Patents Examined by Jung W Kim
  • Patent number: 11366913
    Abstract: In an example, a logic circuitry package is configured to communicate with a print apparatus logic circuit. The logic circuitry package may be configured to respond to communications sent to a first address and to at least one second address. The logic circuitry package may comprise a first logic circuit, wherein the first address is an address for the first logic circuit. The package may be configured such that, in response to a first command indicative of a task and a first time period sent to the first address, the package is accessible via at least one second address for a duration of the time period.
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: June 21, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Stephen D. Panshin, Jefferson P. Ward, Scott A. Linn, James Michael Gardner
  • Patent number: 11361091
    Abstract: An information processing device includes a memory; and a processor coupled to the memory and configured to identify a location where a user is present, when the user accesses a resource by using a remote desktop connection, set access authority of the user over the resource to an allowed state or a prohibited state in accordance with whether or not the location is within an allowed region in which access to the resource is allowed, when it is determined that the location is out of the allowed region while the user is accessing the resource by using the remote desktop connection, start measurement of time without setting the access authority of the user over the resource to a prohibited state, and when it is determined that a predetermined time has elapsed after the measurement is started, terminate the remote desktop connection.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: June 14, 2022
    Assignee: FUJITSU LIMITED
    Inventors: Hideto Kihara, Junichi Yura, Tatsuro Matsumoto
  • Patent number: 11356248
    Abstract: A technique for ciphering source data (306) into target data (308) is described. As to a method aspect of the technique, a level (302) of ciphering is determined for the source data (306). A key sequence (304) is generated depending on the determined level (302) of ciphering. The source data (306) and the key sequence (304) are combined resulting in the target data (308).
    Type: Grant
    Filed: December 21, 2017
    Date of Patent: June 7, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Gabor Sandor Enyedi, Zoltan Kiss, Gergely Pongrácz
  • Patent number: 11354427
    Abstract: The present invention relates to an encrypting/decrypting method for a multi-digit number and an encrypting/decrypting server.
    Type: Grant
    Filed: January 17, 2018
    Date of Patent: June 7, 2022
    Assignee: WELAB INFORMATION TECHNOLOGY (SHENZHEN) LIMITED
    Inventors: Rongcun Huang, Hanquan Liang, Hui Yang
  • Patent number: 11354428
    Abstract: A method encrypts, using an encryption circuit, a first data value having a number n of first binary words, each word having a number m of bits. The encrypting includes generating a second data value having a same number n of second binary words of m bits each and outputting a result of the encryption. The number n is an integer greater than or equal to 3, m and n do not have a common integer division, and n or m is even. A second binary word of the second data value having a rank i is equal to a sum of: a first binary word having a same rank i; and a product of: a complement of a first binary word having rank ((i+1)modulo n), shifted by a first number of bit positions; and a first binary word having rank ((i+2)modulo n), shifted by a second number of bit positions.
    Type: Grant
    Filed: October 9, 2020
    Date of Patent: June 7, 2022
    Assignee: PROTON WORLD INTERNATIONAL N.V.
    Inventors: Joan Daemen, Gilles Van Assche
  • Patent number: 11349650
    Abstract: A circuit for data encryption is provided. The circuit includes an encryption controller configured to randomly generate a frequency parameter defining different timeframes corresponding to different frequencies. The circuit also includes a random-clock-signal generator configured to receive the frequency parameter to synthesize an encryption clock signal based on a base clock signal. The encryption clock signal includes a random combination of different clock frequencies respectively over multiple different timeframes. Additionally, the circuit includes an encryption sub-circuit configured to receive plain data and to encrypt the plain data by a sampling replacement driven by the encryption clock signal to obtain encrypted data.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: May 31, 2022
    Assignee: BOE Technology Group Co., Ltd.
    Inventor: Congrui Wu
  • Patent number: 11343094
    Abstract: Methods and systems for encrypting shared information through its life cycle are described. The method includes receiving and storing a document. The method further includes encrypting document using a primary key. Further, the method includes receiving sharing request from current user of document for sharing document with a next user. The method includes, for each time the document is to be shared with next user in a series, generating a key for next user specified in sharing request. The method further includes encrypting document for next user using key generated for corresponding next user. Furthermore, the method includes binding access rights to document for authorizing request to access document by next user. The method includes sharing encrypted document with next user. Thereafter, the method includes receiving a request to access the document from the next user and providing the access to encrypted document meant for next user to next user.
