Patents Examined by C. Lewis
  • Patent number: 11212115
    Abstract: An information processing apparatus generates a public key pair in accordance with a certificate issuance request, generates a certificate signing request based on the public key pair and transmits an electronic certificate issuance request to an external apparatus. The information processing apparatus receives a response transmitted from the external apparatus as a response to the electronic certificate issuance request, obtains an electronic certificate included in the received response and causes an application to enable its use of the obtained electronic certificate.
    Type: Grant
    Filed: February 9, 2018
    Date of Patent: December 28, 2021
    Inventors: Naoya Kakutani, Hisayuki Yamauchi
  • Patent number: 11200305
    Abstract: A computer-implemented method for controlling access to a computing device based on one or more facial expression configurations of a user. The method captures the one or more facial expression configurations of the user, and matches the captured one or more facial expression configurations of the user with one or more defined facial expression configurations, wherein the one or more defined facial expression configurations are associated with one or more access permissions, or actions to be performed by the computing device. The method further grants the one or more access permissions to the user based on the match, and/or performs the action associated with the match. In additional embodiments, the method may further create one or more user profiles of the user, wherein each of the one or more user profiles is configured to include one or more access permissions.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: December 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Stephen Paul Ridgill, II, Randy A. Rendahl, Ashley Kristin Silva, Jana H. Jenkins
  • Patent number: 11195225
    Abstract: The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
    Type: Grant
    Filed: January 8, 2020
    Date of Patent: December 7, 2021
    Assignee: The 41st Parameter, Inc.
    Inventor: Ori Eisen
  • Patent number: 11196772
    Abstract: To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed.
    Type: Grant
    Filed: October 3, 2019
    Date of Patent: December 7, 2021
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Evgene Vahlis, Paul Giura
  • Patent number: 11184166
    Abstract: Described is a system for jointly generating a random value amongst a set of servers for secure data sharing. The set of servers initiates a randomness generation protocol where each server in the set of servers selects a randomly generated polynomial and broadcasts a cryptographic hash function of the randomly generated polynomial. Each server sends its value of the cryptographic hash function of the randomly generated polynomial to the set of servers. The randomness generation protocol is used in a multi-party computation protocol to ensure a set of data is securely shared electronically amongst the set of servers via a secure, authenticated broadcast channel.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: November 23, 2021
    Assignee: HRL Laboratories, LLC
    Inventors: Joshua D. Lampkins, Hyun (Tiffany) J. Kim
  • Patent number: 11171972
    Abstract: Systems, methods, devices, instructions, and media are described for generating suggestions for connections between accounts in a social media system. One embodiment involves storing connection graph information for a plurality of user accounts, and identifying, by one or more processors of the device, a first set of connection suggestions based on a first set of suggestion metrics. A second set of connection suggestions is then identified based on a second set of suggestion metrics, wherein the second set of connection suggestions and the second set of suggestion metrics are configured to obscure the first set of connection suggestions, and a set of suggested connections is generated based on the first set of connection suggestions and the second set of connection suggestions. The set of connection suggestions is then communicated to a client device method associated with the first account.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: November 9, 2021
    Assignee: Snap Inc.
    Inventors: Jonathan Brody, Donald Giovannini, Edward Koai, Jie Wu, Lin Zhong
  • Patent number: 11165564
    Abstract: Embodiments are directed to managing resources over a network. Objects that each correspond to a separate key container may be provided such that each separate key container includes a region key, a shard key, a nonce key. A data center and a data store may be determined for each object based on the region key and the shard key included in each separate key container such that a value of the region key corresponds to the data center and a value of the shard key corresponds to the data store.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: November 2, 2021
    Assignee: SkedgeAlert, Inc.
