Patents Examined by Abiy Getachew
  • Patent number: 11005651
    Abstract: A method, terminal and device for establishing security infrastructure, comprising: an intermediate service organization receives an organization secret key sent by a third-party service organization; the intermediate service organization encrypts the organization secret key by a first encryption means and sends the encrypted organization secret key to a security storage region of a terminal; the intermediate service organization receives a first terminal public key encrypted by the terminal using a second encryption means; and the intermediate service organization sends the first terminal public key obtained by decryption to the third-party service organization.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: May 11, 2021
    Assignee: CHINA UNIONPAY CO., LTD.
    Inventors: Feng Tian, Yisheng Fu, Naigeng Ji
  • Patent number: 11003759
    Abstract: A method for authenticating control boards in an appliance includes reading a serial number from a memory of a first control board positioned within the appliance, reading a serial number from a memory of a second control board positioned within the appliance and in communication with the first control board, comparing the serial number from the memory of the first control board to the serial number from the memory of the second control board, and authenticating the first and second control boards when the serial number from the memory of the first control board matches the serial number from the memory of the second control board.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: May 11, 2021
    Assignee: Haier US Appliance Solutions, Inc.
    Inventors: Joseph Mark Brian, Richard Dean Suel, II
  • Patent number: 10990916
    Abstract: A multiplier is utilized to quantify a cybersecurity risk level of a portfolio of entities (e.g., companies) and enable actions to mitigate that quantified risk. In doing so, features or attributes of one or more companies in a portfolio are compared to features or attributes of one or more companies that experienced an adverse cybersecurity event (e.g. a data breach). Further, a degree of dependency, such as a matrix of a number of shared vendors and the proximity of those vendors to the companies, can be measured between (1) portfolio companies and one or more companies that experienced a cybersecurity event, and/or (2) the portfolio companies themselves to better quantify the risk. That is, to more meaningfully analyze a cybersecurity event that occurred at one or more companies and better predict the likelihood of an occurrence at portfolio companies, embodiments can determine an n-degree interdependency between companies.
    Type: Grant
    Filed: June 1, 2020
    Date of Patent: April 27, 2021
    Assignee: SecurityScorecard, Inc.
    Inventors: Jue Mo, Luis Vargas, A. Robert Sohval
  • Patent number: 10979508
    Abstract: Metadata associated with IoT devices is stored. The metadata may include categories associated with the IoT devices. At least a first category may be hierarchical such that the first category includes at least two hierarchical levels, with each hierarchical level including at least two categories, and such that each category in a hierarchical level that is below another hierarchical level is a subset of one of the categories in the hierarchical levels above that hierarchical level. User information associated with users is stored. A request associated with one of the users and further associated with access to at least one of the IoT devices is received. Responsive to the request, the access is selectively granted to the at least one of the IoT devices based upon the stored user information and the stored metadata.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: April 13, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Arjmand Samuel, Juan Perez
  • Patent number: 10972292
    Abstract: Disclosed is an input/output circuit for a physical unclonable function generator circuit. In one embodiment, a physical unclonable function (PUF) generator includes: a PUF cell array comprising a plurality of bit cells configured in a plurality of columns and at least one row, and at least one input/output (I/O) circuit each coupled to at least two neighboring columns of the PUF cell array, wherein the at least one I/O circuit each comprises a sense amplifier (SA) with no cross-coupled pair of transistors, wherein the SA comprises two cross-coupled inverters with no access transistor and a SA enable transistor, and wherein the at least one I/O circuit each is configured to access and determine logical states of at least two bit cells in the at least two neighboring columns; and based on the determined logical states of the plurality of bit cells, to generate a PUF signature.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: April 6, 2021
    Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.
    Inventors: Jui-Che Tsai, Shih-Lien Linus Lu, Cheng Hung Lee, Chia-En Huang
  • Patent number: 10972457
    Abstract: Disclosed are systems and methods for mapping a virtual shopper to a physical shopper. The systems and methods may include receiving, at a backend system, unidentified customer data including information about an unidentified customer. Customer identity data including identifying information about the customer may be received from the customer. An authentication token may be generated that links the unidentified customer data to the customer identity data.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: April 6, 2021
    Assignee: NCR Corporation
    Inventors: Brent Vance Zucker, Robert Alexander Borowicz, Adam Justin Lieberman, Pavel {hacek over (S)}avara
  • Patent number: 10958446
    Abstract: System and techniques for secure wireless association are described herein. A station (STA) may transmit a probe request for the wireless network that includes identification of a certificate. An access point (AP) receiving the probe request may obtain the identified certificate and use the certificate to encrypt a key. The encrypted key may then be included in a beacon by the AP. The STA may then obtain the encrypted key from the beacon, decrypt the key with the certificate, and then use the key to associate to the wireless network via the AP.
