, are disclosed herein. In some embodiments, the payment terminal and the mobile device conduct a mutual authentication process that, if successful, produces a session key which can be used to encrypt sensitive data to be exchanged between the payment terminal and the mobile device. Payment and loyalty information can be securely communicated from the mobile device to the payment terminal using the session key. This can be done automatically, without waiting for the user to initiate a transaction, to shorten the overall transaction time. The transaction can also be completed without any user interaction with the mobile device, increasing the user's convenience since the mobile device can be left in the user's pocket, purse, vehicle, etc.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: March 15, 2022
    Assignee: Wayne Fueling Systems LLC
    Inventors: Weiming Tang, James M. Brewer
  • Patent number: 11269976
    Abstract: An apparatus and method for determining a source of an unauthorized copy of speech signals in a conference call session. A conference bridge receives a speech signal during a conference call session with a plurality of end user devices attending. The conference bridge provides one or more dynamic, end user specific watermarks corresponding to the one or more end user devices. Each watermark is adjusted based on characteristics of the speech signal to make the watermark imperceptible to a human being. The speech signal is then embedded with the adjusted watermark in real time to generate a modified speech signal.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: March 8, 2022
    Assignee: Saudi Arabian Oil Company
    Inventor: Faisal Hassan Khan
  • Patent number: 11265145
    Abstract: The disclosure concerns implementing, by a cryptographic circuit, a set of substitution operations of a cryptographic process involving a plurality of substitution tables. For each set of substitution operations of the cryptographic process, a series of sets of substitution operations are performed. One set of the series is a real set of substitution operations corresponding to the set of substitution operations of the cryptographic process. One or more other sets are dummy sets of substitution operations, each dummy set being based on a different permutation of said substitution tables.
    Type: Grant
    Filed: February 21, 2019
    Date of Patent: March 1, 2022
    Assignee: STMICROELECTRONICS (ROUSSET) SAS
    Inventors: Yanis Linge, Thomas Ordas, Pierre-Yvan Liardet
  • Patent number: 11263215
    Abstract: A method for enhancing rapid data analysis includes receiving a set of data; storing the set of data in a first set of data shards sharded by a first field; and identifying anomalous data from the set of data by monitoring a range of shard indices associated with a first shard of the first set of data shards, detecting that the range of shard indices is smaller than an expected range by a threshold value, and identifying data of the first shard as anomalous data.
    Type: Grant
    Filed: July 9, 2020
    Date of Patent: March 1, 2022
    Assignee: SCUBA ANALYTICS, INC.
    Inventors: Robert Johnson, Oleksandr Barykin, Alex Suhan, Lior Abraham, Don Fossgreen
  • Patent number: 11258579
    Abstract: A cryptographic circuit performs a substitution operation of a cryptographic algorithm based on a scrambled substitution table. For each set of one or more substitution operations of the cryptographic algorithm, the circuit performs a series of sets of one or more substitution operations of which: one is a real set of one or more substitution operations defined by the cryptographic algorithm, the real set of one or more substitution operations being based on input data modified by a real scrambling key; and one or more others are dummy sets of one or more substitution operations, each dummy set of one or more dummy substitution operations being based on input data modified by a different false scrambling key.
    Type: Grant
    Filed: February 21, 2019
    Date of Patent: February 22, 2022
    Assignee: STMICROELECTRONICS (ROUSSET) SAS
    Inventors: Daniele Fronte, Yanis Linge, Thomas Ordas
  • Patent number: 11245513
    Abstract: In the disclosed transaction processing system, members of an authorized network of consumers and merchants manage account information using blockchain ledgers. Because both consumers and merchants maintain copies of the blockchain, for any consumer/merchant transaction, both entities can quickly validate the transaction because both are aware, via their blockchain entries, of the current status of the account sourcing the transaction, allowing fast and accurate transaction validation without the need to incur the processing charges inherent in traditional fiat currency credit transactions.
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: February 8, 2022
    Assignee: Capital One Services, LLC
    Inventors: Austin Grant Walters, Reza Farivar, Jeremy Edward Goodsitt
  • Patent number: 11245536
    Abstract: Secure multi-party computations may be used to get attribution results without compromising user privacy. A content provider and an advertiser may each sign a calculation indicating that they wish to share data using a secure multi-party computation. A measurement company may sign the calculation indicating that the measurement company has evaluated the computation and that the computation will protect user privacy. A user device may confirm with the verification service that all parties have signed the calculation. The user device may transmit one-time identifiers to the measurement company, which allows impression data and conversion data stored by the content provider and the advertiser to be linked. The content provider, the advertiser, and the measurement company may perform the secure multi-party computation, which allows the advertiser to evaluate attribution results without accessing the user data stored by the content provider.
    Type: Grant
    Filed: April 16, 2019
    Date of Patent: February 8, 2022
    Assignee: Meta Platforms, Inc.
    Inventor: Andrew Knox
  • Patent number: 11238185
    Abstract: An electronic device configured for retail display includes a persistent memory on which boot instructions are stored, a storage device on which security monitoring instructions are stored, and a processor configured to execute the boot instructions during a boot sequence to initiate execution of the security monitoring instructions. The processor is further configured, via the execution of the security monitoring instructions, to monitor the retail display of the electronic device for a security trigger event and, upon detection of the trigger event, lock a user interface of the electronic device.
    Type: Grant
    Filed: March 7, 2018
    Date of Patent: February 1, 2022
    Assignee: SENNCO SOLUTIONS, INC.
    Inventors: Brian Peacock, Dale R. Liff