Patents Examined by Benjamin E. Lanier
-
Patent number: 11777743Abstract: The invention relates to a method for securely providing a personalized electronic identity on a terminal (2) which can be used by a user (1) for identification purposes when claiming an online service. In the method, an identification application is ran on a terminal (2), which is assigned to a user (1), in a system comprising data processing devices (9; 10; 11; 12) and said terminal (2), and additionally a personalization application and an identity provider application are ran.Type: GrantFiled: January 8, 2020Date of Patent: October 3, 2023Assignee: Bundesdruckerei GmbHInventors: Frank Dietrich, Marian Margraf, Tim Ohlendorf, Matthias Schwan
-
Patent number: 11775682Abstract: Various surgical hubs and data stripping methods are disclosed. The surgical hub comprises a processor and a memory coupled to the processor. The memory stores instructions executable by the processor to interrogate a modular device coupled to the processor via a modular communication hub. The modular device is a source of data sets that include patient identity data and surgical procedure data. The processor also executes instructions to: receive a data set from the modular device; discard the patient identity data and any portion of the surgical procedure data that identifies the patient from the data set; extract anonymous data from the data set and create an anonymized data set; and configure operation of the surgical hub or the modular device based on the anonymized data set.Type: GrantFiled: March 30, 2021Date of Patent: October 3, 2023Assignee: Cilag GmbH InternationalInventors: Frederick E. Shelton, IV, Jason L. Harris, David C. Yates
-
Patent number: 11768930Abstract: Techniques are provided for client application authentication and include receiving a request to authenticate an application and, based on the received request to authenticate the application, sending a request to perform a push communication, including a short-term shared key, to a digital distribution system, wherein the digital distribution system is a distribution source of the application. The digital distribution system attempts to send the push communication including the short-term shared key to the application. The techniques may proceed by receiving a request for resources from the provider client application and determining whether the application has the short-term shared key. When it is determined that the application has provided the short-term shared key, the requested resources to the application may be provided, otherwise, the requested resources may be denied.Type: GrantFiled: May 7, 2021Date of Patent: September 26, 2023Assignee: ATLASSIAN PTY LTD.Inventor: Jerry Cheng
-
Patent number: 11763041Abstract: A data storage device includes a nonvolatile memory device, a volatile memory device, a data encryption circuit configured to encrypt data outputted from the nonvolatile memory device, a data decryption circuit configured to decrypt encrypted data output from the data encryption circuit and configured to provide the decrypted data to the volatile memory device, and a processor configured to perform a first process that controls installation of a first in-storage program in the data storage device, a second process configured to manage a mapping table storing a relation between a logical address and a physical address of the nonvolatile memory device, and a third process configured to execute the first in-storage program.Type: GrantFiled: April 28, 2021Date of Patent: September 19, 2023Assignees: SK hynix Inc., The Board of Trustees of the University of IllinoisInventors: Jian Huang, Xiaohao Wang, Luyi Kang, Jong Ryool Kim, Hyung Jin Lim, Myeong Joon Kang, Chang Hwan Youn
-
Patent number: 11764972Abstract: Processing within a computing environment is facilitated by generating a hybrid security certificate using multiple cryptosystems. The generating includes obtaining data for inclusion in the hybrid security certificate, and generating a first digital signature associated with a first cryptosystem to cover the data, and a second digital signature associated with a second cryptosystem to cover the data. The generating further includes providing the hybrid security certificate, where the hybrid security certificate includes the data, the first digital signature associated with the first cryptosystem, and the second digital signature associated with the second cryptosystem, and where the first digital signature has no dependency on a key of the second cryptosystem or the second digital signature, and the second digital signature has no dependency on a key of the first cryptosystem or the first digital signature.Type: GrantFiled: February 25, 2021Date of Patent: September 19, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan William Edwards, David Wayne Glass, David Howard Evans, Clifford Lee Hansen, James Richard Coon, Richard Victor Kisley
-
Patent number: 11757625Abstract: The present invention provides methods, systems and computer program products (software) for the reliable, attack-resistant authentication of a network-connected user to a network-connected service provider.Type: GrantFiled: May 24, 2021Date of Patent: September 12, 2023Assignee: MINE ZERO GMBHInventors: Attila Vass, Jochen Kornitzky, Rolf Herken
-
Patent number: 11757640Abstract: Disclosed are various embodiments for authenticating a user using non-fungible tokens (NFTs). A trusted token issuer verifies a user's identity according to identifying credentials (e.g., government issued identification, passport, driver's license, etc.) presented by the user and creates a non-fungible token in response to verifying the credentials. The non-fungible token is associated with a user identifier and can be used by an access provider to authenticate a user requesting access to restricted content provided by the access provider. For example, when a client device associated with the user requests access from an access provider to an access-restricted website or other type of access-restricted area (e.g., building, concert venue, network, etc.), the access provider (e.g., website server, building computing device, venue system, etc.) uses the properties of the non-fungible token to verify one's identity and permit access upon verification.Type: GrantFiled: July 27, 2021Date of Patent: September 12, 2023Assignee: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INCInventor: Andras L. Ferenczi
