Patents Examined by Bassam A Noaman
-
Patent number: 12063203Abstract: A method including receiving, by a first server from a second server, an encrypted authentication packet to enable the first server and the second server to conduct an authentication process, the encrypted authentication packet including a crypted code field indicating that a portion of the encrypted authentication packet is encrypted and a crypted payload including an encrypted initial authentication packet; and transmitting, by the first server to the second server, a response based at least in part on determining that the portion of the encrypted authentication packet is encrypted and on decrypting the encrypted initial authentication packet. Various other aspects are contemplated.Type: GrantFiled: November 28, 2021Date of Patent: August 13, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, And{umlaut over (z)}ej Val{hacek over (c)}ik, Ramũnas Keliuotis
-
Patent number: 12052346Abstract: A secret is sliced into a number of encrypted slices. The encrypted slices can be distributed amongst members of a group. The encrypted slices make recovery of the secret possible, but a group authority key is required for decryption. Thus, a number of slices are necessary, but still not sufficient, to recover the secret.Type: GrantFiled: July 2, 2020Date of Patent: July 30, 2024Assignee: International Business Machines CorporationInventor: Steven Robert Hetzler
-
Patent number: 12047529Abstract: A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.Type: GrantFiled: August 24, 2020Date of Patent: July 23, 2024Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Chew Yee Kee, Guo Dong Gan, Mun Yew Tham
-
Patent number: 12034832Abstract: A computer-implemented method for generating a trusted setup on a computing device. The method may include generating a unique single user profile (USUP) based on data derived from the computing device, generating a first binary matrix, executing a matrix mixing operation on the first binary matrix based on the USUP, executing the matrix mixing operation may generate a second binary matrix, generating trust anchor data, wherein the generating the trust anchor data may include selecting a first number and inputting the first number into a remainder generator, the remainder generator may be configured to select a second number, calculate a remainder, wherein the remainder is the remainder of the first number divided by the second number, and output a value pair that includes the second number and the remainder, wherein the trust anchor data is used for encrypting and decrypting data.Type: GrantFiled: May 22, 2023Date of Patent: July 9, 2024Assignee: ATOFIA LLCInventors: Thurman Richard White, Martin Thomas Poe, III, Martin Thomas Poe, IV
-
Patent number: 12034840Abstract: A method of sharing a first common secret among a plurality of nodes for enabling secure communication for blockchain transactions. The method comprises determining, for at least one first node a plurality of second common secrets, wherein each second common secret is common to the first node and a respective second node, is determined at the first node based on a first private key of the first node and a first public key of the second node and is determined at the second node based on the first private key of the second node and the first public key of the first node. The method further comprises exchanging encrypted shares of the first common secret among the plurality of nodes to enable each of the plurality of nodes to reach a threshold number of shares of the first common secret to access the first common secret.Type: GrantFiled: February 6, 2023Date of Patent: July 9, 2024Assignee: nChain Licensing AGInventor: Craig Steven Wright
-
Patent number: 12034867Abstract: An example operation may include one or more of storing blockchain blocks committed to a blockchain based on a protocol executed by a current consensus committee of a blockchain network, receiving random values from the blockchain blocks which are created by nodes of the current consensus committee, randomly determining nodes of a next consensus committee of the blockchain network with respect to the current consensus committee based on the random values created by the nodes of the current consensus committee, and storing a new block to the blockchain based on a protocol based executed by the nodes of the next consensus committee.Type: GrantFiled: August 11, 2021Date of Patent: July 9, 2024Assignee: International Business Machines CorporationInventors: Yacov Manevich, Artem Barger, Hagar Meir
-
Patent number: 12022012Abstract: System for vehicle encrypted communication for vehicle-road-cloud collaboration is provided. The system includes a vehicle-side communication unit disposed on a vehicle and a second quantum random number generator disposed on a visitor. The vehicle-side communication unit includes a first quantum random number generator, a quantum key management module, an on-vehicle communication module, a user authorization module, a certificate management module, and a quantum encryption and decryption module.Type: GrantFiled: December 10, 2023Date of Patent: June 25, 2024Assignee: HEFEI UNIVERSITY OF TECHNOLOGYInventors: Qin Shi, Junjie Zhu, Teng Cheng
-
Patent number: 12021838Abstract: A method including determining, by a first server, an encrypted authentication packet, the determining including, determining a crypted code field to indicate a type associated with the encryption authentication packet and that at least a portion of the encryption authentication packet is encrypted, and determining a crypted payload based at least in part on encrypting an initial authentication packet. The method may also include transmitting, by the first server to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.Type: GrantFiled: November 28, 2021Date of Patent: June 25, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, And{hacek over (z)}ej Val{hacek over (c)}ik, Ramünas Keliuotis
