Patents Examined by Hee K Song
  • Patent number: 11238165
    Abstract: A method performed by at least one computer processor, the method comprising: obtaining an original file to be encrypted; encrypting header data of the original file to obtain encrypted header data, the header data comprising metadata of the original file; storing the encrypted header data; recording, to correspond to a file identifier of the original file, a first storage path of the encrypted header data; partitioning file data other than the header data in the original file, into segments; storing the segments in a disordered fragment sequence; and recording, to correspond to the file identifier, second storage paths of the segments along with an actual sequence of the segments in the original file.
    Type: Grant
    Filed: September 4, 2018
    Date of Patent: February 1, 2022
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Wei Bin Ke, Zhi Yong Lai, De Cong Zhen
  • Patent number: 11238184
    Abstract: The present invention relates to a vehicle control unit that includes a microcontroller unit, a sealing controller unit including a memory for storing a validity state, an electrical connector configured to couple the microcontroller unit to the sealing controller unit, and a housing enclosing the microcontroller unit, the sealing controller unit, and the electrical connector. The microcontroller unit is configured to determine the validity state of the sealing controller unit via the electrical connector, and the sealing controller unit is configured to detect a mechanical change to the housing and to change the validity state when such a mechanical change is detected.
    Type: Grant
    Filed: July 24, 2019
    Date of Patent: February 1, 2022
    Assignee: Aptiv Technologies Limited
    Inventors: Aurelien Hars, Matthias Rieke
  • Patent number: 11238138
    Abstract: A device for validating authorization key obfuscation in a continuous integration (CI) pipeline codebase is presented. The device comprises a transceiver, one or more memories, and one or more processors interfacing with the transceiver and the one or more memories. The one or more processors are configured to receive an update to the CI pipeline codebase. The update may include an authorization key, which the one or more processors store in the one or more memories. The one or more processors may perform a build process to integrate the update into the CI pipeline codebase. The build process may include an obfuscation, which creates an obfuscated CI pipeline codebase. The one or more processors may also scan the obfuscated CI pipeline codebase to determine a presence or an absence of the authorization key.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: February 1, 2022
    Assignee: BLUEOWL, LLC
    Inventor: Marco Ancheta
  • Patent number: 11218309
    Abstract: An onboard device transfers an encrypted message encrypted outside a vehicle to one or more vehicle controllers connected to a vehicle network. When the encrypted message is an individual message to one of the vehicle controllers, the onboard device transmits the encrypted message to the one of the vehicle controllers via the vehicle network. When the encrypted message is a common message to the one or more vehicle controllers, the onboard device decrypts the encrypted message using an encryption key owned by the onboard device and then transmits the decrypted message to the one or more vehicle controllers via the vehicle network.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: January 4, 2022
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Masashi Nakagawa
  • Patent number: 11204985
    Abstract: Systems, methods, and storage media for rendering target code are disclosed. Exemplary implementations may: receive the input code; apply at least one obfuscation transformation to multiple code functions of the input code to create transformed code including transformed code functions; determine a shared constant; determine a function-expression; and replace, for each transformed code function in the transformed code, the transformation parameters with the function expression and the at least one cloaked constant to create target code in which the transformed code functions are entangled to thereby render the target code protected against static analysis attacks.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: December 21, 2021
    Assignee: Irdeto Canada Corporation
    Inventors: Damon Peng, Grant Goodes
  • Patent number: 11206543
    Abstract: A method includes monitoring data security events on mobile computing devices and positions of the mobile computing devices when the plurality of data security events occurred. A plurality of demographic information of the plurality of geographic positions are determined and a classifier is trained based on the data security events and demographic information. A particular mobile computing device is determined to be located at a particular geographic location and particular demographic information of the particular geographic location is determined. The classifier is applied to the particular demographic information and a particular security risk prediction of the particular geographic location is generated. A particular security measure is activated on the particular mobile computing device based on the particular security risk prediction.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: December 21, 2021
    Assignee: Avast Software s.r.o.
