Patents Examined by Andrew J Steinle
  • Patent number: 10447468
    Abstract: A processor of an aspect includes a plurality of packed data registers, and a decode unit to decode an instruction. The instruction is to indicate one or more source packed data operands. The one or more source packed data operands are to have four 32-bit results of four prior SM4 cryptographic rounds, and four 32-bit values. The processor also includes an execution unit coupled with the decode unit and the plurality of the packed data registers. The execution unit, in response to the instruction, is to store four 32-bit results of four immediately subsequent and sequential SM4 cryptographic rounds in a destination storage location that is to be indicated by the instruction.
    Type: Grant
    Filed: September 29, 2018
    Date of Patent: October 15, 2019
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Vlad Krasnov
  • Patent number: 10445496
    Abstract: In one implementation, a system calculating a product risk profile includes a criticality score engine to calculate a criticality score via an aggregation of values assigned to a plurality of descriptions of a component of a product criticality. In addition, the system includes a vulnerability score engine to calculate a vulnerability score via an aggregation of a quantity of security risks found during a security assessment for the product. In addition, the system includes a product risk profile engine to calculate a product risk profile for the product via a multiplication of the criticality score and the vulnerability score.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: October 15, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Tomer Gershoni, Yaniv Toledano
  • Patent number: 10439994
    Abstract: The present disclosure relates to a 5th-Generation (5G) or pre-5G communication system to be provided to support a higher data rate than a 4th-Generation (4G) communication system like Long Term Evolution (LTE). The present invention provides a method for encrypting a multimedia content comprising: encrypting multimedia contents including a plurality of variants and a plurality of samples; and transmitting the encrypted multimedia contents, wherein the plurality of variants correspond to the samples included in the multimedia contents, respectively, and are configured with reference to a predetermined number of samples, and each of the plurality of variants is configured with reference to a combination of different samples.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: October 8, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Sung-Ryeul Rhyu, Eric Yip
  • Patent number: 10432730
    Abstract: An apparatus for inhibiting data on a bi-directional bus includes a first portion having a first analog port and a digital output. A second portion has a second analog port and a digital input, and the digital output is operably coupled to the first digital input. The digital output of the first portion is configured to produce a digital representation of an analog input signal presented to the first analog port. Likewise, the second analog port of the second portion is configured to produce an analog output representation of a digital signal presented to the digital input. The first and second portion cooperate to inhibit the propagation of data presented to the second analog port as an input.
    Type: Grant
    Filed: January 25, 2017
    Date of Patent: October 1, 2019
    Assignee: UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE AIR FORCE
    Inventor: David C Prentice
  • Patent number: 10430568
    Abstract: A method provides device access security via use of periodically changing Quick Response (QR) codes. The method includes: generating (706) a first authentication QR code and assigning (708) the generated QR code as the current authentication mechanism for accessing the device. Contemporaneously with the generation of the QR code, at least one QR code validity parameter is established (710) to define when access to the device can be provided to a second device that provides the correct authentication QR code along with the access request. The method includes, in response to a pre-defined trigger (712) of the QR code validity parameter: generating (704) a new authentication QR code, different from a previously generated authentication QR code; assigning (708) the new authentication QR code as the current authentication mechanism for accessing the device; and enabling access to the first device to only second devices that provide the current authentication QR code.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: October 1, 2019
    Assignee: GOOGLE LLC
    Inventors: Shyam Narayan, Naveen Aerrabotu, Rohit R. Sinha
  • Patent number: 10430602
    Abstract: A computer-implemented method, according to one embodiment, includes: receiving a data volume having data from multiple tenants therein; separating data in the data volume into objects using tenant identifiers from metadata corresponding to portions of the data, wherein each object corresponds to a respective tenant; and storing the objects in object storage. Other systems, methods, and computer program products are described in additional embodiments.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: October 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Joseph W. Dain, Joseph M. Swingler
  • Patent number: 10425430
    Abstract: A system for hierarchical scanning includes an interface and a processor. The interface is to receive an indication to scan using a payload; provide the payload to a set of addresses on a set of ports; and receive a set of responses. Each response is associated with an address and a port. The processor is to: for each response of the set of responses: determine whether a follow-up probe exists associated with the response; and in the event the follow-up probe exists associated with the response: execute the follow-up probe on the address and the port associated with the response; and store the set of data received in response to the follow-up probe in a database.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: September 24, 2019
    Assignee: Expanse, Inc.
