Patents Examined by Izunna Okeke
-
Patent number: 11321465Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.Type: GrantFiled: January 24, 2020Date of Patent: May 3, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
-
Patent number: 11316669Abstract: This application discloses an audit result data storage method and device, an audit result data query method and device, an audit item storage method and device, an electronic device and a medium. The method includes obtaining a first hash value of audit result data of a first user; signing the first hash value according to a private key of the first user to obtain first signature data; and transmitting the first signature data to an audit result data storage subsystem, the audit result data storage subsystem being configured to store data in the form of a blockchain.Type: GrantFiled: October 16, 2020Date of Patent: April 26, 2022Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Dongyan Wang, Maocai Li, Bo Li, Haitao Tu
-
Patent number: 11303454Abstract: Software for producing and verifying computational determinations using a distributed ledger, by: (i) receiving a first input from a user; (ii) producing a first computational determination utilizing a first computational model, wherein the first computational determination includes a first computational output that is based, at least in part, on the first input; (iii) computing a hash of the first computational model; (iv) sending a record of the first computational determination to a verification system, wherein the record of the first computational determination includes the hash of the first computational model; (v) receiving a verification from the verification system indicating that the hash of the first computational model matches a hash of a second computational model and that the record of the first computational determination has been stored in a first distributed ledger; and (vi) in response to receiving the verification, providing the first computational output to the user.Type: GrantFiled: November 28, 2018Date of Patent: April 12, 2022Assignee: International Business Machines CorporationInventors: Bradley C. Herrin, Xianjun Zhu, Bo Zhang, Alexander Sobran
-
Patent number: 11290886Abstract: A method for authenticating a mobile identity (ID) is provided. The mobile ID is provided on an end device of a user. Personal information about the user is first brought into anonymized form via a one-way function known to the end device of the user and to a first entity and transmitted with a single mobile ID certificate to the first entity. A communication exchange between the end device of the user and the first entity is henceforth identified by this mobile ID certificate. At a later point in time, the user is provided a permission option to transmit the personal information in non-anonymized form to the first entity. The first entity uses the then transmitted non-anonymized personal information to check its anonymized form.Type: GrantFiled: December 15, 2020Date of Patent: March 29, 2022Assignee: DEUTSCHE TELEKOM AGInventors: Christian Stengel, Joerg Breuer, Friedrich Toensing
-
Patent number: 11290279Abstract: The present disclosure relates to an authentication terminal, an authentication device, and an authentication method and system using the authentication terminal and the authentication device, and more particularly, to a device and a method for authenticating users and allowing transactions through information delivery among a user terminal, an authentication terminal, and an authentication device.Type: GrantFiled: August 22, 2018Date of Patent: March 29, 2022Inventor: Tae Sik Yoon
-
Patent number: 11277411Abstract: Described herein includes a data controller that secures personal data and efficiency and reliably records data access events using blockchain. The system may include a data controller for: receiving a request to access data stored in a database on the data controller, the request including a web token; verifying the web token of the request; providing access to the data stored in the database; generating a data access event indicating that the data stored in the database has been accessed; and recording the data access event on a blockchain platform in accordance with blockchain.Type: GrantFiled: December 13, 2018Date of Patent: March 15, 2022Assignee: SAP SEInventors: Xun Sun, Jianmin Xue
-
Patent number: 11275829Abstract: An apparatus includes an external device for causing messages to be transmitted with local traffic between internal blocks of a host system-on-chip (SoC) via a network on chip (NoC) in the host SoC, the transmitted messages including one or more memory requests directed to a memory of the host SoC, violating a traffic policy for a first time interval by transmitting a number of messages that exceeds a maximum threshold of for the first time interval, where the SoC monitors an amount of external traffic from an untrusted device transmitted over the NoC over a set of one or more time intervals including the first time interval, and in response to detection of the violation by the host SoC, reducing an amount of traffic transmitted via the NoC. The apparatus also includes an external processor link for transmitting the messages from the external device to the host SoC.Type: GrantFiled: April 23, 2020Date of Patent: March 15, 2022Assignee: Advanced Micro Devices, Inc.Inventors: Gabriel H Loh, Maurice B Steinman
-