-
Patent number: 11750584Abstract: The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by tag-based computer information. Computers and other devices accessing the Web carry device tags with date and time information describing when they were issued by a security tag server. A server time stamp may be inserted into time based computer tags such as a cookies indicating when they were created. Such time stamp information can be encrypted and analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account. When the time stamp information from the tag is compared to other selected information about the user, device and/or account, including but not limited to last account log-in date/time or account creation date, the invention may be used to detect suspicious activity.Type: GrantFiled: March 4, 2020Date of Patent: September 5, 2023Assignee: The 41st Parameter, Inc.Inventor: Ori Eisen
-
Patent number: 11741240Abstract: A method for processing a cryptographic operation request includes receiving, at a hardware security module (HSM), the cryptographic operation request including a cryptographic key and at least one authorization token, determining, by the HSM, whether an access control list (ACL) associated with the cryptographic key of the cryptographic operation request is authorized to govern access to the cryptographic key, and validating, by the HSM, the at least one authorization token. When the at least one authorization token is valid and the ACL is authorized to govern access to the cryptographic key of the cryptographic operation request, the method includes processing, by the HSM, the cryptographic operation request.Type: GrantFiled: June 4, 2021Date of Patent: August 29, 2023Assignee: Google LLCInventors: Patrick Stahlberg, August Huber, Il-Sung Lee, Tao Tao, Xiaolan Zhang, John Randolph, David Elrom
-
Patent number: 11734456Abstract: The present disclosure provides systems and methods for authenticating photographic data. In one embodiment, a method comprises providing an image authentication application for use on a client device, the application configured to control image capture and transmission; receiving an image data file from the application at the authentication server comprising a photographic image captured by the application and metadata associated therewith; applying a watermark to the photographic image to create a watermarked image; applying date and time information to the tagged image; applying location information to the tagged image; creating a web address associated with the image data file; uploading the photographic image, the tagged image, or both to the web address; and transmitting an authenticated image file to the client device, the authenticated image file comprising one or more of: the watermarked image, the photographic image, the date and time information, geographic information, and the web address.Type: GrantFiled: May 16, 2022Date of Patent: August 22, 2023Assignee: TruePic Inc.Inventors: Craig Stack, Jason Lyons, Francis Lyons
-
Patent number: 11736481Abstract: A method for proving identity when registering for a service includes presenting by the entity a user with options for registering for the service, wherein the options comprise validating an identity of the user through a trusted partner. The method includes receiving, by the entity, user data from the trusted partner responsive to the user logging into a page on the trusted partner. The method includes validating the user identity for the service responsive to a determination that a user identifier from the trusted partner matches a user identifier on record with the entity. The method includes populating entity user data for the service according to the user data received from the trusted partner responsive to successfully validation of the user identity. In embodiments, a risk analysis score is determined for the user and registration steps for registering are selected based on comparison of the registration score with a threshold.Type: GrantFiled: April 5, 2019Date of Patent: August 22, 2023Assignee: ADP, Inc.Inventors: Kalyan Vbh, Frank Villavicencio, Pavan Katamveera
-
Patent number: 11728989Abstract: A first apparatus performs a pairing providing process of displaying a provision string on the first apparatus and transmitting the provision string to a server apparatus, the provision string being of a given number of digits that changes every given amount of time in such a manner that, every given amount of time, the provision string is subjected to carrying and a new character is added to the rightmost digit of the provision string. A second apparatus transmits an acceptance string to the server apparatus, the acceptance string being input from the second apparatus based on the provision string displayed on the first apparatus. The server apparatus compares the provision string with the acceptance string, and determines that pairing is established between the first apparatus and the second apparatus when the provision string and the acceptance string match each other.Type: GrantFiled: September 11, 2019Date of Patent: August 15, 2023Assignee: PLATFIELD INC.Inventor: Takeshi Mizuta
-
Patent number: 11722890Abstract: The present disclosure relates to a communication method and system for converging a 5th-Generation (5G) communication system for supporting higher data rates beyond a 4th-Generation (4G) system with a technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the 5G communication technology and the IoT-related technology, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. Methods and systems for generating/deriving CU-UP security keys for disaggregated gNB architecture are described herein. A UE/gNB can inform the gNB/UE about the capability of the UE/gNB to derive CU-UP security keys. CU-UP security keys comprise an integrity protection key and a ciphering key. The gNB derives an integrity protection key and a ciphering key upon determining that the UE supports derivation of the CU-UP security keys or the UE has capability to derive CU-UP security keys.Type: GrantFiled: July 26, 2021Date of Patent: August 8, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Rajavelsamy Rajadura, Rohini Rajendran, Nivedya Parambath Sasi
-