    Inventors: Juyong Do, Rajarshi Gupta, Ond{hacek over (r)}ej Vl{hacek over (c)}ek
  • Patent number: 11201748
    Abstract: A tracking device can use a permanent encryption key pair to encrypt one or more temporary encryption key pairs, which can then be provided to a central tracking system. When a community mobile device subsequently detects the tracking device, the central tracking system provides an encrypted temporary encryption key pair to the community mobile device. The community mobile device uses the encrypted temporary encryption key pair to encrypt location data representative of a location of the community mobile device, and provides the encrypted location data to the central tracking system. When a user subsequently requests a location of the tracking device from the central tracking system, the central tracking system provides the encrypted location data, and a device of the user can decrypt the encrypted temporary encryption key pair using the permanent encryption key pair, and can decrypt the location data using the decrypted temporary encryption key pair.
    Type: Grant
    Filed: August 20, 2019
    Date of Patent: December 14, 2021
    Assignee: Tile, Inc.
    Inventors: Rafael Marques Martins, Steven R. Klinkner, Josselin de la Broise, Ian Thomas Meyer
  • Patent number: 11194919
    Abstract: An example operation may include one or more of receiving a request for access to data of a user, the request comprising an identification of a requestor and an identification of the data, determining, via a cognitive engine, whether or not to provide access to the data of the user based on context associated with the user, in response to determining to provide access to the data of the user, invoking chaincode which retrieves access to the data of the user from a blockchain and provides the requestor with access to the data of the user, and storing a result of the determination by the cognitive engine via the blockchain.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: December 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jignesh K. Karia, Michael Edward Alexander, Debojyoti Das, Deepa Dubey, Jitan Chandanani, Dipayan Ghosh, Steven Layne Canepa
  • Patent number: 11196716
    Abstract: A method, system, and recording medium for communication comparison including communicating from a first device to a second device by the second device reading frequencies and intensities of light projected, by the first device, on an object.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: December 7, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Nicholas Stephen Kersting
  • Patent number: 11188670
    Abstract: Systems, methods, and devices for generating a secure join of database data are disclosed. A method includes determining data stored in a first account to be compared with data stored in a second account. The method includes determining a function for generating a secure join key, wherein the secure join key includes a hashed string that hashes one or more of a data entry of the first account and a data entry of the second account. The method includes providing the secure join key to the first account and/or the second account.
    Type: Grant
    Filed: March 28, 2019
    Date of Patent: November 30, 2021
    Assignee: Snowflake Inc.
    Inventors: Justin Langseth, Matthew J. Glickman, Christian Kleinerman, Robert Muglia, Daniel Freundel, Thierry Cruanes, Allison Waingold Lee
  • Patent number: 11183083
    Abstract: Some embodiments are directed to a cryptographic device, including a non-volatile memory, a range of the memory storing data, a selector arranged to receive a selector signal configuring a memory read-out unit for a regular read-out mode or for a PUF read-out mode of the same memory, a control unit arranged to send the selector signal to the selector configuring the memory read-out unit in the regular read-out mode, and reading the memory range to obtain the data, and send the selector signal to the selector configuring the memory read-out unit for PUF read-out mode and obtaining a noisy bit string from the memory range.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: November 23, 2021
    Assignee: INTRINSIC ID B.V.
    Inventors: Geert Jan Schrijen, Pim Theo Tuyls
  • Patent number: 11184177
    Abstract: A method and system for securing in-vehicle ethernet links are disclosed. According to one embodiment, a method comprises receiving from an authenticator, via an insecure channel, a public key of the authenticator, a random number, and a challenge. A private key of the peer that was supplied to the peer is accessed from local storage at the peer. A state machine computes a session key for the peer, based on the random number, the public key of the authenticator, and the private key of the peer. The state machine computes a peer response to the challenge using the session key for the peer and a symmetric cipher function.
    Type: Grant
    Filed: August 6, 2019
    Date of Patent: November 23, 2021
    Assignee: SYNAPTICS INCORPORATED
    Inventors: Guy Hutchison, Zubin Shah, Kamal Dalmia
  • Patent number: 11184160
    Abstract: Aspects of the invention include channel key loading of a host bus adapter (HBA) based on a secure key exchange (SKE) authentication response by a responder node of a computing environment. A non-limiting example computer-implemented method includes receiving an authentication response message at an initiator channel on an initiator node from a responder channel on a responder node to establish a secure communication, the receiving at a local key manager (LKM) executing on the initiator node. A state check is performed based on a security association of the initiator node and the responder node. A validation of the authentication response message is performed. An identifier of a selected encryption algorithm is extracted from the authentication response message. The initiator channel requests to communicate with the responder channel based at least in part on a successful state check, a successful validation, and the selected encryption algorithm.
