Patents Examined by Bassam A Noaman
-
Patent number: 12118070Abstract: An access management system that reduces possibility of unauthorized access, an authentication device, a management device, a portable terminal, and a mobile body configuring the access management system, a data structure for access management data used in the access management system, an access management program executed in the access management system, and a construction method for the access management system. A plurality of nodes connected by a P2P network share a blockchain. Authentication conditions are recorded in blocks of the blockchain by a management node, which is any one of the plurality of nodes. The authentication conditions include authentication information. The authentication conditions designate an authentication node, which is any one of the plurality of nodes, as a node that performs authentication. The passing body is authenticated by the authentication node.Type: GrantFiled: April 9, 2020Date of Patent: October 15, 2024Assignee: MITSUBISHI ELECTRIC CORPORATIONInventor: Manato Takai
-
Patent number: 12107950Abstract: The present disclosure relates to method of enabling key re-usage for an electronic device. The method comprising: receiving a request message from the electronic device, wherein the request message comprises a first information being indicative of a preference for one of a first key associated with a first network node in a first network or a second key associated with a second network node in a second network; processing the request message to determine the preference indicated in the first information; and transmitting a response message to the electronic device for reusing the first key or second key, the electronic device is configured to derive a third key based on the first key or the second key as indicated in the determined preference, and the second network is able to access to the first key and the second key whereas the first network cannot access the second key.Type: GrantFiled: December 19, 2019Date of Patent: October 1, 2024Assignee: NEC CORPORATIONInventors: Sander De Kievit, Sheeba Backia Mary Baskaran, Anand Raghawa Prasad
-
Patent number: 12105851Abstract: A system hash for each production system is generated. Each system hash includes a concatenation of a hardware hash and a software hash of each production system in the datacenter. A datacenter hash tree is created based on a combination of the system hashes. A test copy of the software hash of each of the production systems is created in respective test systems in the datacenter. In response to detecting a change in the datacenter hash tree, a modification in a system hash which resulted in the change is identified. The central copy of the software hash is compared with the test copy of the software hash. In response to a mismatch between the central copy and the test copy, occurrence of an unauthorized attack in a software of the production system is detected.Type: GrantFiled: September 27, 2021Date of Patent: October 1, 2024Assignee: Hewlett Packard Enterprise Development LPInventor: Debdipta Ghosh
-
Patent number: 12101397Abstract: A data communication method includes: processing to-be-transmitted target secret information by using a preset secret sharing algorithm to obtain a plurality of secret fragments; and distributing the plurality of secret fragments to each relay node in a first relay node layer among preset M relay node layers to transmit the plurality of secret fragments to a receiving device by means of each relay node in the M relay node layers, so that the receiving device can obtain the target secret information based on each received secret fragment under the condition that the number of the received secret fragments is greater than or equal to a preset security threshold. By applying the data communication method, in the case that the number of breached relay nodes does not exceed the preset security threshold, an attacker cannot obtain a sufficient number of secret fragments to crack the target secret information.Type: GrantFiled: April 21, 2022Date of Patent: September 24, 2024Assignee: BEIJING QBOSON QUANTUM TECHNOLOGY CO., LTD.Inventors: Kai Wen, Yin Ma
-
Patent number: 12095908Abstract: Disclosed herein are a key generation apparatus and method based on machine learning. The key generation method includes generating, by first and second key generation apparatuses, first and second commit values, and uploading the first commit value and the second commit value to an external repository, training, by the first and second key generation apparatuses, a neural network so as to match weight values with each other, sharing, by the first and second key generation apparatuses, the first and second commit values with each other, comparing shared first and second commit values with uploaded commit values, and then verifying the commit values, and when verification of the commit values has succeeded, generating, by the first and second key generation apparatuses, hash values using the matched weight value, verifying whether the hash values are identical to each other, and generating a session secret key based on a result of verification.Type: GrantFiled: November 4, 2021Date of Patent: September 17, 2024Assignee: Electronics and Telecommunications Research InstituteInventors: Nam-Su Jho, Ju-Young Kim, Ku-Young Chang
-
Patent number: 12086296Abstract: A device to secure data storage may include circuitry that switches a communication circuit to a memory from a derived secret generator based on an access command.Type: GrantFiled: April 19, 2021Date of Patent: September 10, 2024Assignee: Micron Technology, Inc.Inventor: Lance W. Dover