-
Patent number: 12003487Abstract: A method including configuring a first server to determine an encrypted authentication packet, the configuring including, configuring the first server to determine a crypted code field to indicate a type associated with the encryption authentication packet and that at least a portion of the encryption authentication packet is encrypted, and configuring the first server to determine a crypted payload based at least in part on encrypting an initial authentication packet. The method may also include configuring the first server to transmit, to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.Type: GrantFiled: November 28, 2021Date of Patent: June 4, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, And{hacek over (z)}ej Val{hacek over (c)}ik, Ramūnas Keliuotis
-
Patent number: 12001565Abstract: Providing an automatic mechanism of invalidating false-positive indications of certain identified portions of source code to reduce the number of errors in a security report. Certain embodiments of the present invention utilize static security scanning as a mechanism for automatically determining which portions of the identified source code contain potential vulnerabilities, and whether these identified portions of the source code are correctly or incorrectly identified with a false-positive indication.Type: GrantFiled: April 14, 2021Date of Patent: June 4, 2024Assignee: International Business Machines CorporationInventors: Marcin Filip, Michal Bodziony, Marcin Luczynski, Tomasz Zatorski, Wojciech Mis, Bartosz Tomasik
-
Patent number: 11997635Abstract: Methods and apparatus that registers a plurality of mesh node devices to operate as part of a wireless mesh network after a user device scans encoded information that is unique to each mesh node of a plurality of different mesh nodes. After codes associated with different respective mesh nodes are scanned by a user device, that user device may communicate with these different mesh nodes via a low power communication interface and the user device may send registration information to a registration computer via a secure communication channel. Apparatus may also receive a validation code from the registration computer via a communication channel that is different from the secure communication channel and these apparatus may then send the validation code to the registration computer via the secure communication channel when the user device is validated by the registration computer.Type: GrantFiled: May 26, 2020Date of Patent: May 28, 2024Assignee: SonicWALL Inc.Inventors: Zhuangzhi Duo, Atul Dhablania
-
Patent number: 11971982Abstract: A log analysis device is provided. The log analysis device receives a log indicating status of an electronic control system mounted in a movable object from the electronic control system, analyzes an abnormality in the electronic control system by using the log received. Depending on a result of the analyzing, the log analysis device determines, on a log-by-log basis, priority for the electronic control system to transmit the log to the log analysis device. Based on the priority determined, the log analysis device generates instruction information that gives an instruction for controlling transmission of the log, and transmits the instruction information to the electronic control system.Type: GrantFiled: July 9, 2021Date of Patent: April 30, 2024Assignee: DENSO CORPORATIONInventors: Keigo Nagara, Taiji Abe
-
Patent number: 11973876Abstract: A system and method for capturing value preference based data from a requestor of one or more digital content presentations during an access sequence and transforming the captured data into a useful tool enabling the content provider to modify the user experience prior to or subsequent to granting access to the requested content resulting in a more efficient and tailored interaction between the requestor and the content provider.Type: GrantFiled: June 12, 2023Date of Patent: April 30, 2024Assignee: CODEBREAKER IP RESERVES, LLCInventors: Cherianne Tree, Omar F. Sayed, Arthur L. McCracken
-
Patent number: 11956274Abstract: A system and method are provided for implementing a secure configuration of a networked system for secure communications, the networked system including at least one instrument for performing corresponding tasks and at least one controller for controlling functions of the at least one instrument. The method includes providing a secure instrument configuration (SIC); displaying status provided by the SIC server identifying the controller and the instruments to a user via a user interface; writing controller secure configuration information from the SIC server to the controller through a software agent on the controller, the controller secure configuration information including authentication data for the instruments, and/or credentials of the one controller acceptable by the one instruments for identifying the controller; and communicating with the controller to initiate implementation of the secure configuration.Type: GrantFiled: March 2, 2021Date of Patent: April 9, 2024Assignee: KEYSIGHT TECHNOLOGIES, INC.Inventors: Keith Charles Thompson, Joseph Eugene Mueller
-
