Patents Examined by Jeffery L Williams
-
Patent number: 11968243Abstract: A containerized cross-domain solution (CDS) is disclosed herein. In some examples, a first network interface container can be executed on a server to run a first network interface application to receive a data packet that includes data generated by a first process executing at a first security domain. A filter container can be executed on the server to run a data filter to evaluate a data content of the data to determine whether the data content violates a set of data rules. A second network interface container can be executed on the server to run a second network interface application. The data packet can be provided to the second network interface application in response to determining that the data content does not violates the set of data rules. The second network interface application can provide the data packet to a second security domain for a second process executing therein.Type: GrantFiled: June 21, 2021Date of Patent: April 23, 2024Assignee: NORTHROP GRUMMAN SYSTEMS CORPORATIONInventors: Mark A. Bellmore, Matthew T. Kirk, David M. Iodice
-
Patent number: 11960611Abstract: A computing device, in particular, for a control unit of a motor vehicle. The computing device is configured to receive messages from at least one external unit. The computing device is configured to store the received messages at least temporarily and to transmit a plurality of the received messages to a cryptographic module, which is configured to execute a check of the transmitted messages.Type: GrantFiled: November 27, 2019Date of Patent: April 16, 2024Assignee: Robert Bosch GmbHInventors: Christopher Pohl, Frederic Stumpf
-
Patent number: 11962573Abstract: A computer-implemented system and method for providing access to secured content on a provisioning entity system are disclosed, the method may include: receiving, from a requesting entity system, a plurality of user requests to access the secured content stored at the provisioning entity system; determining, for each of the plurality of user requests, a respective user ID; generating, for each of the plurality of user requests, a respective trusted token based on the respective user request, the trusted token comprising at least a variable term different for each of the trusted tokens generated for the plurality of user requests; adding a proof of authentication to each of the trusted tokens to enable the provisioning entity system to validate the respective trusted token; and transmitting at least one of the trusted tokens to the requesting entity system.Type: GrantFiled: October 26, 2021Date of Patent: April 16, 2024Assignee: GENETEC INCInventor: Antoine Lennartz
-
Patent number: 11947465Abstract: Aspects of the invention include receiving, at an operating system executing on a processor, a write request from a program to write data to a memory. The write request includes a virtual memory address and the data. It is determined that the virtual memory address is not assigned to a physical memory address. Based on the determining, the unassigned virtual memory address is assigned to a physical memory address in an overflow memory. The data is written to the physical memory address in the overflow memory and an indication that the write data was successfully written is returned to the program. Future requests by the program to access the virtual memory address are directed to the physical memory address in the overflow memory.Type: GrantFiled: October 13, 2020Date of Patent: April 2, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Peter Lyons, Andrew C. M. Hicks, Tynan J. Garrett, Miles C. Pedrone
-
Patent number: 11943218Abstract: An automated computer operating software system for automatically generating user profiles is disclosed. The system is configured to automatically creates a profile or a number profiles based on biometric methods but also stores the profile(s) information along with an associated device(s) information and user generated data locally and remotely through various hardware modules and can also retrieve this information to any other device based on biometric authentication on the other device and auto adjust the operating parameters according to that other device and its operational parameters and again continue this same kind of auto creating, backing up and retrieving of both the profile of the user and device as well in a continuous loop of infinite number devices and user profiles.Type: GrantFiled: November 5, 2020Date of Patent: March 26, 2024Inventor: Anand Kumar Chavakula
-
Patent number: 11928226Abstract: A marking onto a collaboration board, located in a first location, is detected. The marking includes the creation of one or more content elements on the collaboration board. Responsive to detecting the markings one or more content elements on the collaboration board are analyzed. A first content element of the one or more content elements is classified based on analyzing the one or more content elements. The first content element is classified as a first privileged content element. The first location of the collaboration board is scanned. The scanning is based on the classifying of the first privileged content element. An unauthorized person is identified based on scanning the first location. The unauthorized person is not permitted to view the collaboration board. A security response is performed on the collaboration board regarding the one or more content elements. The security response is performed responsive to identifying the unauthorized person.Type: GrantFiled: February 4, 2021Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Zachary A. Silverstein, Shikhar Kwatra, Sudhir Alluri, Manish Anand Bhide
-
Patent number: 11921900Abstract: Managing privacy controls in an information handling system to allow Information Technology Decision Makers (ITDMs) to prevent unwanted disclosure of information while allowing users to work together. A first privacy policy is asserted to protect information. When a user device requests an override to access an I/O device, embodiments analyze device parameters and application parameters to determine whether to authorize the use of the I/O device. If the override request is authorized, the user is able to access the I/O device and a new privacy policy is asserted. If a device parameter changes, embodiments may assess whether the change could result in unwanted disclosure of information and dynamically change the privacy policy to prevent the disclosure.Type: GrantFiled: February 25, 2021Date of Patent: March 5, 2024Assignee: Dell Products L.P.Inventors: Vivek Viswanathan Iyer, Daniel Lawrence Hamlin
