Patents Examined by Dereena T Cattungal
-
Patent number: 11616648Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.Type: GrantFiled: July 12, 2022Date of Patent: March 28, 2023Assignee: BlackBerry LimitedInventor: Daniel Richard L. Brown
-
Patent number: 11609983Abstract: A system, a method, and a program for providing a virtual code, a virtual code generating device, and a virtual code verifying device are provided. The method includes receiving, by a virtual code verifying means, a virtual code from a virtual code generating means, extracting, by the virtual code verifying means, a plurality of detailed codes included in the virtual code, and searching for, by the virtual code verifying means, a storage location of a real code based on the plurality of detailed codes.Type: GrantFiled: May 6, 2022Date of Patent: March 21, 2023Assignee: SSenStone Inc.Inventor: Chang Hun Yoo
-
Patent number: 11606197Abstract: This disclosure relates to method and system for encrypting and decrypting a facial segment in an image with a unique server key. The method includes receiving an image from one of a plurality of users. The image includes a plurality of facial segments. The method further includes, for each facial segment from the plurality of facial segments, identifying a unique user associated with the facial segment using a facial recognition algorithm, encrypting the facial segment with a unique server key, generating a protection frame, unlockable with the unique server key, to cover the facial segment, and decrypting the facial segment while rendering the image for at least one of the plurality of users upon receiving the unique server key from the at least one of the plurality of users.Type: GrantFiled: July 26, 2020Date of Patent: March 14, 2023Assignee: HCL Technologies Italy S.p.A.Inventors: Antonio Secomandi, Viviana Tripodi
-
Patent number: 11606214Abstract: A plurality of byte ranges forms a sample for content output from a player device, and includes at least one double-encrypted byte range. The plurality of byte ranges is stored in a secured memory, and the at least one double-encrypted byte range is partially decrypted to generate at least one decrypted singe-encrypted byte range. The plurality of byte ranges is stored in an unsecured memory using the at least one decrypted single-encrypted byte range in place of the at least one double-encrypted byte range.Type: GrantFiled: January 27, 2021Date of Patent: March 14, 2023Assignee: Western Digital Technologies, Inc.Inventors: David Blankenbeckler, Nikola Kolarovic, Ninoslav Zmukic, Tihomir Andjelic
-
Patent number: 11606354Abstract: An unlock method and system for an air-conditioning unit. The unlock system includes: a display apparatus; an input apparatus; and a control apparatus in communication with the display apparatus and the unlock system is configured to perform the following operations: generating a dynamic graphic according to at least an identification code and an update code; generating an unlock password according to at least a certificate, the identification code and the update code; receiving an unlock password through the input apparatus; comparing the unlock password received from the input apparatus with the generated unlock password; and granting a corresponding permission if the acquired unlock password is consistent with the generated unlock password.Type: GrantFiled: February 25, 2020Date of Patent: March 14, 2023Assignee: CARRIER CORPORATIONInventors: Liang Qian, Christophe Lecouvreur, Arun Kumar Bakurupanda, Shariq Suhail Mohammad, Satish Nalla, Phani Pavan Kumar Mangaiahgari, Hong Zhang
-
Patent number: 11599678Abstract: A method for ensuring integrity of data sent by a vehicle V2X communication device to a control module to ensure operational safety, including: receiving data transferred by vehicle-to-X communication by a first computing apparatus of the V2X communication device, storing the data in a data memory, forwarding the data to a second computing apparatus, receiving the data by the second computing apparatus, establishing whether an action is to be triggered for the data and, in response, transmitting the data to a comparison apparatus, carrying out a comparison test for the data provided by the second computing apparatus with the data stored in the data memory and, in response to the test being passed, outputting the data and/or a control instruction and/or a warning message by the V2X communication device to a control module. Furthermore, a corresponding vehicle-to-X device and the use of the device in a vehicle are disclosed.Type: GrantFiled: September 18, 2019Date of Patent: March 7, 2023Assignees: CONTINENTAL TEVES AG & CO. OHG, CONTINENTAL AUTOMOTIVE SYSTEMS, INC.Inventors: Marc Menzel, Ulrich Stählin
-
Patent number: 11582045Abstract: A server can record (i) a first digital signature algorithm with a first certificate, and a corresponding first private key, and (ii) a second digital signature algorithm with a second certificate, and a corresponding second private key. The server can select first data to sign for the first algorithm and the first private key in order to generate a first digital signature. The server can select second data to sign, wherein the second data to sign includes at least the first digital signature. The server can generate a second digital signature for the second data to sign using the second algorithm and the second private key. The server can transmit a message comprising (i) the first and second certificates, and (ii) the first and second digital signatures to a client device. Systems and methods can concurrently support the use of both post-quantum and classical cryptography to enhance security.Type: GrantFiled: June 1, 2021Date of Patent: February 14, 2023Inventor: John A. Nix
-
