Patents Examined by Izunna Okeke
  • Patent number: 11321465
    Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: May 3, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
  • Patent number: 11316669
    Abstract: This application discloses an audit result data storage method and device, an audit result data query method and device, an audit item storage method and device, an electronic device and a medium. The method includes obtaining a first hash value of audit result data of a first user; signing the first hash value according to a private key of the first user to obtain first signature data; and transmitting the first signature data to an audit result data storage subsystem, the audit result data storage subsystem being configured to store data in the form of a blockchain.
    Type: Grant
    Filed: October 16, 2020
    Date of Patent: April 26, 2022
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Dongyan Wang, Maocai Li, Bo Li, Haitao Tu
  • Patent number: 11303454
    Abstract: Software for producing and verifying computational determinations using a distributed ledger, by: (i) receiving a first input from a user; (ii) producing a first computational determination utilizing a first computational model, wherein the first computational determination includes a first computational output that is based, at least in part, on the first input; (iii) computing a hash of the first computational model; (iv) sending a record of the first computational determination to a verification system, wherein the record of the first computational determination includes the hash of the first computational model; (v) receiving a verification from the verification system indicating that the hash of the first computational model matches a hash of a second computational model and that the record of the first computational determination has been stored in a first distributed ledger; and (vi) in response to receiving the verification, providing the first computational output to the user.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: April 12, 2022
    Assignee: International Business Machines Corporation
    Inventors: Bradley C. Herrin, Xianjun Zhu, Bo Zhang, Alexander Sobran
  • Patent number: 11290886
    Abstract: A method for authenticating a mobile identity (ID) is provided. The mobile ID is provided on an end device of a user. Personal information about the user is first brought into anonymized form via a one-way function known to the end device of the user and to a first entity and transmitted with a single mobile ID certificate to the first entity. A communication exchange between the end device of the user and the first entity is henceforth identified by this mobile ID certificate. At a later point in time, the user is provided a permission option to transmit the personal information in non-anonymized form to the first entity. The first entity uses the then transmitted non-anonymized personal information to check its anonymized form.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: March 29, 2022
    Assignee: DEUTSCHE TELEKOM AG
    Inventors: Christian Stengel, Joerg Breuer, Friedrich Toensing
  • Patent number: 11290279
    Abstract: The present disclosure relates to an authentication terminal, an authentication device, and an authentication method and system using the authentication terminal and the authentication device, and more particularly, to a device and a method for authenticating users and allowing transactions through information delivery among a user terminal, an authentication terminal, and an authentication device.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: March 29, 2022
    Inventor: Tae Sik Yoon
  • Patent number: 11277411
    Abstract: Described herein includes a data controller that secures personal data and efficiency and reliably records data access events using blockchain. The system may include a data controller for: receiving a request to access data stored in a database on the data controller, the request including a web token; verifying the web token of the request; providing access to the data stored in the database; generating a data access event indicating that the data stored in the database has been accessed; and recording the data access event on a blockchain platform in accordance with blockchain.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: March 15, 2022
    Assignee: SAP SE
    Inventors: Xun Sun, Jianmin Xue
  • Patent number: 11275829
    Abstract: An apparatus includes an external device for causing messages to be transmitted with local traffic between internal blocks of a host system-on-chip (SoC) via a network on chip (NoC) in the host SoC, the transmitted messages including one or more memory requests directed to a memory of the host SoC, violating a traffic policy for a first time interval by transmitting a number of messages that exceeds a maximum threshold of for the first time interval, where the SoC monitors an amount of external traffic from an untrusted device transmitted over the NoC over a set of one or more time intervals including the first time interval, and in response to detection of the violation by the host SoC, reducing an amount of traffic transmitted via the NoC. The apparatus also includes an external processor link for transmitting the messages from the external device to the host SoC.
    Type: Grant
    Filed: April 23, 2020
    Date of Patent: March 15, 2022
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Gabriel H Loh, Maurice B Steinman
  • Patent number: 11271721
    Abstract: Techniques for calculating a hash value of a single secure array of memory blocks in a sequential set of dice. The array can be defined by a set of address-size pairs. Each pair provides a pointer by including an address of a memory block and a size of the block. The hash value can be calculated by: for each die that is not the last die, partially applying a hash function, without final padding, to the memory blocks of the secure array in the die to generate a partial digest. And, for the last die, fully applying the hash function, with the final padding, to the memory blocks of the secure array in the last die to generate the hash value of the secure array, which can include adding an accumulation of partial digests to data from the last die as a basis for the generation of the hash value.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: March 8, 2022
    Assignee: Micron Technology, Inc.
