Patents Examined by Henry Tsang
-
Patent number: 12153695Abstract: Disclosed is a method of resource encryption and display. The method includes: performing file splitting and local encryption on a pre-downloaded splash screen resource file; calculating a current true time according to a correct time obtained from a server and a device power-on time difference of a client, and determining whether a current device time is reliable according to the true time; and when the current device time is reliable, directly obtaining the splash screen resource file through decryption and splicing, and displaying the splash screen resource file.Type: GrantFiled: June 21, 2022Date of Patent: November 26, 2024Assignee: Shanghai Bilibili Technology Co., Ltd.Inventor: Xingwang Xu
-
Patent number: 12149522Abstract: Techniques are provided for performing user operations by a first system on a second system using user impersonation. One method comprises receiving, by a first system, a log in of a user to the first system and an operation to be performed by a second system; sending an impersonation request, by the first system to the second system, to obtain an impersonated user access token of the given user for the second system; receiving, by the first system from the second system, in response to the impersonation request, the impersonated user access token of the given user; and providing, by the first system to the second system, the operation with the impersonated user access token of the given user, wherein the second system performs the operation based at least in part on a result of an access validation of the impersonated user access token of the given user.Type: GrantFiled: April 27, 2022Date of Patent: November 19, 2024Assignee: Dell Products L.P.Inventors: Shoham Levy, Mirit Sadon, Haim Shalelashvili
-
Patent number: 12141248Abstract: A method is disclosed. The method includes receiving, by a user device, an encrypted message from a server computer. The encrypted message is a message encrypted with a master secret key or a key derived from the master secret key. The user device signs the encrypted message with a secure element private key. The user device, using a whitebox, cryptographically recovers a secure element public key from a certified key using a server computer public key. The certified key is certified by the server computer and based on at least the secure element public key. The user device, using the whitebox, cryptographically recovers the encrypted message from the signed encrypted message using the secure element public key. The user device, using the whitebox, decrypts the encrypted message using the master secret key or the key derived from the master secret key in the whitebox to obtain the message.Type: GrantFiled: May 14, 2021Date of Patent: November 12, 2024Assignee: Visa International Service AssociationInventors: Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven James Watson
-
Patent number: 12143371Abstract: A method including configuring, by an infrastructure device, a first user device to select an encryption key, from among a plurality of encryption keys available to the first user device, for encrypting a metadata key that is utilized to encrypt metadata associated with a file; receiving, by the infrastructure device from the first user device, an encrypted metadata key; transmitting, by the infrastructure device to a second user device, the encrypted metadata key; and configuring, by the infrastructure device, the second user device to select a decryption key, from among a plurality of decryption keys available to the second user device, for decrypting the encrypted metadata key, the decryption key being associated with the encryption key is disclosed. Various other aspects are contemplated.Type: GrantFiled: August 23, 2022Date of Patent: November 12, 2024Assignee: UAB 360 ITInventors: Konstantin Kolganov, Tomas Smalakys
-
Patent number: 12135806Abstract: Token generation and management are disclosed, including: generating a token corresponding to a set of user data based at least in part on a token generation policy; storing a mapping between the token and the set of user data; and determining whether to grant a token resolution request associated with the token based at least in part on a token access policy associated with the token and a context parameter associated with the token resolution request.Type: GrantFiled: March 15, 2023Date of Patent: November 5, 2024Assignee: UserClouds, Inc.Inventors: Vladimir Fedorov, Stephen Garrity, Ramanujan Srinivasan
-
Patent number: 12137160Abstract: A method of scheduling encryption key delivery communication sessions in a satellite quantum key distribution system comprising a constellation of one or more satellites and a plurality of user ground stations comprises producing a list of user ground stations requiring encryption keys. For each satellite of the constellation of satellites, determining a region of the earths surface within which the satellite can carry out encryption key delivery communication sessions to user ground stations using a quantum optical communications link during a scheduling period. Obtaining a cloud cover map. Comparing the locations of the listed user ground stations, the determined regions of the earths surface for the constellation of satellites, and the cloud cover map, to identify listed user ground stations to which encryption key delivery can be carried out by the constellation of satellites during the scheduling period.Type: GrantFiled: November 6, 2020Date of Patent: November 5, 2024Assignee: Arqit LimitedInventors: David Williams, Barry Childe, David Bestwick, Andrew James Victor Yeomans, Omar Iqbal
-
Patent number: 12126601Abstract: A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.Type: GrantFiled: February 14, 2024Date of Patent: October 22, 2024Assignee: NANTHEALTH, INC.Inventors: Patrick Soon-Shiong, Harsh Kupwade-Patil, Ravi Seshadri, Nicholas J. Witchey
-