Patent number: 11574043Abstract: In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that includes a whitelist of permitted processes on the controller, the whitelist including (i) signatures for processes that are authorized to be executed and (ii) context information identifying permitted controller contexts within which the processes are authorized to be executed; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the determined signature with a verified signature for the particular process from the whitelist; identifying, by the security layer, a current context for the controller; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the current context with one or more permitted controller contexts for the particular process from the whitelist.Type: GrantFiled: July 13, 2021Date of Patent: February 7, 2023Assignee: Karamba Security Ltd.Inventors: Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai
-
Patent number: 11558357Abstract: A host processing device (“host”) instructs a plurality of data processing (DP) accelerators to configure themselves for secure communications. The host generates an adjacency table of each of the plurality of DP accelerators (“DPAs”). The host is communicatively coupled to the plurality of DPAs via a switch. The host transmits, to the switch, a list of the DPAs and instructs the switch to generate an adjacency table of the DPAs that includes a unique identifier of each DPAs and a communication port of the switch associated with the DPA. The host establishes a session key communication with each DPA and sends the DPA a list of other DPAs that the DPA is to establish a session key with, for secure communications between the DPAs. The DPA establishes a different session key for each pair of the plurality of DPAs.Type: GrantFiled: November 22, 2019Date of Patent: January 17, 2023Assignees: BAIDU USA LLC, KUNLUNXIN TECHNOLOGY (BEIJING) COMPANY LIMITEDInventors: Yong Liu, Yueqiang Cheng
-
Patent number: 11558184Abstract: Provided herein are systems, devices and methods for opening a connection in a gateway of a cloud based network for a client device connected via two different network links to the gateway and to a Software Defined Perimeter (SDP) controller of a cloud based network. The SDP controller may receive a request from a client device to connect to a gateway of the cloud based network, generate a one-time SPA key for the client device (after authenticated), transmit the SPA key to the gateway, and transmit, via the first network link, the SPA key to the client device. The client device may transmit the SPA key to the gateway via the second network link and the gateway may be configured to open a connection for the client device via the second network link in case the SPA key is valid.Type: GrantFiled: August 9, 2020Date of Patent: January 17, 2023Assignee: Perimeter 81 LTDInventors: Amit Bareket, Sagi Gidali
-
Patent number: 11552790Abstract: A host processing device instructs a plurality of data processing (DP) accelerators to configure themselves for secure communications. The host device generates an adjacency table of each of the plurality of DP accelerators. Then the host device then establishes a session key communication with each DP accelerator and sends the DP accelerator a list of other DP accelerators that the DP accelerator is to establish a session key with, for secure communications between the DP accelerators. The DP accelerator establishes a different session key for each pair of the plurality of DP accelerators. When all DP accelerators have established a session key for communication with other DP accelerators, according to the respective list of other DP accelerators sent by the host device, then the host device can assign work tasks for performance by a plurality of DP accelerators, each communicating over a separately secured communication channel.Type: GrantFiled: November 22, 2019Date of Patent: January 10, 2023Assignees: BAIDU USA LLC, KUNLUNXIN TECHNOLOGY (BEIJING) COMPANY LIMITEDInventors: Yong Liu, Yueqiang Cheng
-
Patent number: 11533297Abstract: One embodiment of the present invention includes a server machine configured to establish a secure communication channel with a client machine via renewable tokens. The server machine receives a plurality of messages from a client machine over a secure communication channel, where the plurality of messages includes a first message that includes at least two of user authentication data, entity authentication data, first key exchange data, and encrypted message data. The server machine transmits, to the client machine, a second message that includes a master token comprising second key exchange data associated with the first key exchange data and at least one of a renewal time and an expiration time.Type: GrantFiled: October 22, 2015Date of Patent: December 20, 2022Assignee: NETFLIX, INC.Inventors: James Mitchell Zollinger, Wesley Miaw
-
Patent number: 11526603Abstract: Disclosed herein is a system that implements a model for automatic discovery and identification of a person who is most relevant to handle a notification generated for a resource based on a triggered event. The model accesses an activity log for the resource to identify operations that are relevant to a type of the event. The operations are performed by different users (e.g., owners of the shared resource). The model then calculates an operation relevance score for each of the operations and a user relevance score for each of the different users. The user relevance scores are used to identify a most relevant person from the different users. Contact information for the most relevant person (e.g., name, email address, phone number) is added to the notification so that a person that first views the notification can efficiently forward the notification to the person best positioned to deal with the event.Type: GrantFiled: March 30, 2020Date of Patent: December 13, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Michael Makhlevich, Andrey Karpovsky, Tomer Rotstein
-