Patent number: 11271721Abstract: Techniques for calculating a hash value of a single secure array of memory blocks in a sequential set of dice. The array can be defined by a set of address-size pairs. Each pair provides a pointer by including an address of a memory block and a size of the block. The hash value can be calculated by: for each die that is not the last die, partially applying a hash function, without final padding, to the memory blocks of the secure array in the die to generate a partial digest. And, for the last die, fully applying the hash function, with the final padding, to the memory blocks of the secure array in the last die to generate the hash value of the secure array, which can include adding an accumulation of partial digests to data from the last die as a basis for the generation of the hash value.Type: GrantFiled: March 25, 2019Date of Patent: March 8, 2022Assignee: Micron Technology, Inc.Inventors: Alberto Troia, Antonino Mondello
-
Patent number: 11270172Abstract: An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data.Type: GrantFiled: October 21, 2019Date of Patent: March 8, 2022Assignee: Canon Kabushiki KaishaInventors: Hirotaka Ittogi, Kenjiro Hori
-
Patent number: 11258606Abstract: Security-enhancing devices, systems, methods, and non-transitory computer-readable media for performing non-interactive zero knowledge proof (NIZKP) authentication. In one embodiment, a computing device includes a memory and an electronic processor. The memory stores a NIZKP authentication program and a plurality of unique passwords. The electronic processor is configured to receive a first random value from an electronic source, generate a second random value by performing an exclusive disjunction operation on the first random value with a first password of the plurality of unique passwords, perform an extraction operation on the second random value, determine whether the extraction operation performed on the second random value extracted a non-random value from the second random value, and responsive to determining that the extraction operation performed on the second random value extracted the non-random value from the second random value, authenticate communications with the electronic source.Type: GrantFiled: August 19, 2020Date of Patent: February 22, 2022Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Simon Hardy-Francis, Cecil Lau, Jacky Cheung, Andrian Sevastyanov, Kate O'Loughlin
-
Patent number: 11256806Abstract: A system for cyber-attack detection within cyber-physical systems (such as a vehicle). The system operates by obtaining a time-varying analog side-channel signal from components with the cyber-physical system and converting the time-varying analog side-channel signal to a digital side-channel signal. A time-series of system states are then identified based on the digital side-channel signal. The time-series of system states are compared with software states as generated by the cyber-physical system components, such that when the software states are unmatched with the time-series of system states, a side-channel is designated as having a security breach. In such an event, the cyber-physical system is then caused to implement an action based on the side-channel security breach.Type: GrantFiled: June 21, 2019Date of Patent: February 22, 2022Assignee: HRL Laboratories, LLCInventors: Joshua Haug, David W. Payton
-
Patent number: 11256798Abstract: Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second. Further, in particular embodiments, the systems and methods herein are scalable, such that many thousands of transactions can be processed per second upon replicating particular architectural components.Type: GrantFiled: June 12, 2020Date of Patent: February 22, 2022Assignee: BLUEFIN PAYMENT SYSTEMS LLCInventors: Timothy William Barnett, Alexander I. Kasatkin, Christopher Hozumi Miyata, Daniel Ruehle
-
Patent number: 11250157Abstract: A system protects personally identifiable information (PII) by implementing an unconventional key management scheme. In this scheme, the system uses a set of keys rather than an individual key for encrypting PII. Different portions of the PII are encrypted using different keys from the set of keys. In this manner, even if a malicious user were to access a key, that key would not give the malicious user the ability to decrypt all of the PII. Additionally, the system generates a new set of keys periodically (e.g., once a month). The system also deletes sets of keys that are too old (e.g., six months old). As a result, even if a malicious user were to access a key, the usefulness of that key would be time limited.Type: GrantFiled: March 3, 2020Date of Patent: February 15, 2022Assignee: THE PRUDENTIAL INSURANCE COMPANY OF AMERICAInventors: Venkatesh Sarvottamrao Apsingekar, Sahil Vinod Motadoo, Christopher John Schille, James Francis Lavine
-
Patent number: 11250143Abstract: Disclosed is an approach to implement a new layer of security within mobile devices using an encryption SDK, which implements a standalone component for applications to encrypt, decrypt, and view sensitive data on the device. A security layer is implemented on the device, wherein the security layer manages encryption for data retrieved onto the device from a cloud-based environment. Encrypted content is then generated at the security layer before storing the encrypted content by receiving the content object from the cloud-based environment and encrypting the content object with an encryption key that is password protected. The encrypted content is stored within an encrypted filesystem for presenting the content on the device.Type: GrantFiled: August 10, 2020Date of Patent: February 15, 2022Assignee: Box, Inc.Inventors: Christopher Vasselli, Irving Yunchi Ruan
-