Patent number: 11714902Abstract: In embodiments of the present invention, a framework for an extensible, file-based security system is described for determining an appropriate application, application environment, and/or access or security control measure based at least in part on a file's reputation. In response to the selection of a file, an application controller may be used to select a software application from two or more software applications to open the selected file, based at least in part on the selected file's reputation. If launched, a software application may be configured to open the file in an environment, such as a virtual machine, quarantined environment, and the like, that is appropriate for the file based at least in part on the reputation information. A software application may be a secure software application configured to manage secure files, or an insecure software application configured to manage insecure files.Type: GrantFiled: February 4, 2022Date of Patent: August 1, 2023Assignee: Sophos LimitedInventor: Andrew J. Thomas
-
Patent number: 11711216Abstract: A biometric enrollment system can include a processor and a data store that stores one or more TPS templates and a sample population. The processor can be configured to receive a reference template associated with a subject, generate a cohort set based on a plurality of templates from the sample population, and perform a one-to-many comparison process on the reference template and the cohort set, wherein an output of the one-to-many comparison process comprises one or more cohort vectors. The processor can normalize the one or more cohort vectors to obtain one or more normalized cohort vectors, and can apply a lossy transformation to the one or more normalized cohort vectors. An output of applying the lossy transformation can comprise one or more transformed, privacy-secured (TPS) templates that are stored in the database.Type: GrantFiled: December 2, 2020Date of Patent: July 25, 2023Assignee: T STAMP INC.Inventor: Norman Hoon Thian Poh
-
Patent number: 11695796Abstract: Described are implementations that analyze the unencrypted messages of a cryptographic protocol handshake between two devices and/or the receipt or absence of encrypted messages of the handshake to detect security vulnerabilities of one or both of those devices. For example, the unencrypted messages of a TLS handshake between a client device and a server may be analyzed to determine security vulnerabilities of the client device. Because the disclosed implementations utilize the unencrypted messages of a handshake and/or detection of the receipt or absence of encrypted messages of the handshake, involvement in the handshake or decryption of encrypted messages of the handshake is not necessary. The requirement is that the disclosed implementations are able to observe the messages of a handshake that are used to establish a secure communication between the devices.Type: GrantFiled: December 10, 2020Date of Patent: July 4, 2023Assignee: Amazon Technologies, Inc.Inventors: Li Chen, Ali Haldun Taner
-
Patent number: 11689352Abstract: A method is provided for generating an output from an input according to a secret using a white-box implementation of a cryptographic function having a first operation, a second operation, and a third operation. The method applies the input to a first operation to generate a first intermediate result, applies the first intermediate result to a second operation to generate a second intermediate result, and applies the second intermediate result to a third operation to generate the output, wherein at least two of the first operation, the second operation, and the third operation is implemented by a plurality of interconnected logic elements, the interconnection of the plurality of logic elements being comprised of one of a non-algebraic interconnection of logic elements and an algebraic interconnection of logic elements having obfuscated boundaries between the at least one of the first operation, the second operation and the third operation.Type: GrantFiled: December 12, 2017Date of Patent: June 27, 2023Assignee: ARRIS Enterprises LLCInventor: Lex Aaron Anderson
-
Patent number: 11669605Abstract: Various embodiments relate to a dynamic biometric enrollment system. The dynamic biometric enrollment includes a processor and instructions stored in non-transitory machine-readable media. The instructions are configured to cause the server system to receive at least one biometric authentication sample from the user. The at least one tokenized biometric enrollment sample has been generated by tokenizing at least one biometric enrollment sample captured from a user associated with a unique user identifier. At least one biometric authentication sample captured from the user is retrieved. The at least one tokenized biometric enrollment sample is detokenized to retrieve the at least one biometric enrollment sample. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a dynamic biometric reference template. It is determined whether the at least one biometric authentication sample matches with the dynamic biometric reference template.Type: GrantFiled: September 29, 2021Date of Patent: June 6, 2023Assignee: Wells Fargo Bank, N.A.Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 11669637Abstract: New tokenization tables are derived at intervals in order to increase the security of tokenized data that is transferred between two endpoints. Generation of the new tokenization tables is based on previous tokenization tables, which advantageously allows the generation process to be performed locally at the two endpoints independently of an external tokenization table provider. New tokenization tables can periodically be distributed to the endpoints as a new starting point for derivation.Type: GrantFiled: October 2, 2021Date of Patent: June 6, 2023Assignee: Protegrity CorporationInventors: Yigal Rozenberg, Ulf Mattsson
-
Patent number: 11671439Abstract: The invention relates to digital cloud forensics. An embodiment of the present invention applies collection processes and tools to cloud infrastructure as a service to provide a more efficient and faithful representation of evidence. An embodiment of the present invention applies innovative concepts to retrospectively investigate ephemeral instances which may have long since terminated. This innovative process provides organizations a strategy to provide forensic investigations within either a public or private cloud environment.Type: GrantFiled: June 10, 2021Date of Patent: June 6, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Michael P. Vega, James Regan, Matteo Michelini, Jean-Francois Legault