Patents Examined by Christopher Revak
  • Patent number: 10740491
    Abstract: A method for verifying instructions of diagnostic equipment is used to solve a technical problem that a lower computer of the diagnostic equipment is prone to be cheated by an upper computer, this method comprises: obtaining first verification data sent from the upper computer of the diagnostic equipment, wherein the diagnostic equipment carries the first verification data when a software version of the diagnostic equipment is updated, the first verification data is encrypted and comprises a set of instructions sent from the upper computer to the lower computer in a corresponding software version; decrypting the first verification data to obtain the set of instructions; comparing instruction data received from the upper computer with the set of instructions, and judging whether the instruction data comply with the set of instructions; if the instruction data comply with the set of instructions, executing the instruction data; and if the instruction data doesn't comply with the set of instructions, refusing to
    Type: Grant
    Filed: January 15, 2018
    Date of Patent: August 11, 2020
    Assignee: SHENZHEN LAUNCH SOFTWARE CO., LTD.
    Inventors: Jun Liu, Xiaobing Zhao, Wei Yan, Guozhu Liu
  • Patent number: 10735188
    Abstract: The present application is directed to a method and system for secure electronic communications using physically distributed security hardware and capable of operating by simulating a common or unitary HSM device. This is achieved by implementing the internal operations of the HSM using threshold cryptography on a set of internal nodes. In order to provide the necessary functionality, the keys and the required operations (such as the digital signature) are distributed among these nodes. In particular, the system provides digital signature capabilities through an efficient and modular application of Victor Shoup's schema referred to in the background.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: August 4, 2020
    Assignee: UNIVERSIDAD DE CHILE
    Inventors: Alejandro Hevia Angulo, Javier Alejandro Bustos Jimenez, Francisco Jose Cifuentes Quijada
  • Patent number: 10733313
    Abstract: A counter integrity tree for memory security includes at least one split-counter node specifying at least two counters each defined as a combination of a major count value shared between the at least two counters and a respective minor count value specified separately for each of the at least two counters. This increases the number of child nodes which can be provided per parent node of the tree, and hence reduces the number of tree levels that have to be traversed in a tree covering a given size of memory region. The minor counter size can be varied dynamically by allocating nodes in a mirror counter integrity tree for accommodating larger minor counters which do not fit in the corresponding node of the main counter integrity tree.
    Type: Grant
    Filed: February 9, 2018
    Date of Patent: August 4, 2020
    Assignee: Arm Limited
    Inventors: Prakash S. Ramrakhyani, Roberto Avanzi, Wendy Arnott Elsasser
  • Patent number: 10726147
    Abstract: Native file encryption support is integrated into an existing file system that does not provide such support, such as the FAT family of file systems, while maintaining backwards compatibility with previous implementations of these file systems.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: July 28, 2020
    Assignee: Microsoft Technology Licensing, LLC.
    Inventors: Darwin Ou-Yang, Peter Novotney, Ravinder Thind
  • Patent number: 10728037
    Abstract: The present disclosure includes a method for authenticating a field device of automation technology with respect to a destination device. A telegram is created by the field device, which telegram includes a first data field and at least a second data field. The first data field includes information on the status of the field device and/or of the device components of the field device and/or information on the device parameterization/configuration, and a sequence counter or a time stamp. Security data are generated from the first data field via a cryptographic method, which security data are stored in the second data field. The telegram is transmitted from the field device to the destination device, wherein the destination device verifies the second data field as to authenticity or integrity upon receipt of the telegram, and wherein a first alarm is generated if the authenticity or the integrity of the second data field is not successfully verified.
    Type: Grant
    Filed: February 7, 2018
    Date of Patent: July 28, 2020
    Assignee: Endress+Hauser Conducta GmbH+Co. KG
    Inventors: Björn Haase, Ralf Schmidt, Markus Kilian, Helmut Kalteis
  • Patent number: 10726138
    Abstract: An unauthorization determination system includes a memory device that is mounted in a vehicle and includes a predetermined non-access area, a connection device mounted in the vehicle and configured to be connected to the external device in a wired or wireless manner, and an ECU configured to, in a case where access to the non-access area is requested from the external device or in a case where the non-access area is accessed by the external device, determine that the access from the external device is unauthorized.