    Inventors: Connor Leete Gilbert, Michael Haggblade
  • Patent number: 10425403
    Abstract: The present disclosure relates to a method and a device for accessing a smart camera. The method includes detecting access media for accessing the smart camera. The method also includes generating an access request corresponding to the access media when detecting that the access media is a local area network. The access request carries an access password. The method further includes sending the access request to the smart camera, such that the smart camera allows access after successfully verifying the access password in the access request.
    Type: Grant
    Filed: December 29, 2016
    Date of Patent: September 24, 2019
    Assignee: Beijing Xiaomi Mobile Software Co., Ltd.
    Inventors: Hong Chen, Ziguang Gao, Enxing Hou
  • Patent number: 10425222
    Abstract: A processor of an aspect includes a plurality of packed data registers, and a decode unit to decode an instruction. The instruction is to indicate one or more source packed data operands. The one or more source packed data operands are to have four 32-bit results of four prior SM4 cryptographic rounds, and four 32-bit values. The processor also includes an execution unit coupled with the decode unit and the plurality of the packed data registers. The execution unit, in response to the instruction, is to store four 32-bit results of four immediately subsequent and sequential SM4 cryptographic rounds in a destination storage location that is to be indicated by the instruction.
    Type: Grant
    Filed: September 29, 2018
    Date of Patent: September 24, 2019
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Vlad Krasnov
  • Patent number: 10419210
    Abstract: A processor of an aspect includes a plurality of packed data registers, and a decode unit to decode an instruction. The instruction is to indicate one or more source packed data operands. The one or more source packed data operands are to have four 32-bit results of four prior SM4 cryptographic rounds, and four 32-bit values. The processor also includes an execution unit coupled with the decode unit and the plurality of the packed data registers. The execution unit, in response to the instruction, is to store four 32-bit results of four immediately subsequent and sequential SM4 cryptographic rounds in a destination storage location that is to be indicated by the instruction.
    Type: Grant
    Filed: July 2, 2018
    Date of Patent: September 17, 2019
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Vlad Krasnov
  • Patent number: 10419429
    Abstract: An electronic device is provided. The electronic device includes a communication module, and a processor. The processor is configured to receive a first user context of a first user from a first user device and a second user context of a second user from a second user device via the communication module, to determine when the first user and the second user are within a specified distance, by using location information in the first and second user contexts, to set permissions to access at least a portion of the first and/or second user contexts based on the determination, to receive a request from the first user for information in the second user context, and to provide the information in the second user context to the first user when the permissions of the second user context allows the first user to access the information in the second user context.
    Type: Grant
    Filed: December 27, 2016
    Date of Patent: September 17, 2019
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jae Seok Joo, Chang Ryong Heo
  • Patent number: 10410018
    Abstract: A data integrity system generates a transaction signature associated with a transaction based on transaction data received from a data producer. The transaction signature is unique to the transaction and is generated by applying a hash function to the transaction data. When the transaction data is to be transmitted to a data consumer, the data integrity system redacts the transaction data based on permission information associated with the data consumer and transmits the redacted transaction data to the data consumer. To enable the data consumer to verify the integrity of the received data, the data integrity system also transmits a cryptographic assurance that includes at least the transaction signature associated with the transaction. The data consumer verifies the integrity of the received data by independently generating a transaction signature based on the redacted transaction data and matching the independently generated signature with the transaction signature in the cryptographic assurance.
    Type: Grant
    Filed: June 17, 2016
    Date of Patent: September 10, 2019
    Assignee: PeerNova, Inc.
    Inventors: Gangesh Kumar Ganesan, David John Hudson, Kevin Michael Gee
  • Patent number: 10412109
    Abstract: The method for detecting vulnerabilities in a virtual production server of a virtual or cloud computer system of one or more virtual servers includes analyzing vulnerabilities in the virtual production servers by connecting to the virtual or cloud computer system; requesting the cloning of the virtual production server in order to obtain a clone or a disk copy of the virtual production server, which is created in the virtual or cloud computer system; connecting to the clone or to the disk copy; analyzing the vulnerabilities of the clone or of the disk copy; erasing the clone or the disk copy; and generating a report analyzing the vulnerabilities of the clone or of the disk copy.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: September 10, 2019
    Assignee: OUTPOST 24 FRANCE
    Inventors: Sergio Loureiro, Frédéric Donnat
  • Patent number: 10404467
    Abstract: The present specification is directed toward the use of hash digests and blockchain technology to secure the integrity of a media file having Group-Of-Picture (GOP) video streams, audio streams, and data streams. For GOP video streams, the use of hash digests and blockchain technology may take the form of an H-Frame that appends a GOP of I, P, and B frames. For audio streams, the use of hash digests and blockchain technology may take the form of an AH-Frame that appends an audio block of information. For data streams, the use of hash digests and blockchain technology may take the form of a DH-Frame that appends a data block of information.