Patent number: 11245681Abstract: Techniques are described for enabling a Kerberos-based authentication system to provide a client with access to a plurality of unmodifiable components that require plain text passwords. Such an approach enables a user to sign into a distributed computer system using a single password, and access multiple components that require different passwords without the need to enter a second password. By using Kerberos based authentication, passwords are not unnecessarily sent throughout distributed computing system where they may be vulnerable. A proxy key distribution center can be used to manage passwords or other credentials on behalf of various clients, which can be used with various processes discussed herein.Type: GrantFiled: May 11, 2018Date of Patent: February 8, 2022Assignee: Amazon Technologies, Inc.Inventors: Gregory Branchek Roth, Eric Jason Brandwine, Bradley Jeffrey Behm
-
Patent number: 11240021Abstract: A physical card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. The physical card may include disposed thereon a single address operable to receive digital bearer assets in one or more transactions on a decentralized computing platform, like a blockchain-based decentralized computing platform. Other decentralized computing platforms utilize different address generation protocols, thus preventing use of a single address on those other platforms. A set of addresses is generated, each address corresponding to a given decentralized computing platform. Each address is based on a same underlying key-pair, and a primary address is selected from the set for a given card. The remaining addresses in the set are stored, without storage of the public key or private key, and returned in a response to a request for additional addresses of the currency card.Type: GrantFiled: July 31, 2020Date of Patent: February 1, 2022Assignee: Ballet Global Inc.Inventor: Bobby Christopher Lee
-
Patent number: 11233638Abstract: Method for generating cryptotokens including identifying an asset; using a secret sharing algorithm, creating a token that corresponds to the asset, wherein the token represents a private key and comprises a first half and a second half; on the client side, generating first half of public key and first half of private key; transmitting first half of public key to a server; on the server, using first half of public key to generate a second half of private key; generating second half of public key using second half of private key; associating the asset with the token; access to the asset requires the first second halves of the private key; performing a transaction with the asset by transferring first half of private key from first user to second user, and re-associating the asset from first to second user; first half of private key is never stored together with second half.Type: GrantFiled: August 20, 2020Date of Patent: January 25, 2022Inventors: Anton Jakovlevich Liushits, Alexander Vladimirovich Vlasov
-
Patent number: 11228580Abstract: Implementations of the subject technology provide for performing, by a device, a request for obtaining information related to a phone authentication certificate (PAC) that was generated for the device, the PAC authenticating that a particular phone number is associated with the device, the request including packets of data. The subject technology receives the information related to the PAC, the information including an indication that the PAC was generated for the device. The subject technology sends, from the device, a request for validating the PAC to a remote server based at least in part on the information related to the PAC. Further, the subject technology receives a confirmation of validating the PAC from the remote server based at least in part on the information related to the PAC.Type: GrantFiled: September 28, 2018Date of Patent: January 18, 2022Assignee: Apple Inc.Inventors: Gokul P. Thirumalai, Daniel B. Pollack, Robert D. Butler, Ryan W. Baker, David G. Knipp, Sudhakar N. Mambakkam, Jonathon Sodos, Hannah S. Story, Hervé Sibert, Gianpaolo Fasoli
-
Patent number: 11223476Abstract: Security-enhancing devices, systems, methods, and non-transitory computer-readable media for performing non-interactive zero knowledge proof (NIZKP) authentication. In one embodiment, a computing device includes a memory and an electronic processor. The memory stores a NIZKP authentication program and a plurality of unique passwords. The electronic processor is configured to receive a first random value from an electronic source, generate a second random value by performing an exclusive disjunction operation on the first random value with a first password of the plurality of unique passwords, perform an extraction operation on the second random value, determine whether the extraction operation performed on the second random value extracted a non-random value from the second random value, and responsive to determining that the extraction operation performed on the second random value extracted the non-random value from the second random value, authenticate communications with the electronic source.Type: GrantFiled: August 19, 2020Date of Patent: January 11, 2022Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Simon Hardy-Francis, Cecil Lau, Jacky Cheung, Andrian Sevastyanov, Kate O'Loughlin
-
Patent number: 11218484Abstract: Case management systems and techniques are disclosed. In various embodiments, a hierarchical document permission model is received, the model describing a document hierarchy comprising a plurality of hierarchically related document nodes and defining for each of at least a subset of said document nodes one or more document roles and for each such role one or more document permissions with respect to that document node. The hierarchical document permission model is used to determine and enforce permissions with respect to case management instances to which the hierarchical document permission model applies.Type: GrantFiled: April 24, 2020Date of Patent: January 4, 2022Assignee: Open Text CorporationInventors: Jeroen Van Rotterdam, Michael T. Mohen, Satyapal P. Reddy, Muthukumarappa Jayakumar