    Type: Grant
    Filed: January 16, 2018
    Date of Patent: July 28, 2020
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Tetsuro Nakamura
  • Patent number: 10726130
    Abstract: A method for verifying upgrade of diagnosis connector of diagnostic equipment is used to solve a problem that an illegal person implements an illegal upgrade for the diagnosis connector of the diagnostic equipment by cloning.
    Type: Grant
    Filed: January 15, 2018
    Date of Patent: July 28, 2020
    Assignee: SHENZHEN LAUNCH SOFTWARE CO., LTD.
    Inventors: Jun Liu, Xiaobing Zhao, Wei Yan, Guozhu Liu
  • Patent number: 10721166
    Abstract: An approach is provided that selects a geographic location to which transmission of a data packet is disallowed. The approach identifies disallowed network devices that reside in the selected geographic location and builds a routing path through a public computer network through an allowed set of network devices with the allowed set of network devices does including any of the disallowed network devices. The approach then transmits the data packet from a transmitting network device to a receiving network device using the routing path.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: July 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Andrew Barnes, John Delaney, Alexander J. Harvilchuck, Kenneth Weber, Clea Zolotow
  • Patent number: 10706737
    Abstract: A system and method are provided for treating excessive or problematic computer use. In at least one embodiment, a method is employed to treat excessive or problematic computer use by acquiring information about the unwanted user activity, monitoring user activity for the unwanted behavior, controlling the behavior when it occurs, enabling the user to record self-observations and evaluating the results. This method may employ a computer based system to treat excessive or problematic computer use which includes configuring a user activity monitor with constraints, programmatically enforcing those constraints, reporting the activities monitored and restricted, and enabling a user to input self-observations. Potential constraints include a complete bar on the user activity, as well as, progressively decreasing the amount of time the user may engage in the activity, i.e. titrating the user activity.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: July 7, 2020
    Inventors: Joanne Walker, Saul Rosenthal
  • Patent number: 10706150
    Abstract: Systems and methods that detect presence of malicious software while comparing address mappings in multiple table look-aside buffers are provided. Address mappings in an instruction table look-aside buffer (ITLB) and a data table look-aside buffer (DTLB) may be scanned with each address mapping including a mapping between a virtual page in a virtual memory and a frame in a physical memory of a computing device. A discrepancy between an address mapping in the ITLB and an address mapping in the DTLB can be identified. Based on the discrepancy, a process associated with the mapping may then be identified as a malicious process.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: July 7, 2020
    Assignee: PayPal, Inc.
    Inventor: Shlomi Boutnaru
  • Patent number: 10708045
    Abstract: A confidential information setting apparatus includes: a communication unit that acquires an encryption key and condition information, which is a condition for setting a secret key to a terminal, from a memory unit of a server and acquires a terminal ID, which is an identifier for uniquely identifying the terminal, and the secret key associated with the terminal ID and encrypted from a memory unit of a user apparatus; an encryption processing unit that decrypts the encrypted secret key with the encryption key; and a control unit that judges whether the decrypted secret key can be set to the terminal or not, based on the condition information and sets the secret key to the terminal when a result of the judgment indicates that the secret key can be set to the terminal.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: July 7, 2020
    Assignee: Hitachi, Ltd.
    Inventors: Hiroki Yamazaki, Hiromi Isokawa, Hiroyuki Higaki
  • Patent number: 10708047
    Abstract: A computer-readable recording medium storing an update program is disclosed. An issuing request of a second public key certificate is sent to a server under a secure connection to the server using a first public key certificate. The second public key certificate is received from the server. A connection confirmation using the second public key certificate is conducted, when a validity date of the first public key certificate lapses.