    Type: Grant
    Filed: February 26, 2020
    Date of Patent: November 23, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mooheng Zee, Richard Mark Sczepczenski, John R. Flanagan, Christopher J. Colonna
  • Patent number: 11178170
    Abstract: The disclosed computer-implemented method for detecting anomalous behavior within computing sessions may include (i) identifying, by the computing device, a set of execution events that correspond to a computing session, (ii) providing, by the computing device, the set of execution events as input to an autoencoder, (iii) receiving, by the computing device and from the autoencoder, a reconstruction error associated with autoencoding the set of execution events, (iv) detecting, by the computing device and based on the reconstruction error, an anomaly within the computing session, and (v) performing, by the computing device, a security action to address the anomaly within the computing session. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: November 16, 2021
    Assignee: CA, Inc.
    Inventors: Aditya Kuppa, Slawomir Grzonkowski, Sidharth Pipriya
  • Patent number: 11177933
    Abstract: A method for side-channel attack mitigation in streaming encryption includes reading into a decryption process executing in memory of a computer, an input stream and extracting from the input stream both an encryption envelope and cipher text and extracting from the encryption envelope, a wrapped key. Then, decryption may be performed in constant time of the cipher text using one of two different keys, a first for authenticated decryption comprising the wrapped key, and a second for unauthenticated encryption comprising a dummy key, with no difference in timing of execution regardless of which of the two different keys are utilized during decryption of the cipher text.
    Type: Grant
    Filed: March 24, 2019
    Date of Patent: November 16, 2021
    Assignee: Google LLC
    Inventor: Adam Markowitz
  • Patent number: 11170102
    Abstract: The innovation disclosed and claimed herein, in one or more aspects thereof, illustrates systems and methods for providing a technical control to a technically pervasive problem of inadvertent capture of items in a computing environment, returning control of what happens to such items in technical environments that have become widespread and intrusive. The innovation provides a system for users to control the types of items that pervasive computing environment elements may process without their express control with technical countermeasures in a relatively unobtrusive manner.
    Type: Grant
    Filed: February 13, 2019
    Date of Patent: November 9, 2021
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Nilotpol Bhattacharya, Priyankant Singh, Satish Babu S N
  • Patent number: 11171955
    Abstract: A system on a chip (SoC) includes memory, a processor coupled to the memory, and link protection circuitry coupled to the memory and the processor. The link protection circuitry includes an SoC encryption engine to receive first data from the memory and a first key, generate, by an SoC encryption counter of the SoC encryption engine, an SoC encryption counter value, encrypt the first data using the SoC encryption counter value and the first key to generate first encrypted data, and cause the first encrypted data to be transmitted to a device including a device decryption counter synchronized with the SoC encryption counter.
    Type: Grant
    Filed: March 11, 2019
    Date of Patent: November 9, 2021
    Assignee: Intel Corporation
    Inventors: Vedvyas Shanbhogue, Siddhartha Chhabra
  • Patent number: 11157598
    Abstract: A method for executing a trusted execution environment (TEE) based application in a cloud includes receiving, by a proxy, a request from a client, requesting, by the proxy from an attestation service, attestation, and sending, by the proxy to the client, a result of the attestation.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: October 26, 2021
    Assignee: NEC CORPORATION
    Inventors: Claudio Soriente, Ghassan Karame, Wenting Li
  • Patent number: 11159490
    Abstract: Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that utilize a reverse tunnel proxy in a cloud environment. The reverse tunnel proxy in a cloud environment automatically discovers its environment and creates an appropriate tunnel without using a public IP. The reverse tunnel proxy in a cloud environment utilizes an outgoing connection along with an initialization and channelization to connect to the cloud and accepts an incoming connection in response. In embodiments, a cloud initiates a connection and a tunnel is created without need for additional IP addresses. In embodiments, the reverse tunnel proxy in a cloud environment connects to a client as a server and a private key is stored at a server side without pushing private keys into a public environment.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: October 26, 2021
    Assignee: F5 NETWORKS, INC.
    Inventors: Joel Benjamin Moses, Steven Dabell, William Ross Baumann, Timothy Scott Michels
  • Patent number: 11151245
    Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: October 19, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Lei Liu, Ning Ge, Steven J. Simske, Helen A. Holder