-
Patent number: 12086229Abstract: A system and method for PIN authentication issuance from a MFP QR Code includes a QR code presented on an authentication screen of multifunction peripheral display. A user requiring a personal information number to access a multifunction peripheral printing system managed by a print server scans the QR code with their secure smartphone or tablet. The scanned QR code opens a web portal to the sever on the user's device where they can select a new PIN. The new PIN is stored on the server for the user' account and access to the MFP is then granted when the user enters their new PIN.Type: GrantFiled: February 21, 2022Date of Patent: September 10, 2024Assignee: TOSHIBA TEC KABUSHIKI KAISHAInventor: Marianne Kodimer
-
Patent number: 12088587Abstract: A method comprises receiving a command inputted to a first device, analyzing the command and identifying a second device based at least in part on the analysis. In the method, the second device is authenticated and a connection is established between the first device and the second device over one or more networks. The command is for execution of a task on the second device.Type: GrantFiled: August 19, 2021Date of Patent: September 10, 2024Assignee: Dell Products L.P.Inventors: Dhilip S. Kumar, Vidhyanshu Jain, Sasikanta Sahoo
-
Patent number: 12079337Abstract: In the embodiments described herein, a malicious code detection module identifies potentially malicious instructions in memory of a computing device. The malicious code detection module examines the call stack for each thread running within the operating system of the computing device. Within each call stack, the malicious code detection module identifies the originating module for each stack frame and determines whether the originating module is backed by an image on disk. If an originating module is not backed by an image on disk, the thread containing that originating module is flagged as potentially malicious, execution of the thread optionally is suspended, and an alert is generated for the user or administrator.Type: GrantFiled: July 12, 2021Date of Patent: September 3, 2024Assignee: Endgame, Inc.Inventor: Joseph W. Desimone
-
Patent number: 12081560Abstract: Embodiments of this application provide a method and apparatus for preventing advertisement-related fraud, an electronic device, and a storage medium. The method may include obtaining behavior source information of a current advertisement response behavior, the behavior source information being information used for indicating a generation source of the current advertisement response behavior. The method can further include determining whether the behavior source information of the current advertisement response behavior is fraudulent behavior source information based on a similarity between the behavior source information of the current advertisement response behavior and known fraudulent behavior source information, and determining that the current advertisement response behavior is an advertisement-related fraudulent behavior when that the behavior source information of the current advertisement response behavior is the fraudulent behavior source information.Type: GrantFiled: March 26, 2021Date of Patent: September 3, 2024Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Quan Cheng
-
Patent number: 12074990Abstract: Provided is a database multi-authentication method and system, a terminal, and a storage medium. The method comprises: initializing a hardware authentication certificate carrier by means of a programming interface, and storing a public key of the hardware authentication certificate carrier and a user certificate public name; taking the user certificate public name as a database user name, and generating a standard message digest value; receiving an authentication request sent from a client, and returning an initial random number to the client; receiving a signature random number sent from the client, and using the public key to decrypt the signature random number to obtain a random number; in response to determining that the random number is consistent with the initial random number, acquiring an message digest value, and in response to determining that the message digest value is consistent with the standard message digest value, determining that the client passes the authentication.Type: GrantFiled: September 30, 2021Date of Patent: August 27, 2024Assignee: INSPUR SUZHOU INTELLIGENT TECHNOLOGY CO., LTD.Inventor: Biaoqiang Wu
-
Patent number: 12073927Abstract: Disclosed are methods and systems for a computing environment that allows an operator to maximize or increase compliance with one or more data and privacy standards. In one embodiment, compliant and non-compliant sources are identified and exchange of data between those sources are blocked, partially allowed or allowed with regulation-compliant encryption of data.Type: GrantFiled: September 27, 2018Date of Patent: August 27, 2024Assignee: Shadowbox, Inc.Inventors: Gregory Stein, Jack Samatov
-
