Patents Examined by David J. Pearson
-
Patent number: 12081971Abstract: This application provides a key information synchronization method and system, and a device, and relates to the field of communications technologies. The method includes: A terminal sends a first public key of the terminal to an IoT device; the terminal obtains a second public key of the IoT device from the IoT device; the terminal sends first key information to a hub device, where the first key information includes a first private key of the terminal, the first public key, and the second public key; the hub device uses the first private key and the first public key in the first key information as a key pair of the hub device; and the hub device performs encrypted interaction with the IoT device by using the first key information.Type: GrantFiled: November 27, 2020Date of Patent: September 3, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Shaolin Huang
-
Patent number: 12072971Abstract: Disclosed embodiments provide systems and methods that can be used as part of or in combination with autonomous navigation, autonomous driving, or driver assist technology features. As opposed to fully autonomous driving, driver assist technology may refer to any suitable technology to assist drivers in the navigation or control of their vehicles. In various embodiments, the system may include one or more cameras mountable in a vehicle and an associated processor that monitors the environment of the vehicle. In further embodiments, additional types of sensors can be mounted in the vehicle and can be used in the autonomous navigation or driver assist systems. These systems and methods may include the use of a shared cache that is shared by a group of processing units to improve analysis of images captured by the one or more cameras.Type: GrantFiled: October 13, 2021Date of Patent: August 27, 2024Assignee: Mobileye Vision Technologies Ltd.Inventors: Eran Ben-Avi, Leonid Smolyansky
-
Patent number: 12056227Abstract: Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.Type: GrantFiled: May 22, 2023Date of Patent: August 6, 2024Assignee: COMCAST CABLE COMMUNICATIONS, LLCInventors: Andrew Antar, Asad Haque
-
Patent number: 12052369Abstract: A method includes: generating a hash tree representing a structured data object including a data unit, the hash tree including a root hash and a data unit hash representing the data unit; submitting a first transaction to a distributed network, the first transaction configured to generate a blockchain object including the root hash, the blockchain object configured to generate an announcement representing membership of the data unit hash in the hash tree; and submitting a second transaction to the distributed network, the second transaction configured to trigger the blockchain object to generate the announcement based on a proof of inclusion of the data unit hash within the hash tree.Type: GrantFiled: October 14, 2022Date of Patent: July 30, 2024Assignee: Chia Network, Inc.Inventors: Kenneth K. Griggs, Bram Cohen
-
Patent number: 12045355Abstract: A system includes a protected memory, and a processor, operatively coupled to the protected memory, to perform operations including receiving, from a secrets and service provider system via a brokering agent, an encrypted version of a set of secrets data corresponding to a target state of the device, in response to receiving the encrypted version of the set of secrets data, requesting, from the secrets and service provider system via the brokering agent, permission to transition to the target state, receiving, from the secrets and service provider system via the brokering agent, permission to transition to the target state, and in response to receiving permission to transition to the target state, storing the set of secrets data in the protected memory to complete the transition to the target state.Type: GrantFiled: September 29, 2021Date of Patent: July 23, 2024Assignee: BlockFrame, Inc.Inventor: Christopher Paul Gorog
-
Patent number: 12041180Abstract: Digital signatures are generated for a message using an authentication tree data structure in which nodes are created as needed from a root node. A public and secret key pair is generated using a one-time signature method to form each node, and the secret key of each parent node is used to sign the public keys of its child nodes. Once the secret key of a node has been used in creating a signature for a message, it may be revealed. The signature data structure is unbounded and stateless, and need not be pre-generated and fixed.Type: GrantFiled: February 10, 2022Date of Patent: July 16, 2024Assignee: Guardtime SAInventors: Denis Firsov, Henri Lakk
-
Patent number: 12028714Abstract: For validation of wireless signals, a wireless receiver receives a validation signal that includes information from a target signal. By using digital signature, message authentication code (MAC), and/or hashing, the validation signal is verified to be from a trusted source. By comparing the information from the verified validation signal with the target signal, the target signal is confirmed to be genuine or not a spoofing signal. In one approach, the validation signal is provided from a different transmission source than the target signal. In another approach, modulation estimation rather than known modulation is used as the information for the validation signal for comparison with the target signal despite not knowing the spread pattern of the coding. In yet another approach, a one-way function is used to generate a pseudorandom code to spread a first component of the a first signal below the noise floor. The input to the one-way function is a second component sent at a time later than the time.Type: GrantFiled: August 2, 2021Date of Patent: July 2, 2024Assignee: Satelles, Inc.Inventors: Gregory Gutt, Tim Flynn, Trevor Landon, David G. Lawrence, Michael L. O'Connor, Rachel Schmalzried