    Type: Grant
    Filed: January 11, 2018
    Date of Patent: March 23, 2021
    Assignee: Intel Corporation
    Inventors: Ashish Singhi, Royce Fernald, Farid Adrangi, Abhijeet Kolekar
  • Patent number: 10949525
    Abstract: Aspects described herein may allow for the application of generating captcha images using relations among objects. The objects in ground-truth images may be clustered based on the probabilities of co-occurrence. Further aspects described herein may provide for generating a first captcha image comprising a first object and a second object, and generating a second captcha image based on the first captcha image by replacing the first object with the third object. Finally, the first and second captcha images may be presented as security challenges and user access requests may be granted or denied based on responses to the security challenges.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: March 16, 2021
    Assignee: Capital One Services, LLC
    Inventors: Anh Truong, Vincent Pham, Galen Rafferty, Jeremy Goodsitt, Mark Watson, Austin Walters
  • Patent number: 10943004
    Abstract: In some embodiments, securing device commands includes a first electronic device receiving a command authorization request message from a second electronic device, including a device command to be performed by the second electronic device, a command argument, and a first message authentication code (MAC) generated by applying a hash function to the device command, the command argument and a first counter value. The first electronic device generates a second MAC by applying the hash function to the device command, the command argument and a second counter value synchronized with the first counter value. The first electronic device compares the first MAC and the second MAC to authenticate the device command and transmit a command approval message or a command denial message. The command approval message causes the second electronic device to perform the device command and the command denial message causes the second electronic device to reject the device command.
    Type: Grant
    Filed: June 12, 2020
    Date of Patent: March 9, 2021
    Assignee: Capital One Services, LLC
    Inventors: David Kelly Wurmfeld, Kevin Osborn
  • Patent number: 10938795
    Abstract: Systems and methods for reducing cyber security incidents in video surveillance and security systems with intelligent password management are provided. Some methods can include assessing a vulnerability of a current password for each of a plurality of cameras, responsive to detecting that the current password for at least one of the plurality of cameras is vulnerable, automatically generating an updated password for the at least one of the plurality of cameras, and assigning the updated password to the at least one of the plurality of cameras.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: March 2, 2021
    Inventors: Avijit Saha, Manu Thomas, Jitendra Sitaram Chaurasia, Deepak Sundar Meganathan
  • Patent number: 10922429
    Abstract: A data access method in a cloud computing environment is disclosed. The method may comprise, in a service object space of the cloud computing environment, receiving a request of a user for accessing a data package, the request including a user identification, determining a service object space of the data package corresponding to the request, and providing the data package to the user according to the service object space of the data package and the user identification.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: February 16, 2021
    Inventors: Panfeng Yuan, Dong Guo, Wei Zhang, Zihua Pan, Tingliang Chen
  • Patent number: 10911222
    Abstract: A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements ai, bi, ei, and fi for a current round (i) of a secure hash algorithm 2 (SHA2) hash algorithm. The instruction indicates a second source of a second packed data. The first packed data has a width in bits that is less than a combined width in bits of eight state data elements ai, bi, ci, di, ei, fi, gi, hi of the SHA2 hash algorithm. The method also includes storing a result in a destination indicated by the instruction in response to the instruction. The result includes updated state data elements ai+, bi+, ei+, and fi+ that have been updated from the corresponding state data elements ai, bi, ei, and fi by at least one round of the SHA2 hash algorithm.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: February 2, 2021
    Assignee: Intel Corporation
    Inventors: Gilbert M. Wolrich, Kirk S. Yap, Vinodh Gopal, James D. Guilford
  • Patent number: 10904222
    Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes a secure zone for executing tasks. An apparatus according to the present disclosure may comprise a screen, a secure zone and an indicator operatively controlled by the secure zone. The secure zone may be configured to execute a task and to assume control over an output to the screen while the apparatus is operating in a secure mode and to transfer control over the output to the screen to a non-secure zone while the apparatus is operating in a non-secure mode.