Patent number: 12069170Abstract: A multi-party privacy computing method and device based on semi-trusted hardware, wherein the method applied to semi-trusted hardware comprises the following steps: acquiring random number masks and random seeds of all user terminals; generating a garbled circuit seed according to the random seeds; generating a garbled circuit according to a predetermined circuit description and the garbled circuit seed, wherein the garbled circuit comprises garbled tables, wire labels and decoding information; sending the wire labels corresponding to the inputs of all user terminals to a user terminal corresponding to the semi-trusted hardware by using an oblivious transfer protocol; and sending the garbled table and the decoding information to the user terminal corresponding to the semi-trusted hardware, so that the user terminal can compute an output value according to the garbled tables, the decoding information and the wire label corresponding to the inputs of all user terminals.Type: GrantFiled: December 15, 2023Date of Patent: August 20, 2024Assignees: ZHEJIANG UNIVERSITY, JIAXING RESEARCH INSTITUTE, ZHEJIANG UNIVERSITYInventors: Bingsheng Zhang, Yibiao Lu, Weiran Liu, Kui Ren
-
Patent number: 12069161Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.Type: GrantFiled: July 7, 2020Date of Patent: August 20, 2024Assignee: GOOGLE LLCInventors: Craig Wright, Benjamin R. Kreuter, James Robert Koehler, Arthur Asuncion, Evgeny Skvortsov, Laura Grace Book, Sheng Ma, Jiayu Peng, Xichen Huang
-
Patent number: 12063203Abstract: A method including receiving, by a first server from a second server, an encrypted authentication packet to enable the first server and the second server to conduct an authentication process, the encrypted authentication packet including a crypted code field indicating that a portion of the encrypted authentication packet is encrypted and a crypted payload including an encrypted initial authentication packet; and transmitting, by the first server to the second server, a response based at least in part on determining that the portion of the encrypted authentication packet is encrypted and on decrypting the encrypted initial authentication packet. Various other aspects are contemplated.Type: GrantFiled: November 28, 2021Date of Patent: August 13, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, And{umlaut over (z)}ej Val{hacek over (c)}ik, Ramũnas Keliuotis
-
Patent number: 12052346Abstract: A secret is sliced into a number of encrypted slices. The encrypted slices can be distributed amongst members of a group. The encrypted slices make recovery of the secret possible, but a group authority key is required for decryption. Thus, a number of slices are necessary, but still not sufficient, to recover the secret.Type: GrantFiled: July 2, 2020Date of Patent: July 30, 2024Assignee: International Business Machines CorporationInventor: Steven Robert Hetzler
-
Patent number: 12047529Abstract: A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.Type: GrantFiled: August 24, 2020Date of Patent: July 23, 2024Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Chew Yee Kee, Guo Dong Gan, Mun Yew Tham
-
Patent number: 12034867Abstract: An example operation may include one or more of storing blockchain blocks committed to a blockchain based on a protocol executed by a current consensus committee of a blockchain network, receiving random values from the blockchain blocks which are created by nodes of the current consensus committee, randomly determining nodes of a next consensus committee of the blockchain network with respect to the current consensus committee based on the random values created by the nodes of the current consensus committee, and storing a new block to the blockchain based on a protocol based executed by the nodes of the next consensus committee.Type: GrantFiled: August 11, 2021Date of Patent: July 9, 2024Assignee: International Business Machines CorporationInventors: Yacov Manevich, Artem Barger, Hagar Meir
-
Patent number: 12034840Abstract: A method of sharing a first common secret among a plurality of nodes for enabling secure communication for blockchain transactions. The method comprises determining, for at least one first node a plurality of second common secrets, wherein each second common secret is common to the first node and a respective second node, is determined at the first node based on a first private key of the first node and a first public key of the second node and is determined at the second node based on the first private key of the second node and the first public key of the first node. The method further comprises exchanging encrypted shares of the first common secret among the plurality of nodes to enable each of the plurality of nodes to reach a threshold number of shares of the first common secret to access the first common secret.Type: GrantFiled: February 6, 2023Date of Patent: July 9, 2024Assignee: nChain Licensing AGInventor: Craig Steven Wright
-
Patent number: 12034832Abstract: A computer-implemented method for generating a trusted setup on a computing device. The method may include generating a unique single user profile (USUP) based on data derived from the computing device, generating a first binary matrix, executing a matrix mixing operation on the first binary matrix based on the USUP, executing the matrix mixing operation may generate a second binary matrix, generating trust anchor data, wherein the generating the trust anchor data may include selecting a first number and inputting the first number into a remainder generator, the remainder generator may be configured to select a second number, calculate a remainder, wherein the remainder is the remainder of the first number divided by the second number, and output a value pair that includes the second number and the remainder, wherein the trust anchor data is used for encrypting and decrypting data.Type: GrantFiled: May 22, 2023Date of Patent: July 9, 2024Assignee: ATOFIA LLCInventors: Thurman Richard White, Martin Thomas Poe, III, Martin Thomas Poe, IV