    Type: Grant
    Filed: December 13, 2016
    Date of Patent: July 7, 2020
    Assignee: FUJITSU LIMITED
    Inventor: Hidefumi Maruyama
  • Patent number: 10701557
    Abstract: Authentication device and method for a system that includes a subscriber device and a companion device. The authentication method includes the subscriber device delivering to the companion device a temporary profile and an authentication response signed by the subscriber device for sending to a server, installing the temporary profile to configure a second wireless communication interface of the companion device, and requesting a second authentication from the server via the second interface by using the delivered authentication response so as to authorize the second interface when the companion device and the subscriber device are not in communication with each other via the first communication interface. The device and method may be used by systems that include a subscriber device (e.g., a mobile telephone) and a companion device, e.g. a connected watch or object.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: June 30, 2020
    Assignee: IDEMIA FRANCE
    Inventors: Tomasz Wozniak, Guillaume Larignon
  • Patent number: 10701044
    Abstract: Examples disclosed herein relate to sharing of community-based security information. Some examples may enable generating a first community on a security information sharing platform that enables sharing of security information among a plurality of communities; obtaining a first security indicator from a first user of the first community; providing the first security indicator to the first community; obtaining contextual information related to the first security indicator from a second user of the first community; including the first security indicator and the contextual information related to the first security indicator in the security information of the first community; and encrypting a portion of the security information of the first community with an encryption key, wherein the encryption key is unavailable to users outside of the first community.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: June 30, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Tomas Sander, Nadav Cohen, Brian Frederik Hosea Che Hein, Amir Kibbar, Ted Ross
  • Patent number: 10693645
    Abstract: The present invention relates to a security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server, wherein said security management system comprises: —said identity provider server which is adapted to: —open with said token a secure messaging channel by means of a General Authentication Procedure using at least one certificate; —receive via said secure messaging channel from said token enciphered data; —transmit to said service provider server said enciphered data; —said service provider server which is adapted to: —receive from said identity provider server enciphered data of said token; —decipher said enciphered data to extract said data; —said token which is adapted to: —encipher data; and—transmit via said secure messaging channel to said identity provider server said enciphered data.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: June 23, 2020
    Assignee: Thales Dis France SA
    Inventors: Georges Debois, Aline Gouget, Michael Webster
  • Patent number: 10693893
    Abstract: Various methods for detecting a man-in-the-middle (MITM) during HTTPS communications are disclosed including, in some aspects, establishing a TCP connection for the retrieval of a web page from a domain name using an alternate IP address that is different from the IP address of the target domain where receipt of the target web page in response to a HTTP GET message indicates that a MITM is present, using a domain name as the SNI in a TLS connection and an alternate domain name in a HTTP GET message where receipt of a target web page of the alternate domain name indicates that a MITM is present, and generating an alternate domain name using a domain generation algorithm and using the generated alternate domain name as the SNI in the TLS message where receipt of a certificate for the generated alternate domain name indicates that a MITM is present.
    Type: Grant
    Filed: January 16, 2018
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventors: Mauro Marzorati, Yaser K. Doleh, Rosa M. Bolger, Juraj Nyiri
  • Patent number: 10693914
    Abstract: Examples disclosed herein relate to alerts for communities of a security information sharing platform. Some examples may enable obtaining a security indicator from a user of a first community of a security information sharing platform that enables sharing of security information among a plurality of communities; including the security indicator in community-based security information associated with the first community, the first security indicator comprising a first observable; sharing the first security indicator with the security information sharing platform; obtaining, from the security information sharing platform, information related to sightings of the first observable; and providing a first alert to the first community based on the information related to the sightings of the first observable.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: June 23, 2020
    Assignee: Micro Focus LLC
    Inventors: Tomas Sander, Nadav Cohen, Brian Frederik Hosea Che Hein, Ted Ross
  • Patent number: 10691818
    Abstract: Disclosed are an information processing method and device and a computer-readable medium.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: June 23, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Na Zhao
  • Patent number: 10686592
    Abstract: A system and method for secure data communication between one or more senders and recipients is disclosed. The system comprising a server including a processor and a memory in communication with the processor, a database in communication with the server, and a user device associated with each sender and receiver including a storage medium configured to access the server via a network. The server is configured to generate a first key on initiating communication between sender and recipient, and assigns the first key to the recipient. A key generator generates a pair of keys and the pair of keys stored in the storage medium. The server performs encryption and decryption of data communicated between one or more senders and receiver via one or more communication modes.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: June 16, 2020
    Assignee: MONKEY SOLUTION LLC
    Inventors: Majid Hatami Aghdam, Navid Bahrami
  • Patent number: 10686596
    Abstract: An interface, through which functionality of a cloud computing infrastructure can be accessed, can create defined endpoints through which such an interface is accessed, with such defined endpoints limiting the functionality accessible through the interface to only allowed functions. An elevate function can, through a secure key exchange protocol, receive appropriate assurances and can, in response, remove the functionality limitations of the endpoint, thereby enabling unfettered access to the cloud computing infrastructure. Such unrestricted access can be limited in duration, which duration can be established in advance, or agreed-upon through the key exchange mechanism.
    Type: Grant
    Filed: March 2, 2018
    Date of Patent: June 16, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Armando Moran Saavedra, Daniel Pravat, Filippo Seracini, Lee Holmes, Alexandru Naparu