Patent number: 11949777Abstract: Systems and methods to encrypt centralized information associated with users of a customer due diligence platform based on a modified key expansion schedule are disclosed. Exemplary implementations may: obtain user profile information making up user profiles of users of a customer due diligence platform; encrypt the user profile information to generate encrypted user profile information based on a modified key expansion schedule requiring multiple different keys; effectuate storage of the encrypted user profile information in association with the user profiles in non-transitory electronic storage; and/or perform other operations.Type: GrantFiled: July 31, 2023Date of Patent: April 2, 2024Assignee: SIMUR, INC.Inventors: Javier Alejandro Chaos-Provecho, Don Seymour
-
Patent number: 11943201Abstract: A method including configuring a first server to receive, from a second server, an encrypted authentication packet to enable the first server and the second server to conduct an authentication process, the encrypted authentication packet including a crypted code field indicating that a portion of the encrypted authentication packet is encrypted and a crypted payload including an encrypted initial authentication packet; and configuring the first server to transmit, to the second server, a response based at least in part on determining that the portion of the encrypted authentication packet is encrypted and on decrypting the encrypted initial authentication packet. Various other aspects are contemplated.Type: GrantFiled: November 28, 2021Date of Patent: March 26, 2024Assignee: UAB 360 ITInventors: Karolis Pabijanskas, And{umlaut over (z)}ej Val{hacek over (c)}ik, Ramünas Keliuotis
-
Patent number: 11921851Abstract: The presently disclosed subject matter includes an apparatus that receives a dataset with values associated with different digital resources captured from a group of compute devices. The apparatus includes a feature extractor, to generate a set of feature vectors, each feature vector from the set of feature vectors associated with a set of data included in the received dataset. The apparatus uses the set of feature vectors to validate multiple machine learning models trained to determine whether a digital resource is associated with a cyberattack. The apparatus selects at least one active machine learning model and sets the remaining trained machine learning models to operate in an inactive mode. The active machine learning model generates a signal to alert a security administrator, blocks a digital resource from loading at a compute device, or executes other remedial action, upon a determination that the digital resource is associated with a cyberattack.Type: GrantFiled: January 14, 2022Date of Patent: March 5, 2024Assignee: Musarubra US LLCInventors: Sai Omkar Vashisht, Rahul Khul, Chunsheng Fang
-
Patent number: 11917072Abstract: A computer-implemented method according to one embodiment includes compressing an uncompressed instance of data to create a compressed instance of data; encrypting the compressed instance of data in response to determining that a size of the compressed instance of data is less than a predetermined threshold; creating a message authentication code (MAC) for the encrypted compressed instance of data; and adding a variable-length zero pad and the MAC to the encrypted compressed instance of data to create a formatted string.Type: GrantFiled: December 3, 2020Date of Patent: February 27, 2024Assignee: International Business Machines CorporationInventors: Glen Alan Jaquette, William J. Scales, Danny Harnik
-
Patent number: 11909867Abstract: A key exchange system, for generating a shared key for performing encrypted communication between multiple communication devices, includes the multiple communication devices. Each of the multiple communication devices includes a memory, and a processor configured to generate a short term private key by using a private key, generate a short term public key on one of asymmetric pairing groups used for the ID based encryption, by using the short term private key, and generate a shared key for performing encrypted communication with another communication device by performing a first pairing operation using a private key generated on another one of the asymmetric pairing groups and a short term public key generated in the other communication device, and performing a second pairing operation using the short term private key of the communication device and public information used in generating a private key of the other communication device.Type: GrantFiled: May 29, 2019Date of Patent: February 20, 2024Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATIONInventors: Junichi Tomida, Fumitaka Hoshino, Akira Nagai
-
Patent number: 11909869Abstract: Communication methods and apparatus are described. One communication method includes that user equipment (UE) sends an N1 message to a security anchor function (SEAF), where the N1 message carries a Diffie-Hellman (DH) public parameter or a DH public parameter index, the N1 message further carries an encrypted identifier of the UE, and the encrypted identifier is obtained by encrypting a permanent identifier of the UE and a first DH public key. The UE receives an authentication request that carries a random number and that is sent by the SEAF. The UE sends, to the SEAF, an authentication response used to respond to the authentication request, where the authentication response carries an authentication result calculated based on a root key and the random number.Type: GrantFiled: June 23, 2021Date of Patent: February 20, 2024Assignee: Huawei Technologies Co., Ltd.Inventors: Xin Kang, Haiguang Wang, Zhongding Lei, Bo Zhang