    Type: Grant
    Filed: February 2, 2019
    Date of Patent: September 3, 2019
    Inventor: Tyson York Winarski
  • Patent number: 10404452
    Abstract: Systems and processes are described for a message service with distributed key caching for server-side encryption. Message requests are received by message handlers of the message service that cache data encryption keys used to encrypt and decrypt messages that are stored to message containers in back end storage. A metadata service obtains the data encryption keys from a key management service, caches the keys locally, and sends the keys to the message handlers upon request, where the keys are cached, again. The key management service may generate the data encryption keys based on a master key (e.g., a client's master key). The message handlers may send both message data encrypted using the data encryption key and an encrypted copy of the data encryption key to be stored together in the data store.
    Type: Grant
    Filed: August 19, 2016
    Date of Patent: September 3, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Petr Shveykin, Kelvin Yiu, Jakub Wojciak
  • Patent number: 10404693
    Abstract: A method for establishing a secure communication channel between an off-card entity and an embedded Universal Integrated Circuit Card (eUICC) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each eUICC in a set of eUICCs managed by the off-card entity, possess long-term Public Key Infrastructure (PKI) information. When a secure communication channel is to be established between the off-card entity and an eUICC, the eUICC and the off-card entity can authenticate one another in accordance with the respectively-possessed PKI information (e.g., verifying public keys). After authentication, the off-card entity and the eUICC establish a shared session-based symmetric key for implementing the secure communication channel. Specifically, the shared session-based symmetric key is generated according to whether perfect or half forward security is desired.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: September 3, 2019
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Li Li, Jerrold Von Hauck
  • Patent number: 10397781
    Abstract: Provided are a method for personalizing a security element for a mobile end device for communicating via a mobile radio network as well as a corresponding system. The method comprises the following steps: supplying initialization data of an initialization entity to the security element, wherein the initialization data comprise a personalization token; supplying the personalization token from the security element to a personalization entity; checking the validity of the personalization token through the personalization entity; and after successfully checking the validity of the personalization token, supplying personalization data from the personalization entity to the security element, wherein authorization data for authenticating the security element in encrypted form are already part of the initialization data and the personalization data comprise a key for decrypting the authorization data.
    Type: Grant
    Filed: August 7, 2015
    Date of Patent: August 27, 2019
    Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventor: Ulrich Wimböck
  • Patent number: 10397257
    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: August 27, 2019
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Daniel Francis Holzhauer, Cody Joe Bushey, Lalit Keshav Mestha, Masoud Abbaszadeh, Justin Varkey John
  • Patent number: 10395060
    Abstract: Techniques for multiple message retrieval for secure electronic communication are described. The techniques, for instance, utilize a server and computing devices employing a private information retrieval scheme to allow a receiving device to locate multiple electronic communications on a server, request delivery of the multiple electronic communications without the server being aware of which electronic communication are requested, and receive the electronic communications without the server being aware of which electronic communications were sent. For example, the server may utilize an efficient electronic communication storage structure for storing and retrieving multiple electronic communications.
    Type: Grant
    Filed: October 17, 2016
    Date of Patent: August 27, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Srinath Tumkur Venkatacha Setty, Sebastian G. Angel
  • Patent number: 10387685
    Abstract: The present disclosure discloses a method and device for invoking a JAVA card object. The method comprises: receiving, by a JCRE, a service request message transmitted by an application Applet1; acquiring, by the JCRE, interaction information between the Applet1 and the Applet2 according to an ID of the Applet1 and an ID of the Applet2; acquiring, by the JCRE, a trust degree between the Applet1 and the Applet2 according to the interaction information between the Applet1 and the Applet2, information about one interaction comprising service class information for this interaction and information about whether a service request task of the Applet1 succeeds after this interaction; and determining, by the JCRE, that the Applet1 invokes a shared interface service of the Applet2, when the trust degree reaches a trust degree threshold.
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: August 20, 2019
    Assignee: CHINA UNITED NETWORK COMMUNICATIONS GROUP COMPANY LIMITED
    Inventors: Yafei Tang, Yunyong Zhang, Zhijun Wang, Ni Zhang, Di Liu, Xiaodi Wang