Patents Examined by Evans Desrosiers
-
Patent number: 11290267Abstract: Embodiments of a secure multi-party computation method applicable to any computing node deployed in a distributed network are provided. A plurality of computing nodes is deployed in the distributed network. The plurality of computing nodes jointly participates in a secure multi-party computation based on private data respectively held by the computing nodes. The method includes: generating a computing parameter related to private data held by one computing node based on a secure multi-party computation algorithm; transmitting the computing parameter to other computing nodes participating in the secure multi-party computation for the other computing nodes to perform the secure multi-party computation based on collected computing parameters transmitted by the computing nodes participating in the secure multi-party computation; and creating an audit log corresponding to the computing parameter, the audit log recording description information related to the computing parameter.Type: GrantFiled: May 26, 2021Date of Patent: March 29, 2022Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Lichun Li, Shan Yin, Huazhong Wang, Wenzhen Lin
-
Patent number: 11283764Abstract: Methods and systems are described for compressing a tree structure associating network packet signatures with network packet metadata, the tree structure comprising a plurality of non-leaf nodes of single bit test nodes and a plurality of leaf nodes comprising network packet metadata, the method comprising determining whether the sub-portion of the tree structure is to be compressed. If determination is made that the sub-portion of the tree structure is to be compressed, generating a compressed node data structure, the compressed node data structure comprising a path of the sub-portion of the tree structure, the path comprising a sequence of bits formed by a concatenation of the single bits associated with each one of the consecutive non-leaf nodes of the sub-portion of the tree structure, the number of bits of the sequence being equal or greater than the compression threshold.Type: GrantFiled: August 21, 2019Date of Patent: March 22, 2022Assignee: OVHInventors: Clement Rousseau, Tristan Groleat
-
Patent number: 11275927Abstract: A method for processing an image, a non-transitory computer readable storage medium and an electronic device are provided. The method includes: in response to detecting an image capturing instruction, determining a security of an application operation corresponding to the image capturing instruction; and capturing an image corresponding to a determination result based on the determination result.Type: GrantFiled: November 1, 2019Date of Patent: March 15, 2022Assignee: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.Inventors: Haitao Zhou, Ziqing Guo, Kamwing Au, Fangfang Hui
-
Patent number: 11275846Abstract: Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.Type: GrantFiled: February 16, 2019Date of Patent: March 15, 2022Assignee: Intel CorporationInventors: Ashwin Muppalla, Changliang Wang, Penne Lee
-
Patent number: 11273709Abstract: In some examples, a vehicle head unit of a vehicle includes at least one processor; and at least one module operable to: responsive to authenticating a first user at a vehicle head unit of a vehicle, establish a session with a first user identifier, the first user identifier associated with the first user; responsive to authenticating a second user at the vehicle head unit, associate a second user identifier with the session, the second user identifier associated with the second user, wherein the first and second user identifiers are concurrently associated with the session; generate data while the first and second user identifiers are concurrently associated with the session; and store, based on the first user identifier and the second user identifier, the data to both a first user account associated with the first user identifier and a second user account associated with the second user identifier.Type: GrantFiled: December 16, 2016Date of Patent: March 15, 2022Assignee: GOOGLE LLCInventor: Fabian John Tamp
-
Patent number: 11270011Abstract: A system and method are disclosed for allowing a plurality of augmented and/or virtual reality users to interact with higher dimensional virtual or augmented environment models in which a plurality of objects are placed throughout in a pseudorandom fashion. The placed plurality of objects are subsequently assigned values either in a predetermined or real time manner. The system and method enable security countermeasures, thereby protecting the higher dimensional environmental model from malicious users.Type: GrantFiled: July 21, 2021Date of Patent: March 8, 2022Assignee: 8 BIT DEVELOPMENT INC.Inventors: Eric M. Pilnock, Kenneth E. Irwin, Jr., Michael T. Day, Andrew J. Mound
-
Patent number: 11271918Abstract: Methods and systems for verifying a user's identity on a computing device using two-factor authentication are described. More particularly, the system utilizes a personal identification number input by a user, together with one or more of a secure browsing feature, a device fingerprint, and a token generator to authenticate the user on the computer.Type: GrantFiled: April 20, 2020Date of Patent: March 8, 2022Assignee: UNITED SERVICES AUTOMOBILE ASSOCIATION (USAA)Inventors: Debra Casillas, Richard Andrew Davey, Michael Frank Morris, Maland Keith Mortensen, John David Row, Thomas Buckingham