    Inventor: Darryl Pennock West
  • Patent number: 11159318
    Abstract: A method for establishing connection weights between network nodes is implemented by communicating data processing units, a public key and a private key being associated with each node, a given node being able to communicate its public key to another node, thus forming a so-called real connection (“IRL-connected”) between two nodes, and each node also being able to communicate to another node a public key received from yet another node, thus forming a so-called indirect connection between the other node and the yet another node. Each node can have a specific connection weight in relation to another node with which it has a real or indirect connection. In order to determine the connection weight of a second node in relation to a first node, the method comprises calculating a set combination of weighting factors (influence, proximity) of third nodes that are IRL-connected to the second node.
    Type: Grant
    Filed: January 16, 2017
    Date of Patent: October 26, 2021
    Inventor: Enrico Maim
  • Patent number: 11159564
    Abstract: Zero-day attacks with unknown attack signatures are detected by correlating behavior differences of a plurality of entities. An entity baseline behavior for each entity of the plurality of entities is determined 310, the entity baseline behavior includes multiple variables. An entity behavior difference for each entity is determined at a series of points in time 320. Correlations between the entity behavior differences for the plurality of entities are determined at the series of points in time 330. Based on these correlations, it is determined whether the plurality of entities is exhibiting coordinated behavior differences 340. An attack signature is determined based on the entity behavior differences and the correlations 350. A database of attack signatures is generated 360.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: October 26, 2021
    Assignee: Google LLC
    Inventor: Animesh Nandi
  • Patent number: 11144650
    Abstract: A semiconductor device for provisioning secure information of a demander includes a device key storage configured to store a device key provisioned by a supplier of the semiconductor device, a master key generator configured to generate, based on the device key and demander data provisioned by the demander, a master key of the demander by using a first operation shared with the supplier and a second operation shared with the demander, and a cryptographic engine configured to perform a cryptographic operation based on the master key.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: October 12, 2021
    Inventors: Ki-Tak Kim, Ki-Seok Bae, Jin-Su Hyun, Young-Moon Sonn, Hyo-Sun Hwang
  • Patent number: 11133944
    Abstract: Disclosed herein is a method of connection of home appliance to a network, a network-connection system for home appliances, and an apparatus related to a network-connection setting for home appliances. The network connection method of home appliance includes operations in which a terminal device receives an input of an authentication key of an access point (AP) apparatus and the terminal device or the AP apparatus verifies and authenticates the authentication key; a home appliance is set to be in a state of communicating with the terminal device; the home appliance is interconnected to the terminal device and the terminal device transmits an identification number and the certificated authentication key of the AP apparatus to the home appliance; and the home appliance is connected to the AP apparatus based on the identification number and the authentication key of the AP apparatus.
    Type: Grant
    Filed: January 17, 2020
    Date of Patent: September 28, 2021
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Hee Kyung Yang, Se Il Kim
  • Patent number: 11128461
    Abstract: An apparatus computing scalar multiplication of a point on an elliptic curve by a scalar value includes an estimation unit configured to estimate a pre-computation amount based on the scalar value, a pre-computation unit configured to perform pre-computation based on the point on the elliptic curve by using the estimated pre-computation amount, a generating unit configured to generate an internal representation of the scalar value by using the estimated pre-computation amount, and a computation unit configured to output a result of the scalar multiplication of the point based on the result of the pre-computation and the internal representation.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: September 21, 2021
    Inventor: Shinya Yamada
  • Patent number: 11113191
    Abstract: Methods and systems for the direct-addressing of data and the indirect-addressing of data are disclosed using pointers based on two or more hash digests generated in different ways using the same data and the same hash algorithm along with a modulo of a prime number.