-
Patent number: 11917052Abstract: The present disclosure provides a hash algorithm circuit, a hash algorithm method, and an electronic device. The hash algorithm circuit is used to reduce fixed-length parallel data, and the reduced identifier can be used as an index reference, an identifier ID, an address extension bit, information summary, and so on. The hash algorithm circuit has the characteristics of low power consumption, low cost, etc., and can be integrated in a digital circuit.Type: GrantFiled: May 28, 2021Date of Patent: February 27, 2024Assignees: BEIJING BOE TECHNOLOGY DEVELOPMENT CO., LTD., BOE TECHNOLOGY GROUP CO., LTD.Inventors: Xiangye Wei, Liming Xiu
-
Patent number: 11907406Abstract: A computer-implemented method and a corresponding system of tamper-evident recording of a plurality of service data items are provided. Each service data item is associated with a data item verification fingerprint. A processing routine is conducted, in which an aggregated verification fingerprint is computed from at least a plurality of data item verification fingerprints using at least one one-way compression function, so that the aggregated verification fingerprint has a bit length, which is less than a bit length of a concatenation of the data item verification fingerprints. The aggregated verification fingerprint is then stored in at least one blockchain, so that a tamper-evident verification of each service data item is possible, while the storage of the aggregated verification fingerprint is decoupled from the service data items.Type: GrantFiled: July 31, 2017Date of Patent: February 20, 2024Assignee: CRYPTOWERK CORP.Inventor: Holger Assenmacher
-
Patent number: 11899756Abstract: A method for registering and provisioning an electronic device is provided. The method includes a step of inserting a first keypair into a secure element of the electronic device. The first keypair includes a public key and a private key. The method further includes a step of requesting, from a remote server configured to register and provision connected devices, a provisioning of credentials of the electronic device. The method further includes a step of verifying, by the remote server, the electronic device credentials. The method further includes a step of registering, by the remote server, the electronic device. The method further includes a step of transmitting, from the remote server to the electronic device, a device certificate. The method further includes steps of installing the transmitted device certificate within the secure element of the electronic device, and provisioning the electronic device according to the installed device certificate.Type: GrantFiled: March 6, 2023Date of Patent: February 13, 2024Assignee: Cable Television Laboratories, Inc.Inventors: Massimiliano Pala, Ronald H. Ih, Carl Fredrik Pettersson
-
Patent number: 11886579Abstract: The present disclosure is directed to methods and apparatus for validating and authenticating use of machine learning models. For example, various techniques are described herein to limit the vulnerability of machine learning models to attack and/or exploitation of the model for malicious use, and for detecting when such attack/exploitation has occurred. Additionally, various embodiments described herein promote the protection of sensitive and/or valuable data, for example by ensuring only licensed use is permissible. Moreover, techniques are described for version tracking, usage tracking, permission tracking, and evolution of machine learning models.Type: GrantFiled: January 13, 2020Date of Patent: January 30, 2024Assignee: Koninklijke Philips N.V.Inventors: Shawn Arie Peter Stapleton, Amir Mohammad Tahmasebi Maraghoosh
-
Patent number: 11882449Abstract: A client-side electronic device includes a receiver, a processor, and a memory. The receiver communicates with a message server over a communication medium of a communication network. The memory stores computer-executable instructions, which, when executed by the processor, cause the device to receive, from the message server, a broadcast message, a timestamp associated with the broadcast message, and a first digital signature of the broadcast message and a second digital signature of the timestamp. The executed instruction further cause the device to verify an integrity of the broadcast message based the first or second digital signatures, determine a freshness of the broadcast message based on the received timestamp, calculate a trust state of the broadcast message based on the integrity verification and the freshness determination, and store the broadcast message in the memory along with the calculated trust state.Type: GrantFiled: April 1, 2021Date of Patent: January 23, 2024Assignee: Cable Television Laboratories, Inc.Inventor: Tao Wan
-
Patent number: 11856087Abstract: The present invention relates to a method of generating random numbers for cryptographic applications, in which a recording of an environment is generated by means of a detection unit, the recording is presented by means of a display device, a virtual object is positioned in the presentation of the recording in the environment, real world coordinates for real world points in a real world coordinate system are determined for the environment, virtual world coordinates for one or more virtual world points in a virtual world coordinate system are determined for the virtual object, at least the real world coordinates of a real world point of the environment and the virtual world coordinates of a virtual world point of the virtual object are used to generate a random number, and the random number is used in a cryptographic application.Type: GrantFiled: October 4, 2021Date of Patent: December 26, 2023Assignee: Schneider Electric Industries SASInventors: Alexander Hieser, Marcus Zinn
-