-
Patent number: 11258780Abstract: Methods and systems for securing a data connection for communicating between two end-points are described herein. One of the end-points may be a server and the other of the end-points may be a client that wants to communicate with the server. The data connection may be secured based on a previously-established secure connection and/or a self-signed or self-issued certificate. In some variations, by using the previously-established secure connection and/or a self-signed or self-issued certificate, the secure communication between the server and the client may be conducted without using a third-party authentication service and without requiring a third-party CA to issue a certificate for the server.Type: GrantFiled: November 26, 2019Date of Patent: February 22, 2022Assignee: Citrix Systems, Inc.Inventors: Julien Brouchier, Andrew David Cooper, Richard James Cooper, Jean-Luc Claude Robert Giraud, Ian Wright, Christopher Morgan Mayers
-
Patent number: 11258761Abstract: A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple sections that each contains a set of firewall rules. Each tenant of the software defined data center has a corresponding set of sections in the firewall configuration. The method allows each tenant to independently access and update/manage its own corresponding set of sections. Multiple tenants or users are allowed to make changes to the firewall configuration simultaneously.Type: GrantFiled: June 29, 2016Date of Patent: February 22, 2022Assignee: NICIRA, INC.Inventors: Kaushal Bansal, Uday Masurekar
-
Patent number: 11251950Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for securely performing cryptographic operations. One of the methods includes receiving biometric information associated with a user and a request to perform one or more cryptographic operations based on one or more cryptographic keys stored in a memory of an identity cryptographic chip (ICC); comparing the biometric information associated with the user with biometric information pre-stored in the memory of the ICC as pre-stored biometric information; and in response to determining that the biometric information matches the pre-stored biometric information, authorizing the one or more cryptographic operations to be performed.Type: GrantFiled: September 30, 2019Date of Patent: February 15, 2022Assignee: Advanced New Technologies Co., Ltd.Inventors: Zhiyuan Feng, Yanpeng Li, Long Cheng
-
Patent number: 11244052Abstract: The host computer securitization architecture, which comprises: an offline source server, an offline provisioning server configured to connect with a portable mobile securitization server via a wired communication, an administration server configured to monitor and interact with at least one portable mobile securitization server, at least one portable mobile securitization server configured to connect via a wired communication to a host computer, said portable mobile securitization server comprising: a connector to mechanically connect and establish a removable wired communication between the mobile server and the host computer, a first wired bidirectional communicator with the host computer, a second of bidirectional communicator with a data storage peripheral or a data network and a unit securing the communication between the host computer and the data storage mobile server or the data network, this communication being established between the first and the second communicator, a blockchain comprisingType: GrantFiled: November 2, 2018Date of Patent: February 8, 2022Inventor: Vladimir Mickael Leal Monteiro
-
Patent number: 11240369Abstract: An approach is disclosed that optically transmit data from a dedicated mobile device (DMD) to another device. Optically transmitting the data is performed by displaying the data on a display screen included in the DMD. The approach further optically receives data at the DMD. The data is received at a digital camera included in the DMD. Based on the exchanged data, the DMD determines if the DMD and the other device are bound to each other.Type: GrantFiled: March 9, 2019Date of Patent: February 1, 2022Assignee: International Business Machines CorporationInventors: Shawn D. Hennessy, Todd P. Seager, Nevenko Zunic
-
Patent number: 11240216Abstract: A network system comprising a first network element and a second network element. The first network element is programmed to provide the step of first, communicating to the second network element a plurality of configuration parameter sets. Each configuration parameter set corresponds to a respective frame fragment and comprises a parameter value that differs in value from the parameter value in another configuration parameter set in the plurality of configuration parameter sets. The first network element also is programmed to provide the step of second, communicating a frame, to the second network element, in a plurality of frame fragments, wherein each frame fragment in the plurality of frame fragments is communicated according to a respective parameter value in the plurality of configuration parameter sets.Type: GrantFiled: December 20, 2019Date of Patent: February 1, 2022Assignee: Texas Instmments IncorporatedInventors: Kumaran Vijayasankar, Mehul Soman, Arvind Kandhalu Raghu, Il Han Kim