    Inventors: Alberto Troia, Antonino Mondello
  • Patent number: 11270172
    Abstract: An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information with a secret key paired with the public key and from which the target information is restorable, and the verification unit is further configured to detect an anomaly in the attribute information or the authentication information included in the data, by determining whether the attribute information included in the target information restored from the authentication information using the public key matches the attribute information included in the data.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: March 8, 2022
    Assignee: Canon Kabushiki Kaisha
    Inventors: Hirotaka Ittogi, Kenjiro Hori
  • Patent number: 11258606
    Abstract: Security-enhancing devices, systems, methods, and non-transitory computer-readable media for performing non-interactive zero knowledge proof (NIZKP) authentication. In one embodiment, a computing device includes a memory and an electronic processor. The memory stores a NIZKP authentication program and a plurality of unique passwords. The electronic processor is configured to receive a first random value from an electronic source, generate a second random value by performing an exclusive disjunction operation on the first random value with a first password of the plurality of unique passwords, perform an extraction operation on the second random value, determine whether the extraction operation performed on the second random value extracted a non-random value from the second random value, and responsive to determining that the extraction operation performed on the second random value extracted the non-random value from the second random value, authenticate communications with the electronic source.
    Type: Grant
    Filed: August 19, 2020
    Date of Patent: February 22, 2022
    Assignee: MASTERCARD TECHNOLOGIES CANADA ULC
    Inventors: Simon Hardy-Francis, Cecil Lau, Jacky Cheung, Andrian Sevastyanov, Kate O'Loughlin
  • Patent number: 11256806
    Abstract: A system for cyber-attack detection within cyber-physical systems (such as a vehicle). The system operates by obtaining a time-varying analog side-channel signal from components with the cyber-physical system and converting the time-varying analog side-channel signal to a digital side-channel signal. A time-series of system states are then identified based on the digital side-channel signal. The time-series of system states are compared with software states as generated by the cyber-physical system components, such that when the software states are unmatched with the time-series of system states, a side-channel is designated as having a security breach. In such an event, the cyber-physical system is then caused to implement an action based on the side-channel security breach.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: February 22, 2022
    Assignee: HRL Laboratories, LLC
    Inventors: Joshua Haug, David W. Payton
  • Patent number: 11256798
    Abstract: Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second. Further, in particular embodiments, the systems and methods herein are scalable, such that many thousands of transactions can be processed per second upon replicating particular architectural components.
    Type: Grant
    Filed: June 12, 2020
    Date of Patent: February 22, 2022
    Assignee: BLUEFIN PAYMENT SYSTEMS LLC
    Inventors: Timothy William Barnett, Alexander I. Kasatkin, Christopher Hozumi Miyata, Daniel Ruehle
  • Patent number: 11250157
    Abstract: A system protects personally identifiable information (PII) by implementing an unconventional key management scheme. In this scheme, the system uses a set of keys rather than an individual key for encrypting PII. Different portions of the PII are encrypted using different keys from the set of keys. In this manner, even if a malicious user were to access a key, that key would not give the malicious user the ability to decrypt all of the PII. Additionally, the system generates a new set of keys periodically (e.g., once a month). The system also deletes sets of keys that are too old (e.g., six months old). As a result, even if a malicious user were to access a key, the usefulness of that key would be time limited.
    Type: Grant
    Filed: March 3, 2020
    Date of Patent: February 15, 2022
    Assignee: THE PRUDENTIAL INSURANCE COMPANY OF AMERICA
    Inventors: Venkatesh Sarvottamrao Apsingekar, Sahil Vinod Motadoo, Christopher John Schille, James Francis Lavine
  • Patent number: 11250143
    Abstract: Disclosed is an approach to implement a new layer of security within mobile devices using an encryption SDK, which implements a standalone component for applications to encrypt, decrypt, and view sensitive data on the device. A security layer is implemented on the device, wherein the security layer manages encryption for data retrieved onto the device from a cloud-based environment. Encrypted content is then generated at the security layer before storing the encrypted content by receiving the content object from the cloud-based environment and encrypting the content object with an encryption key that is password protected. The encrypted content is stored within an encrypted filesystem for presenting the content on the device.
    Type: Grant
    Filed: August 10, 2020
    Date of Patent: February 15, 2022
    Assignee: Box, Inc.