Patent number: 12126603Abstract: A secure data exchange system permits device to exchange secure message keys and securely transmit messages between devices. The devices may initially exchange temporary message keys that are used to encrypt permanent message keys. In addition, devices may have pairing managed that authenticates devices. Devices may be associated with an address ledger that maintains address information and is accessible with a public ledger key, which may provide different access to address information to different paired devices. Data within the system may also be encrypted with user device keys that prevents unauthorized access to data while permitting recreation of the user device key for data backup and migration.Type: GrantFiled: October 1, 2021Date of Patent: October 22, 2024Inventor: Henry Verheyen
-
Patent number: 12124594Abstract: This disclosure relates to, among other things, electronic device security systems and methods. Certain embodiments disclosed herein provide for protection of cryptographic keys and/or associated operations using both an operating system security service and a software-based whitebox cryptographic security service executing on a device. Leveraging operating system security services and software-based whitebox cryptographic security services may provide enhanced security when compared to using either service alone to protect cryptographic keys and associated operations. In additional embodiments, server-side cryptographic security solutions may be further used to enhance device security implementations.Type: GrantFiled: January 6, 2023Date of Patent: October 22, 2024Inventors: Yutaka Nagao, Stephen G. Mitchell, Vishisht Tiwari, Rohaan Advani
-
Patent number: 12111960Abstract: A method and device of the present disclosure can prove the originality of a creative design in a communication system by proving the causal relationship between the creation process of the creative design and the creation result using the hash codes related to images in creation stages of the creative design. The method and device combine hash codes for intermediate images in the creation process of a creative design and a hash code for a final image using an operation function to generate one piece of final hash information and then transmit a non-fungible token (NFT) including the final hash information and final image information to a blockchain so that the design creator can claim the connection between the intermediate images in the creation process of the creative design and the final image at the time of disclosing the design on the blockchain network.Type: GrantFiled: May 17, 2024Date of Patent: October 8, 2024Inventors: Tae Hwan Yeo, Bong Sup Lee
-
Patent number: 12107958Abstract: Presented herein are systems and methods for end-to-end encryption for session-less communications. A first server may receive, from a second server, a request to retrieve keys for a customer device to access a service. The request may include a device identifier and a first token encrypted using a first encryption key. The first server may determine, responsive to validating, that the customer device is to be issued a second token. The first server may identify least a portion of the first token decrypted using the first encryption key. The first server may generate a set of second encryption keys to be used by the customer device. The first server may package the second token to include (i) at least the portion of the first token and (ii) the set of second encryption keys. The first server may transmit, to the second server, a response including the second token.Type: GrantFiled: August 3, 2023Date of Patent: October 1, 2024Assignee: CITICORP CREDIT SERVICES, INC. (USA)Inventors: Gayathri Sundar, Mayank Shah
-
Patent number: 12093377Abstract: Various systems, methods, and computer program products for providing data security using software library containers are provided. The method includes identifying a software library used by a first application with a potential vulnerability. The method also includes determining a software library permission for the software library used by the first application based on the potential vulnerability. The software library permission for the software library defines a level of functionality of at least a portion of the software library. The method further includes identifying one or more additional applications that use the software library. The method still further includes causing the software library permission to be applied to the software library installed on the first application and at least one of the one or more additional applications.Type: GrantFiled: April 27, 2022Date of Patent: September 17, 2024Assignee: BANK OF AMERICA CORPORATIONInventors: Tomas M. Castrejon, III, Michael Robert Young, David Nardoni, Joel Townsend, Manu Jacob Kurian
-
Patent number: 12088742Abstract: The present invention provides an anti-trapdoor-leakage on-chain data restoration system, at least comprising: a blockchain node, for broadcasting transaction data of a request-initiating person to blockchain nodes and proposer nodes in other groups, respectively; and a proposer node, for performing computation of a Chameleon-Hash function using a key set that is generated by a key-generating module provided in the proposer node, packaging the transaction data to generate a new block, and distributing the new block to all the blockchain nodes so that the blockchain nodes update their respective underlying ledgers according to the new blocks broadcasted by the proposer. The system of the present invention not only realizes such functions as restoration and editing of the transaction data, but also protects operational security and reliability of blockchains.Type: GrantFiled: May 24, 2022Date of Patent: September 10, 2024Assignee: HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Weiqi Dai, Jinkai Liu, Hai Jin, Deqing Zou
-