-
Patent number: 11228426Abstract: A communication device includes: a counter, a pseudo-random number generator, a symbol generator, a modulator, and a controller. The counter counts symbols transmitted to a correspondent device. The pseudo-random number generator generates a pseudo-random number corresponding to a count value of the counter. The symbol generator generates a transmission symbol from a transmission signal and the pseudo-random number. The modulator generates a modulated signal from the transmission symbol. When a disruption of a communication with the correspondent device is detected, the controller selects, from among a plurality of restoring times determined in advance, a restoring time for resuming the communication, and gives the counter a count value assigned in advance to the selected restoring time. The counter resumes a counting operation from the count value given from the controller when the communication device resumes a communication with the correspondent device.Type: GrantFiled: July 9, 2019Date of Patent: January 18, 2022Assignee: FUJITSU LIMITEDInventors: Shoichiro Oda, Setsuo Yoshida
-
Patent number: 11223640Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.Type: GrantFiled: May 21, 2019Date of Patent: January 11, 2022Assignee: ServiceNow, Inc.Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
-
Patent number: 11218305Abstract: A computer-implemented method includes: receiving, by a platform including one or more computing devices, a blockchain authorization information generation request from a client, in which the blockchain authorization information generation request includes a target blockchain identifier and user information; determining, based on the target blockchain identifier, a target blockchain; determining a blockchain parameter of the target blockchain, in which the blockchain parameter indicates one or more requirements for authorization information used to join the target blockchain; generating blockchain authorization information based on the blockchain parameter and the user information, in which the blockchain authorization information conforms to the one or more requirements; and sending the blockchain authorization information to the client.Type: GrantFiled: April 23, 2021Date of Patent: January 4, 2022Assignee: Advanced New Technologies Co., Ltd.Inventors: Yixiang Zhang, Jun Gu
-
Patent number: 11216536Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.Type: GrantFiled: March 18, 2017Date of Patent: January 4, 2022Assignee: LiveRamp, Inc.Inventors: Arthur Coleman, Martin Rose, Christina Tsz Ling Leung, Michael Anderson
-
Patent number: 11212116Abstract: An information processing apparatus automatically deletes an electronic certificate according to acquisition of another electronic certificate.Type: GrantFiled: June 6, 2018Date of Patent: December 28, 2021Assignee: Canon Kabushiki KaishaInventor: Naoya Kakutani
-
Patent number: 11206138Abstract: An apparatus includes a tester to detect a biological signature of a biological sample, a processor, and a memory operably coupled to the processor. The memory stores instructions to cause the processor to receive an indication of the biological signature from the tester, and to generate, using a smart contract and through communication with a distributed ledger, a cryptographic token including a digital identifier based on the biological signature. The cryptographic token is transmitted to a remote processor for verification of the biological sample, in response to receiving the cryptographic token. The tester can detect the biological signature within a predetermined test duration that is less than a DNA sequencing duration associated with the biological sample, and the biological signature has a data precision sufficient to uniquely identify the biological sample from a plurality of biological samples.Type: GrantFiled: October 16, 2019Date of Patent: December 21, 2021Assignees: Ernst & Young U.S. LLP, EYGS LLPInventors: James C. Canterbury, Shyam Bharat Khatau, Parvez Hakim
-
Patent number: 11196710Abstract: Disclosed are systems and methods for securing a network including one or more network nodes connecting a plurality of network connected devices of the network. A method may include: receiving and temporarily storing a plurality of data packets in a shared buffer of a network node; receiving requests from a first processing engine and a second processing engine to access a temporarily stored data packet; generating a first pointer and a second pointer to the temporarily stored data packet, the second pointer being different from the first pointer while pointing to the same temporarily stored data packet; and enabling the first processing engine to use the generated first pointer to access the temporarily stored data packet and the second processing engine to use the generated second pointer to access the temporarily stored data packet.Type: GrantFiled: February 5, 2021Date of Patent: December 7, 2021Assignee: LookingGlass Cyber Solutions, Inc.Inventors: Paolo Fabio Zaino, Bryan Wesley Brown