    Type: Grant
    Filed: November 15, 2019
    Date of Patent: January 26, 2021
    Assignee: OLogN Technologies AG
    Inventor: Sergey Ignatchenko
  • Patent number: 10893055
    Abstract: A system includes a communication module that receives a request to post content to an event gallery associated with an event. The request in turn includes geo-location data for a device sending the content, and identification data identifying the device or a user of the device. The system further has an event gallery module to perform a first authorization operation that includes determining that the geo-location data corresponds to a geo-location fence associated with an event. The event gallery module also performs a second authorization operation that includes using the identification data to verify an attribute of the user. Finally, based on the first and second authorization operations, the event gallery module may selectively authorize the device to post the content to the event gallery.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: January 12, 2021
    Assignee: Snap Inc.
    Inventors: Nicholas Richard Allen, Sheldon Chang
  • Patent number: 10887112
    Abstract: This specification describes techniques for performing blockchain consensus. An example method performed by a first node in a blockchain includes: receiving first service data; determining a corresponding handling time of the first service data; storing the first service data including the corresponding handling time at a cache, in which the cache stores multiple pieces of additional service data, and in which each piece of additional service data is associated with a respective handling time; determining whether a consensus needs to be performed on at least two pieces of service data; in response to determining that the consensus needs to be performed, selecting the at least two pieces of service data according to a sequence that is based on handling times associated with the at least two pieces of service data; and performing the consensus on the more than one pieces of service data according to the sequence.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: January 5, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Hao Wu
  • Patent number: 10868803
    Abstract: A method is disclosed, comprising: configuring, based on hardware characteristics of a radio access device, a first security certificate; setting up a first encrypted tunnel with a first security server using the first security certificate, the first security server configured to grant permission via the first security certificate for obtaining a second security certificate providing access to an operator core network; tearing down the first encrypted tunnel; and setting up a second encrypted tunnel to a second security server within the operator core network using the second security certificate, the second encrypted tunnel configured to allow the radio access device to securely communicate with the operator core network for providing connectivity for user devices to the operator core network, wherein the first encrypted tunnel and the second encrypted tunnel to use a single transport port to obtain the second security certificate via the first encrypted tunnel.
    Type: Grant
    Filed: January 16, 2018
    Date of Patent: December 15, 2020
    Assignee: Parallel Wireless, Inc.
    Inventors: Robert Getschmann, Ketan Supanekar, David Ruffen
  • Patent number: 10856020
    Abstract: Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level index file identifying a plurality of alternative streams of protected content, where each of the alternative streams of protected content are encrypted using common cryptographic information; obtain the common cryptographic information; request portions of content from at least the plurality of alternative streams of protected content; access the protected content using the common cryptographic information; and playback the content.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: December 1, 2020
    Assignee: DIVX, LLC
    Inventors: Michael George Kiefer, Eric William Grab, Jason Braness
  • Patent number: 10853504
    Abstract: In an embodiment, a system is provided in which the private key is managed in hardware and is not visible to software. The system may provide hardware support for public key generation, digital signature generation, encryption/decryption, and large random prime number generation without revealing the private key to software. The private key may thus be more secure than software-based versions. In an embodiment, the private key and the hardware that has access to the private key may be integrated onto the same semiconductor substrate as an integrated circuit (e.g. a system on a chip (SOC)). The private key may not be available outside of the integrated circuit, and thus a nefarious third party faces high hurdles in attempting to obtain the private key.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: December 1, 2020
    Assignee: Apple Inc.
    Inventors: Timothy R. Paaske, Mitchell D. Adler, Conrad Sauerwald, Fabrice L. Gautier, Shu-Yi Yu
  • Patent number: 10812522
    Abstract: The invention utilizes a two-component system to detect third party security threats and drive internal system processes based on the detection. The first component of the system is a threat level engine, which collects external and internal system data on a real-time basis to determine changes in conditions that may give rise to a security threat. Based on the external and internal data, the level engine may calculate a threat assessment level to determine the level of the threat. The second component of the system is a third party analytics engine, which may comprise a machine learning component which is configured to detect threat patterns and anomalies, which may in turn be used to trigger events or to drive internal system processes.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: October 20, 2020
    Inventors: David Michael Steele, Nelson John Chevis, Sr., Jason Dean Vaughn
  • Patent number: 10805288
    Abstract: One or more computing devices, systems, and/or methods for user authentication by an authentication entity are provided. For example, an authentication relationship is established between a remote device and an authentication entity. The remote device may provide a service for which a user has registered an account, such as an email account, a social network account, etc. A request is received from the remote device to authenticate the user. The authentication entity facilitates a biometric authentication challenge through a user device. Results of the biometric authentication challenge are determined and used to transmit a message of successful authentication or failed authentication over a network to the remote device.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: October 13, 2020
    Assignee: Oath Inc.
    Inventors: Mohit Goenka, Nikita Varma, Ashish Khushal Dharamshi