-
Patent number: 12020010Abstract: In some examples, a system receives first measurements of data items used by a build server in building an executable program, the data items copied from a data repository to a storage partition that is separate from the data repository, and the storage partition to store the data items relating to building the executable program by the build server. The system determines, based on the first measurements and according to a policy specified for the storage partition, whether a corruption of the data items used by the build server in building the executable program has occurred.Type: GrantFiled: August 10, 2021Date of Patent: June 25, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Nigel John Edwards, Guilherme de Campos Magalhaes
-
Ahead of time application launching for cybersecurity threat intelligence of network security events
Patent number: 12019754Abstract: Systems, methods, and computer-readable storage devices are disclosed for improve cybersecurity intelligence by launching applications ahead of time. One method including: receiving, over a communications network, at least one threat model; determining whether a performance of an orchestrated response is triggered based on the at least one threat model, wherein the orchestrated response includes a plurality of applications to be executed in a predetermined sequence; and launching, when the performance of the orchestrated response is triggered, a first application and a second application of the plurality of applications of the orchestrated response, wherein the second application executes after execution of the first application has completed execution.Type: GrantFiled: August 6, 2021Date of Patent: June 25, 2024Assignee: ThreatConnect, Inc.Inventor: Danny Tineo -
Patent number: 12021971Abstract: A method is presented for secure determination of a solution (S) to a computational task by a pooled resource or group having a plurality of participants (P), the group operating in a trust-less, or dealer-free, system or manner. Access to a resource or reward is offered in exchange for the solution. Individuals generate their own key pair and use their public key to establish with the group an initial shared public key that they can all use to find a solution to the task. The resource or reward can be secured by the verified shared public key. Because the private keys of each participant were used in the determination of the initial shared public key that lead to the solution then participants must then collaborate to unlock the resource or reward because the corresponding shared private key can only be generated by all participants or a pre-agreed threshold of participants.Type: GrantFiled: September 1, 2022Date of Patent: June 25, 2024Assignee: nChain Licensing AGInventor: Thomas Trevethan
-
Patent number: 12022015Abstract: One variation of a method for secure and distributed timekeeping includes: at a node in a set of nodes in a network, at a first time, sampling two time sources and calculating a minor consensus time between the two time sources; in response to designation of the node as a leader node, accessing a second minor consensus time generated by a second node, accessing a third minor consensus time generated by a third node, calculating a first major consensus time between the first, second, and third minor consensus times, and distributing a request to validate the first major consensus time; and, based on validation of the request from a threshold quantity of nodes, cryptographically hashing a hash of a previous block and the major consensus time to generate a first block and distributing the first block to each node in the set of nodes.Type: GrantFiled: July 29, 2022Date of Patent: June 25, 2024Assignee: D4D GroupInventor: Ken Yamada
-
Patent number: 12021890Abstract: A method, apparatus, and system for a smart space rating service (106) are provided. A method includes receiving, from a user device (104a, 104b), a request for a security rating of a smart space (102), calculating the security rating of the smart space (102) based at least in part on security information regarding the smart space (102), the security information received from a plurality of user devices (104a, 104b), and transmitting the security rating of the smart space (102) to the user device (104a, 104b).Type: GrantFiled: June 23, 2022Date of Patent: June 25, 2024Assignee: DRNC Holdings, Inc.Inventors: Antti V. P. Evesti, Pia E. Raitio, Pekka P. Savolainen
-
Patent number: 12021900Abstract: An access policy analysis system may use stored policy summaries to efficiently perform access analysis. A request that causes an access analysis of an entity in a cloud service provider with respect to a resource hosted in the cloud service provider may be received. An access policy summary generated for the entity based on a set of access policies applied by an access management system of the cloud service provider may be obtained. An access policy summary generated for the resource based on the set of access policies may be obtained. A tree structure that describes a hierarchy of entities in the cloud service provider may be traversed to identify a parent node of the entity in the hierarchy of entities. The access analysis may then be generated based on the access policy summaries for the identified node in the tree structure, for the entity and for the resource.Type: GrantFiled: December 6, 2021Date of Patent: June 25, 2024Assignee: Rapid7, Inc.Inventors: Matthew Gladney, Elizabeth Prescott, Niluka Bamunuarachchige, Leonardo Colmenares, James Martin, Peter Snelgrove, Nadia Mounzih
