Abstract: A method for authorizing online sharing of content including a digital photograph or video, includes receiving, at an electronic device, the content, identifying an image of a person in the content, identifying authorization conditions associated with the person, identifying an image of an object or audio in the content, based on both the image of the person identified and the image of the object or audio identified, determining if the authorization conditions associated with the person are met, and in response to determining that the authorization conditions are met, providing online access to the digital photograph or video.
Abstract: Embodiments of the present disclosure are directed to methods and systems for providing secure over-the-air firmware updates to one or more vehicles. More specifically, the present disclosure describes applying to firmware images distributed to one or more vehicles encryption that is unique to each update version. The encryption is also unique to each vehicle receiving the update. Embodiments of the present disclosure can also include determining and verifying the integrity of an available OTA firmware update prior to authorizing installation of the firmware update in a vehicle.
Type:
Grant
Filed:
December 20, 2017
Date of Patent:
December 22, 2020
Assignee:
NIO USA, Inc.
Inventors:
Qiyan Wang, Abraham T. Chen, Veysel Özer
Abstract: Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.
Type:
Grant
Filed:
December 20, 2017
Date of Patent:
December 15, 2020
Assignee:
Sophos Limited
Inventors:
Andrew J. Thomas, David James Mitchell, Paul Stuart Murray
Abstract: Systems and methods for establishing a protected, multi-hop, extensible channel of wireless communication using IoT devices are disclosed. A plurality of IoT devices may relay, via hardware and/or software embedded in each device, wireless messages from one device to another. The IoT devices may form a chain, each IoT device within wireless communication range of at least one other IoT device. The chain may be extended by adding IoT devices to the chain. A message may hop from one IoT device in the chain to the next, and may ultimately be transmitted across the full span of the chain. Hardware and/or software in each IoT device may emit an electromagnetic masking signal at each hop. The masking signal may introduce electromagnetic noise into the environment and protect the message from interception.
Abstract: In view of the foregoing, an embodiment herein provides a method of generating and managing a key package using a key manufacturing server. The key manufacturing server performs the steps of: (i) obtaining a key package from a development signing server; (ii) generating at least one production key that is specific to a device in the key package; (iii) communicating the key package with the at least one production key to a key manager associated with the device using a communication link; and (iv) obtaining the key package with at least one device key that is generated by the key manager.
Type:
Grant
Filed:
March 24, 2018
Date of Patent:
October 27, 2020
Inventors:
Rajesh Kanungo, Rampura Venkatachar Raman, Benjamin R. Loomis
Abstract: Systems, apparatuses and methods may provide technology for securing untrusted code using memory protection keys and control flow integrity, by applying a memory protection key to one or more memory regions, enforcing control flow integrity with respect to the one or more memory regions, and executing untrusted code in an isolated region of the one or more memory regions.
Abstract: A processing module for a first lock device of a range determination system, the range determination system comprising a lock group comprising a plurality of lock devices of which the first lock device forms part, the plurality of lock devices physically spaced over a lockable element and configured to communicate with a key group comprising a plurality of key devices, a shortest distance between any one of the key devices of the key group and any one of the lock devices of the lock group providing for access to the lockable element relative to a threshold distance.
Type:
Grant
Filed:
February 19, 2018
Date of Patent:
October 13, 2020
Assignee:
NXP B.V.
Inventors:
Jan Dutz, Wolfgang Küchler, Frank Leong, Thomas Baier, Arie Geert Cornelis Koppelaar
Abstract: A routing system for use in an IoT apparatus is proposed to include a router device. A control module of the router device determines whether to execute a routing process relating to an input message based on environment information, status information and a conflict management mechanism that relate to the router device. In the routing process, the control module executes channel operations when the input message includes a channel management instruction, and executes, when the input message relates to authentication or an application program, a relevant verification procedure or the application program.
Abstract: A method for performing a secure evaluation of a decision tree, including: receiving, by a processor of a server, an encrypted feature vector x=(x1, . . . , xn) from a client; choosing a random mask ?0; calculating m0 and sending m0 to the client, wherein m0=xi0(0)?t0(0)+?0 and t0(0) is a threshold value in the first node in the first level of a decision tree ?; performing a comparison protocol on m0 and ?0, wherein the server produces a comparison bit b0 and the client produces a comparison bit b?0; choosing a random bit s0?{0,1} and when s0=1 switching a left and right subtrees of ?; sending b0?s0 to the client; and for each level =1, 2, . . . , d?1 of the decision tree ?, where d is the number of levels in the decision tree ?, perform the following steps: receiving from the client yk where k=0, 1, . . .