Patent number: 11487856Abstract: A mechanism is provided for enhancing security access to a data processing system. Responsive to authenticating a first factor of the multi-factor authentication by matching a scanned fingerprint/thumbprint of a user to at least one previously scanned fingerprint/thumbprint in a set of previously scanned fingerprints/thumbprints, a determination is made as to whether a touch pressure level exerted by the user on a touch pressure sensor associated with the data processing system matches at least one previously stored touch pressure level in a set of previously stored touch pressure levels. Responsive to matching the touch pressure level exerted by the user to a previously stored touch pressure level in the set of previously stored touch pressure levels, a second factor of the multi-factor authentication is authenticated. Access is then granted for the user to the data processing system.Type: GrantFiled: November 16, 2017Date of Patent: November 1, 2022Assignee: International Business Machines CorporationInventors: Song Bai, Xiang Cai, Xue Mei Deng, Lu Huang, Yang Liang, Yin Qian
-
Patent number: 11475104Abstract: A verification system, includes: an arithmetic/logic unit (“ALU”) to perform one or more mathematical operations and compare selected variables; a register to hold a value from a comparison of selected variables performed by the ALU; an instruction decoder to provide read and write commands to memory; an address bus to provide an address to memory for a read or write operation; and a data bus to provide or access data for a write or read operation to or from memory, wherein the ALU generates and provides a recipient identifier to a target computational device, the recipient identifier being related to an identity of the target computational device and/or a target device human operator, and write the recipient identifier to memory in response to a write command issued by the instruction decoder and, as a part of a transaction, the ALU receives, from a user computational device of a first user, the recipient identifier and a credential of the first user and/or user computational device, compares each of the recType: GrantFiled: July 9, 2019Date of Patent: October 18, 2022Assignee: ZACT INC.Inventor: John K. Thomas
-
Patent number: 11463262Abstract: Various embodiments are generally directed to providing authentication and confidentiality mechanisms for message communication over an in-vehicle network. For example, authentication data associated with a communicating node may be transmitted over the network by encoding different predefined voltage levels on top of the message bits of the message being communicated. Different voltage levels may represent different encodings, such as a bit-pair or any bit combination of the authentication data. In a further example, messaging confidentiality between at least two communicating nodes may be achieved by pseudo-randomly flipping, or scrambling, the dominant and recessive voltages of the entire message frame at the analog level based on a pseudo-random control bit sequence.Type: GrantFiled: December 19, 2019Date of Patent: October 4, 2022Assignee: INTEL CORPORATIONInventors: Marcio Juliato, Shabbir Ahmed, Christopher Gutierrez, Xiruo Liu, Manoj Sastry, Liuyang Yang
-
Patent number: 11461447Abstract: A device and method providing audio-based, continuous authentication of a user to provide access to a processing device. A user echoprint model is created while a user interacts with an authentication interface for another authentication method of the device, transparently to the user. The sound waves are user-specific and inaudible. The user-specific sounds are reflected by the user and used to construct an echoprint which can be compared by a previously constructed user-specific, echoprint model. If the result is positive, access to the processing device may be allowed. Access to the processing device is based on the audio authentication or the alternative authentication is based on the result of audio authentication and updates a device state indicating whether the display is on or off and whether the device is locked or unlocked.Type: GrantFiled: November 25, 2020Date of Patent: October 4, 2022Assignee: Futurewei Technologies, Inc.Inventors: Changzhu Li, Shuang Wu
-
Patent number: 11451561Abstract: In one embodiment, a device obtains execution records regarding executions of a plurality of binaries. The execution records comprise command line arguments used during the execution. The device determines measures of similarity between the executions of the binaries based on their command line arguments. The device clusters the executions into clusters based on the determined measures of similarity. The device flags the command line arguments for a particular one of the clusters as an indicator of compromise for malware, based on at least one of the binaries associated with the particular cluster being malware.Type: GrantFiled: September 14, 2018Date of Patent: September 20, 2022Assignee: Cisco Technology, Inc.Inventors: Jan Jusko, Danila Khikhlukha, Harshit Nayyar
-
Patent number: 11424924Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.Type: GrantFiled: October 13, 2020Date of Patent: August 23, 2022Assignee: BlackBerry LimitedInventor: Daniel Richard L. Brown
-
Patent number: 11411773Abstract: Methods, computer-readable media and devices are disclosed for storing content from an endpoint device in a network cache. For example, a processor receives a security policy for the endpoint device defining a type of content for storing in the network cache, and determines that traffic from the endpoint device includes content of the content type for storing in the network cache. When it is determined that the traffic includes the content of the content type for storing in the network cache, the processor instantiates the network cache, stores the content in the network cache, and sends a notification to a designated device. The notification includes at least one parameter associated with the content. The processor further receives a decision from the designated device and performs a task regarding the content in response to the decision.Type: GrantFiled: June 29, 2020Date of Patent: August 9, 2022Assignees: AT&T Intellectual Property I, L.P., AT&T Mobility II LLCInventors: Erie Lai Har Lau, Sangar Dowlatkhah, Thomas J. Will