-
Patent number: 12008144Abstract: Provided is a method and a system for the tamper-proof storage of information about object-related measures which are contained as transactions in transaction blocks that are interlinked in a transaction block chain of the object to which the measures relate, the transaction block chain being stored in an object data memory allocated to the object.Type: GrantFiled: January 4, 2018Date of Patent: June 11, 2024Assignee: SIEMENS AKTIENGESELLSCHAFTInventor: Rainer Falk
-
Patent number: 11995223Abstract: This disclosure relates to data storage device (DSD) hardware and, more specifically, to systems and methods for encrypting data stored on a DSD. A DSD comprises a non-volatile storage medium to store multiple file system data objects using block addressing. A device controller is integrated with the DSD and comprises hardware circuitry configured to encrypt data to be stored on the storage medium. The controller receives a request for an encrypted file system data object from a host computer system, identifies one of the ranges of blocks where the requested encrypted file system data object is stored on the storage medium, and sends the file system data object stored in the identified range of blocks to the host computer system in encrypted form as stored on the storage medium.Type: GrantFiled: March 31, 2021Date of Patent: May 28, 2024Assignee: Western Digital Technologies, Inc.Inventor: Matthew Harris Klapman
-
Patent number: 11997213Abstract: Embodiments of the invention enable a distributed ledger system including a network of entities that maintain an electronic ledger that can keep track of information related to events performed by various entities in the network. An operating entity may manage access to the distributed ledger system and may allow certain authorities and users to onboard with the distributed ledger system. A user device may generate a request to include data in the electronic ledger. The user device may generate a cryptogram and send the cryptogram with the request to a reader device, which may initiate a verification process to verify the cryptogram. If the cryptogram is verified, the data from the user device may be sent to one or more authorities so that it can be included in the electronic ledger.Type: GrantFiled: June 23, 2017Date of Patent: May 28, 2024Assignee: Visa International Service AssociationInventor: Quan Wang
-
Patent number: 11979495Abstract: An example apparatus includes a flash memory card that is removably and securely coupled to a host device (e.g., smartphone). When removed, the apparatus facilitates physical and logical air-gapping and secure, “cold” storage of digital assets. In one example, a flash memory card stores computer-executable instructions to determine that a mobile device is authorized to communicate with the flash memory card when the flash memory card is inserted into a memory card slot of the mobile device. If communication is authorized, the instructions can further cause the memory card to establish communication with the mobile device and cause the mobile device to access a digital asset using a key stored on the memory card. The digital asset can be digitally managed in response to receiving user input at the mobile device.Type: GrantFiled: December 5, 2022Date of Patent: May 7, 2024Assignee: OSOM PRODUCTS, INC.Inventors: Jason Sean Gagne-Keats, Gary Anderson
-
Patent number: 11979485Abstract: An electronic device is provided. The electronic device includes a display, and a processor configured to generate at least one hierarchy deterministic path, obtain at least one public key using a root seed and the at least one hierarchy deterministic path, obtain a blockchain address for a blockchain account from the at least one public key, obtain information about the blockchain address from a blockchain network based on the blockchain address, the information about the blockchain address including information about a balance of the blockchain account, and display at least part of the information about the blockchain address through the display, based on the information about the balance of the blockchain account.Type: GrantFiled: August 13, 2020Date of Patent: May 7, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Youna Lee, Sungjin Park, Dohyun Jo, Seungmin Ha, Seongmin Je
-
Patent number: 11973864Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.Type: GrantFiled: February 20, 2023Date of Patent: April 30, 2024Assignee: Network-1 Technologies, Inc.Inventor: John A. Nix
-
Patent number: 11972000Abstract: A method of securely dispersing private user data may include operating a software application configured to utilize user data, receiving the user data, generating a sequence of random bits, and generating a plurality of secret shares from the user data. Generating the plurality of secret shares may include selecting a subset of the user data for each secret share and combining the subset of the user data with the sequence of random bits. The subset of the user data may be a first half of the user data for a first secret share, a second half of the user data for a second secret share, and the whole user data for a third secret share. The method may also include dispersing each of the secret shares.Type: GrantFiled: August 6, 2021Date of Patent: April 30, 2024Inventor: Arash Esmailzadeh