    Inventors: Christopher Vasselli, Irving Yunchi Ruan
  • Patent number: 11245681
    Abstract: Techniques are described for enabling a Kerberos-based authentication system to provide a client with access to a plurality of unmodifiable components that require plain text passwords. Such an approach enables a user to sign into a distributed computer system using a single password, and access multiple components that require different passwords without the need to enter a second password. By using Kerberos based authentication, passwords are not unnecessarily sent throughout distributed computing system where they may be vulnerable. A proxy key distribution center can be used to manage passwords or other credentials on behalf of various clients, which can be used with various processes discussed herein.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: February 8, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Eric Jason Brandwine, Bradley Jeffrey Behm
  • Patent number: 11240021
    Abstract: A physical card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. The physical card may include disposed thereon a single address operable to receive digital bearer assets in one or more transactions on a decentralized computing platform, like a blockchain-based decentralized computing platform. Other decentralized computing platforms utilize different address generation protocols, thus preventing use of a single address on those other platforms. A set of addresses is generated, each address corresponding to a given decentralized computing platform. Each address is based on a same underlying key-pair, and a primary address is selected from the set for a given card. The remaining addresses in the set are stored, without storage of the public key or private key, and returned in a response to a request for additional addresses of the currency card.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: February 1, 2022
    Assignee: Ballet Global Inc.
    Inventor: Bobby Christopher Lee
  • Patent number: 11233638
    Abstract: Method for generating cryptotokens including identifying an asset; using a secret sharing algorithm, creating a token that corresponds to the asset, wherein the token represents a private key and comprises a first half and a second half; on the client side, generating first half of public key and first half of private key; transmitting first half of public key to a server; on the server, using first half of public key to generate a second half of private key; generating second half of public key using second half of private key; associating the asset with the token; access to the asset requires the first second halves of the private key; performing a transaction with the asset by transferring first half of private key from first user to second user, and re-associating the asset from first to second user; first half of private key is never stored together with second half.
    Type: Grant
    Filed: August 20, 2020
    Date of Patent: January 25, 2022
    Inventors: Anton Jakovlevich Liushits, Alexander Vladimirovich Vlasov
  • Patent number: 11228580
    Abstract: Implementations of the subject technology provide for performing, by a device, a request for obtaining information related to a phone authentication certificate (PAC) that was generated for the device, the PAC authenticating that a particular phone number is associated with the device, the request including packets of data. The subject technology receives the information related to the PAC, the information including an indication that the PAC was generated for the device. The subject technology sends, from the device, a request for validating the PAC to a remote server based at least in part on the information related to the PAC. Further, the subject technology receives a confirmation of validating the PAC from the remote server based at least in part on the information related to the PAC.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: January 18, 2022
    Assignee: Apple Inc.
    Inventors: Gokul P. Thirumalai, Daniel B. Pollack, Robert D. Butler, Ryan W. Baker, David G. Knipp, Sudhakar N. Mambakkam, Jonathon Sodos, Hannah S. Story, Hervé Sibert, Gianpaolo Fasoli
  • Patent number: 11223476
    Abstract: Security-enhancing devices, systems, methods, and non-transitory computer-readable media for performing non-interactive zero knowledge proof (NIZKP) authentication. In one embodiment, a computing device includes a memory and an electronic processor. The memory stores a NIZKP authentication program and a plurality of unique passwords. The electronic processor is configured to receive a first random value from an electronic source, generate a second random value by performing an exclusive disjunction operation on the first random value with a first password of the plurality of unique passwords, perform an extraction operation on the second random value, determine whether the extraction operation performed on the second random value extracted a non-random value from the second random value, and responsive to determining that the extraction operation performed on the second random value extracted the non-random value from the second random value, authenticate communications with the electronic source.
    Type: Grant
    Filed: August 19, 2020
    Date of Patent: January 11, 2022
    Assignee: MASTERCARD TECHNOLOGIES CANADA ULC
    Inventors: Simon Hardy-Francis, Cecil Lau, Jacky Cheung, Andrian Sevastyanov, Kate O'Loughlin
  • Patent number: 11218484
    Abstract: Case management systems and techniques are disclosed. In various embodiments, a hierarchical document permission model is received, the model describing a document hierarchy comprising a plurality of hierarchically related document nodes and defining for each of at least a subset of said document nodes one or more document roles and for each such role one or more document permissions with respect to that document node. The hierarchical document permission model is used to determine and enforce permissions with respect to case management instances to which the hierarchical document permission model applies.
    Type: Grant
    Filed: April 24, 2020
    Date of Patent: January 4, 2022
    Assignee: Open Text Corporation
    Inventors: Jeroen Van Rotterdam, Michael T. Mohen, Satyapal P. Reddy, Muthukumarappa Jayakumar