    Type: Grant
    Filed: July 17, 2020
    Date of Patent: May 24, 2022
    Assignee: I2Chain, Inc.
    Inventors: Mark Steven Manasse, Sanjay Jain, Ajay Jotwani
  • Patent number: 11343079
    Abstract: A computing system includes persistent storage configured to store a plurality of software applications and a distribution application configured to perform operations. The operations include obtaining a first cryptographic key of a pair of asymmetric cryptographic keys, where a second cryptographic key of the pair is stored by an on-premises computational instance, obtaining a selection of a software application from the plurality of software applications for installation, and obtaining an identifier associated with the on-premises computational instance. The operations additionally include encrypting the software application by way of a symmetric encryption algorithm and using a third cryptographic key, and encrypting the third cryptographic key by way of an asymmetric encryption algorithm and using the first cryptographic key.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: May 24, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Rakesh Malhotra, Sujit Sharma, Prashant Parbhane, Anil Kumar Akula, Saurabh Khetan
  • Patent number: 11336448
    Abstract: A system and a method for protecting code are provided. Extraction of code to be protected takes place during an object-to-object transformation and that code is replaced with fake binary code. The extracted code to be protected may then be encrypted or otherwise obscured and stored in a separate region of an object file. A prior source-to-source file transformation can be provided to isolate and mark the code to be protected, and to inject additional source code to handle later decryption.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: May 17, 2022
    Assignee: NAGRAVISION S.A.
    Inventors: Laurent Dore, Eric Piret, Yasser Belaidi, Brecht Wyseur
  • Patent number: 11329808
    Abstract: A secure computation device obtains a first concealed verification value [z]i=[w??]i with secure computation by using concealed authentication information [w]i which is preliminarily stored and concealed authentication information [?]i which is inputted, obtains a concealed extension field random number [rm]i?[F?] which is a secret sharing value of an extension field random number rm, obtains a second concealed verification value [ym]i in which ym is concealed with secure computation by using the first concealed verification value [z]i, and obtains a third concealed verification value [rmym]i with secure computation by using the concealed extension field random number [rm]i and the second concealed verification value [ym]i and outputs the third concealed verification value [rmym]i.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: May 10, 2022
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Gembu Morohashi, Koji Chida
  • Patent number: 11314873
    Abstract: In a client server environment a method of securely storing data; said method comprising generating a data element at a second location; transmitting the data element to a first location separate and remote from the second location; encrypting the data element at the first location thereby to form an encrypted data element; transmitting the encrypted data element to the second location separate and remote from the first location and storing the encrypted data element at the second location; and wherein the second location is constituted as a client device.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: April 26, 2022
    Assignee: HAVENTEC PTY LTD
    Inventor: Ric B. Richardson
  • Patent number: 11316829
    Abstract: A distributed memory data repository of connected data centres. The network load balances by routing requests to different data centres for processing. The solution design provides a blue print to implement a distributed memory data repository based defense system across multiple nodes with dynamic fail-over capabilities. The defense system runs independently on a single node, exclusively leveraging memory for data storage and implementing a communication channel to interact with other nodes.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: April 26, 2022
    Assignee: ROYAL BANK OF CANADA
    Inventor: Stéphane Harvey
  • Patent number: 11297502
    Abstract: Embodiments of this disclosure provide techniques for communicating in a wireless communication system. In particular, a user equipment (UE) may receiving a security command message from a base station comprising an indication of an integrity protection algorithm and an indication of an encryption algorithm. The first security command message may trigger a radio resource control (RRC) traffic signaling protection procedure between the UE and the base station. The UE transmits a security command complete message to the base station. The security command complete message may trigger a packet data unit (PDU) session establishment procedure to establish a PDU session between the UE and the base station.
    Type: Grant
    Filed: September 4, 2018
    Date of Patent: April 5, 2022
    Assignee: FUTUREWEI TECHNOLOGIES, INC.