    Type: Grant
    Filed: June 21, 2020
    Date of Patent: September 7, 2021
    Inventor: Tyson York Winarski
  • Patent number: 11101985
    Abstract: One embodiment provides a key transfer system and method based on a shared security application. During operation, an application executing on a terminal device receives an application key comprising at least a service key from a management server of the application and forwards the application key to a management server of a shared security application residing in a secure element in the terminal device, thereby facilitating the management server of the shared security application to deliver the application key to the shared security application. The application invokes the application key stored in the shared security application to perform services associated with the application. The application key is isolated from other application keys associated with other applications stored in the shared security application.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: August 24, 2021
    Inventors: Xi Sun, Hongwei Luo
  • Patent number: 11101981
    Abstract: Share values for use in a cryptographic operation may be received and the cryptographic operation may be performed based on the share values. A pseudorandom number that is to be used by the cryptographic operation may be identified and the pseudorandom number may be generated based on a portion of the share values that are used in the cryptographic operation. The cryptographic operation may then be performed based on the generated pseudorandom number.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: August 24, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Pankaj Rohatgi, Elke De Mulder, Michael Hutter
  • Patent number: 11093598
    Abstract: An identity authentication method and apparatus, where the method includes receiving a network access request from a user terminal, returning a portal authentication page to the user terminal, where the portal authentication page includes indication information, receiving an access token that is generated by an open social platform and used to obtain user identity information, generating a portal authentication request including a terminal identifier of the user terminal and the access token, sending the portal authentication request to an authentication server, and receiving a portal authentication response returned by the authentication server, where the portal authentication response includes the terminal identifier and an authentication result. Therefore, the identity authentication may be directly performed on the user terminal using the user identity information stored on the open social platform, and a user does not need to register with a portal authentication system in advance.
    Type: Grant
    Filed: June 27, 2018
    Date of Patent: August 17, 2021
    Inventor: Guozhong Chen
  • Patent number: 11070545
    Abstract: There is provided a system comprising a first device of a user and a second device of a user, in which a user carries out a secure transaction utilising a user interface of the second device, wherein the secure transaction process sends a request to a user interface of the first device, and authorises or authenticates the transaction in dependence on a response to the request which is not transmitted from a user interface of the second device.
    Type: Grant
    Filed: September 11, 2015
    Date of Patent: July 20, 2021
    Assignee: PIKSEL, INC.
    Inventor: Philip Shaw
  • Patent number: 11063964
    Abstract: In one implementation, a method for providing security on externally connected controllers includes receiving, at a reporting agent that is part of a security middleware layer operating on a controller, an indication that a process has been blocked; obtaining, by the reporting agent, trace information for the blocked process; determining, by the reporting agent, a code portion in an operating system of the controller that served as an exploit for the blocked process; obtaining, by the reporting agent, a copy of malware that was to be executed by the blocked process; generating, by the reporting agent, an alert for the blocked process that includes (i) the trace information, (ii) information identifying the code portion, and (iii) the copy of the malware; and providing, by the reporting agent, the alert to a network interface on the controller for immediate transmission to a backend computer system.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: July 13, 2021
    Inventors: Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai
  • Patent number: 11025439
    Abstract: A plurality of authentication devices form and manage a self-organizing mobile peer-to-peer mesh network to provide robust authentication of mobile peers, humans and or mobile devices such as drones, cars, satellites, robots etc. The mesh network may supplement traditional fixed point of entry authentication to combat social engineering penetrations or be used in situations where fixed-point authentication is not viable. Network efficiency can be enhanced by using two-level encryption, a first level of encryption based on permissions to join a mesh network and a simpler second level of encryption based on knowledge shared with members of the network for communication. Making the permissions a function of location can make the network more robust. Re-authenticating member peers based on the occurrence of defined events can further enhance security.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: June 1, 2021
    Assignee: Raytheon Company
    Inventors: David James Theodore, Blake Cameron Sims, Andres Rios, Hyperia Doe, Jesse Jonathan Lee, Alfonso Andres Lopez
  • Patent number: 11025616
    Abstract: A system and method for provides unverified users an ability to act upon private records known to them while protecting user privacy by not reflecting private information back to the unverified user. As an unverified user inputs information related to their identity into an interface, the system searches an indexed database which may include both registered users and/or unregistered customers indexed from a single data source or from disparate data sources.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: June 1, 2021
    Assignee: Kaarya LLC
    Inventors: Ujjual Nath, Gaurav Sharma, William Fletcher