Patent number: 11856114Abstract: The present disclosure describes embodiments of a device with memory and a processor. The memory is configured to store integrated circuit (IC) trim and redundancy information. The processor is configured to extract bits from the IC trim and redundancy information, perform a hashing function on the extracted bits to generate hashed bits, and in response to statistical properties of the hashed bits meeting one or more criteria, output the hashed bits. In some embodiments, the memory that stores the IC trim and redundancy information can be different from other memory used by the device for other operations (e.g., accessing user data and program data that have been written into system memory).Type: GrantFiled: February 12, 2021Date of Patent: December 26, 2023Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.Inventors: Katherine H. Chiang, Shih-Lien Linus Lu
-
Patent number: 11843677Abstract: A method is provided for the capture of biometric or multi-biometric information using: a standard Internet of Things (IoT) data broker in an efficient and distributed IoT architecture. The MQTT information protocol is used in combination with mobile or fixed devices that manage one or more peripherals for capturing biometric information. An IoT platform is provided that allows information to be viewed in real time along with historical information and statistics regarding the use and operation of the devices to be obtained. The invention provides a method based on standard integration protocols and tools for M2M communication in IoT architectures, which acts as an information bridge, facilitating implementation to capture any type of biometric or multibiometric information, which information can be in any format (biometric templates or images in standard or proprietary formats), so that the captured information can be used in any type of biometric process.Type: GrantFiled: May 20, 2019Date of Patent: December 12, 2023Assignee: INVERSIONES TECNOLOGICAS DE AMERICA S.A.Inventors: David Rozo, Gabriel Zapata
-
Patent number: 11836276Abstract: A peripheral device package for use in a host computing device has a plurality of compute elements and a plurality of resources shared by the plurality of compute elements. A datastructure is stored in a hidden memory of the peripheral device package. The data structure holds metadata about ownership of resources of the peripheral device package by a plurality of user runtime processes of the host computing device which use the compute elements. At least one of the user runtime processes is a secure user runtime process. The peripheral device package has a command processor configured to use the datastructure to enforce isolation of the resources used by the secure user runtime process.Type: GrantFiled: August 29, 2022Date of Patent: December 5, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Stavros Volos, Kapil Vaswani
-
Patent number: 11811749Abstract: Plugins are authenticated for purposes of accessing and using application program interfaces (APIs) of a management service of a virtualized computing environment. In an authentication process, each plugin is associated with a session ticket that is unique to the plugin. The session ticket may be in the form of a single-use token that has a finite duration, and which may be used by the plugin to establish a session with the APIs of the management service. Because of the single-use and finite duration constraints of the token, the plugin is unable to use the token for other sessions and other plugins are also unable to use the same token to conduct their own sessions with the management service.Type: GrantFiled: October 7, 2021Date of Patent: November 7, 2023Assignee: VMWARE, INC.Inventors: Tony Ganchev, Tihomir Mateev
-
Patent number: 11799669Abstract: A system includes a device and a payload warehouse. The device receives a user request to initiate a feature of the device. In response to receiving the request, device information is provided to a payload warehouse. The payload warehouse stores an inventory which includes a digital payload. The digital payload includes data, such as a digital certificate, which may be used by the device to implement the user-requested feature. The payload warehouse receives the device information provided by the device and determines an encryption vector based at least in part on the received device information. Using the encryption vector, the digital payload is encrypted. The encrypted digital payload is provided to the device.Type: GrantFiled: November 7, 2022Date of Patent: October 24, 2023Assignee: Lennox Industries Inc.Inventors: Nguyen Trong Ho, Sunil Khiani
-
Patent number: 11770444Abstract: A device may include a memory storing instructions and processor configured to execute the instructions to receive, by a first blockchain node and via a first base station, a message from a first Internet of Things (IoT) device to a second IoT device, wherein the device corresponds to a first multi-access edge computing (MEC) device located in a first MEC network associated with the first base station. The processor may be further configured to authenticate, by the first blockchain node, the first IoT device using a blockchain associated with a group of IoT devices and send, by the first blockchain node, the message to a second blockchain node in a second MEC device in a second MEC network associated with a second base station servicing the second IoT device, in response to authenticating the first IoT device using the blockchain associated with the group of IoT devices.Type: GrantFiled: April 22, 2022Date of Patent: September 26, 2023Assignee: Verizon Patent and Licensing Inc.Inventors: Raghuram Parvataneni, Anil K. Guntupalli
-
Patent number: 11770251Abstract: Techniques and mechanisms for providing continuous integrity validation-based control plane communication in a container-orchestration system, e.g., the Kubernetes platform. A worker node generates a nonce and forwards the nonce to a master node while requesting an attestation token. Using the nonce, the master node generates the attestation token and replies back to the worker node with the attestation token. The worker node validates the attestation token with a CA server to ensure that the master node is not compromised. The worker node sends its authentication credentials to the master node. The master node generates a nonce and forwards the nonce to the worker node while requesting an attestation token. Using the nonce, the worker node generates the attestation token and replies back to the master node with the attestation token. The master node validates the attestation token with the CA server to ensure that the worker node is not compromised.Type: GrantFiled: September 9, 2020Date of Patent: September 26, 2023Assignee: Cisco Technology, Inc.Inventors: Nagendra Kumar Nainar, Carlos M. Pignataro, Akram Ismail Sheriff