Patent number: 12075254Abstract: Disclosed are various embodiments for configurable security policies in radio-based networks. In one embodiment, a security event detection rule or a security event mitigation rule for a radio-based network is accessed. The radio-based network includes a radio access network and an associated core network. At least a portion of the radio-based network is operated by a cloud provider on behalf of an organization. A security event is detected based at least in part on the security event detection rule. At least one action is performed in response to the security event based at least in part on the security event mitigation rule.Type: GrantFiled: December 10, 2021Date of Patent: August 27, 2024Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Diwakar Gupta, Kaixiang Hu, Benjamin Wojtowicz, Upendra Bhalchandra Shevade, Shane Ashley Hall
-
Patent number: 12061678Abstract: Exemplary systems and methods are directed to embedding data into a machine learning model. A processing device executes program code for running a machine learning model, which has a plurality of parameter values. The processing device receives a message to be embedded into the machine learning model. The message is encrypted according to a set of keys of a cryptographic algorithm. The encrypted message is converted to a corresponding binary representation. The binary representation of the encrypted message is embedded into at least one of the one or more parameters of the machine learning model. The embedding operation modifies the at least one parameter value of the machine learning model.Type: GrantFiled: October 5, 2021Date of Patent: August 13, 2024Assignee: BOOZ ALLEN HAMILTON INC.Inventors: Clayton Davis, Saumil Dave, Baruch Gutow, Gabriella Melki
-
Patent number: 12056260Abstract: A software verification method and apparatus are provided. The method includes: reading flag information, where the flag information is used to indicate a target digital certificate; selecting one of a plurality of digital certificates as a target digital certificate based on the flag information, where the plurality of digital certificates include a first digital certificate and a second digital certificate, and the target digital certificate includes a cryptographic resource; and verifying software deployed on a device based on the cryptographic resource. Using the foregoing technical solution can ensure continuity of the software verification service in the device.Type: GrantFiled: April 22, 2022Date of Patent: August 6, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Haiwu Chen, Bin Cao, Mengnan Zhang, Jianying Qian
-
Patent number: 12045361Abstract: In some embodiments, an apparatus includes a memory and a processor. The processor is configured to receive an index file that associates a characteristic in a set of documents with a set of information associated with the characteristic in the set of documents. The processor is further configured to generate an index identifier associated with the index file and calculate a set of pseudorandom logical block identifiers associated with a set of storage locations of a database based on the index identifier. The processor is then configured to parse the index file into a set of index data portions and send a signal to the database to write each index data portion from the set of index data portions at a different storage location within the database as indicated by a different identifier from the set of pseudorandom logical block identifiers.Type: GrantFiled: June 17, 2022Date of Patent: July 23, 2024Assignee: SIMBA Chain, Inc.Inventor: Edward Liang Yu
-
Patent number: 12045378Abstract: The present disclosure relates to a method for performing a cryptographic operation, the method including generating a first count value by a monotonic counter of a processing device, transmitting the first count value from the monotonic counter to a memory of the processing device, selecting a first encryption key from the memory based on the first count value, and providing the selected first encryption key to a cryptographic processor.Type: GrantFiled: March 30, 2022Date of Patent: July 23, 2024Assignees: STMicroelectronics (Grand Ouest) SAS, STMicroelectronics (Alps) SASInventors: Franck Albesa, Nicolas Anquet
-
Patent number: 12047370Abstract: A system and method of encrypting data using public key cryptography and certificate verification. The method includes receiving a request for a digital certificate. The method includes signing, by a processing device, the request using a second private key to generate a signed request. The method includes generating the digital certificate based on the signed request and a different private key. The method includes causing the digital certificate to be stored in a shared data storage available to a first client device. The method includes signing an encrypted secret using a first private key associated with the first client device to generate a signed encrypted secret, wherein the first private key is inaccessible to the first client device.Type: GrantFiled: April 12, 2023Date of Patent: July 23, 2024Assignee: Snowflake Inc.Inventors: Alexander Hess, Joshua Vittum Makinen
-
Patent number: 12045338Abstract: Provided is a method of securing a software code of an application including at least one constant data. The method produces secure software code can then be executed on a processor. The method includes fragmenting current constant data into several valid data chunks of random length, encoding and storing the valid data chunks at random locations in the application software code, identifying all occurrences of the current constant data in the application software code and replacing each of them with a call to a Runtime application self-protection (RASP) agent for reading the current constant data, and inserting, at random locations of a control flow graph of the application software code, RASP check instructions which when executed at runtime. The RASP agent being configured for running in the application runtime environment and being capable of controlling application execution and detecting and preventing real-time attacks.Type: GrantFiled: April 8, 2020Date of Patent: July 23, 2024Assignee: THALES DIS CPL USA, INC.Inventors: Peter Garba, Roman Rohleder