    Inventors: Ahmad Shawky Muhanna, Xin Zeng
  • Patent number: 11288385
    Abstract: A ledger stores chain of custody information for files throughout an enterprise network. By identifying files with a homologous identifier such as a fuzzy hash that permits piecewise evaluation of similarity, the ledger can be used to track a chain of custody over a sequence of changes in content, ownership, and file properties. The ledger can be used, e.g., to evaluate trustworthiness of a file the first time it is encountered by an endpoint, or to apply enterprise policies based on trust.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: March 29, 2022
    Assignee: Sophos Limited
    Inventors: Karl Ackerman, Russell Humphries, Daniel Salvatore Schiappa, Kenneth D. Ray, Andrew J. Thomas
  • Patent number: 11277423
    Abstract: Example techniques detect incidents based on events from or at monitored computing devices. A control unit can detect events of various types within a time interval and aggregate the detected events into an incident. The control unit can detect patterns within the events based at least in part on predetermined criterion. In examples, the control unit can determine pattern scores for the patterns based on the probability of occurrence for the patterns and determine a composite score based on the pattern scores. The control unit can determine that an incident indicating malicious activity has been detected based in part determining that the composite score is above a predetermined threshold score. In some examples, the control unit can classify and rank the incidents. The control unit can determine if an incident indicates malicious activity including malware or targeted attack.
    Type: Grant
    Filed: February 22, 2019
    Date of Patent: March 15, 2022
    Assignee: CrowdStrike, Inc.
    Inventor: Daniel W. Brown
  • Patent number: 11272358
    Abstract: In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. In certain implementations, the apparatus may establish at least one encryption key with a second device. The apparatus may generate an NDEF message. In certain aspects, the NDEF message may include one or more NDEF records. In certain other aspects, each of the one or more NDEF records may include an NDEF record header and an NDEF record payload. The apparatus may encrypt the NDEF message based at least in part on the at least one encryption key such that the NDEF record payload of each of the one or more NDEF records is encrypted and the NDEF record header of each of the one or more NDEF records is unencrypted. The apparatus may transmit the NDEF message to the second device upon encryption.
    Type: Grant
    Filed: November 12, 2018
    Date of Patent: March 8, 2022
    Assignee: QUALCOMM INCORPORATED
    Inventor: John Hillan
  • Patent number: 11265161
    Abstract: This document describes a system and method for generating two types of session keys for encoding digital communications between two devices. In particular, the first type of session key possesses escrow properties whereby a trusted third party will be able to generate the first type of session key to decode the digital communications between the two devices while the second type of session key does not possess escrow properties.
    Type: Grant
    Filed: August 7, 2020
    Date of Patent: March 1, 2022
    Assignee: Huawei International Pte. Ltd.
    Inventors: Rehana Yasmin, Yanjiang Yang, Zhuo Wei, Tieyan Li, Hai Yu
  • Patent number: 11265310
    Abstract: An allowed client server, that is authorized to access a resource server over a given port, receives a client request, from a client computing system, to access the resource server. The allowed client server authenticates and authorizes the request, using an authentication and authorization mechanism, and selects a port with which to communicate with the client computing system. The identity of that port is provided to the client computing system, and a port forwarding mechanism forwards traffic between the client computing system and the resource server, through the client-facing port and to the given port on the resource server.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: March 1, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Chang Chuen Kawaguchi, Lee Jonathan Riefberg
  • Patent number: 11233646
    Abstract: A method for searchable encryption of a system defining a secret key and a public is provided. A data stream cipher can include n elementary data (b1, b2, . . . , bn). The method can include generation of a variate for all elementary data bj, for values of j from 1 to n, generation of an element function of the public key (gx(bj),zj) and the variate, the element being associated with a random element of a group of a bilinear environment, the element associated with the random element of the group forming first encryption data (Cj,1). The method can also include generation of a shift factor (ga.zj?1) function of the variate and the public key, and associated with the random element of the group, the shift factor representing a position of the monomial in the encrypted stream, the shift factor associated with the random element of the group forming second encryption data. The data stream cipher can include the first and second encryption data for all values of j from 1 to n.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: January 25, 2022
    Assignee: ORANGE
    Inventor: Olivier Sanders
  • Patent number: 11223617
    Abstract: An Internet resource provider (IRP) may authenticate a user and, upon a successful authentication, allow the user to perform one or more actions on webpages that are within an account of the user. The IPR may store the most recent actions of the user in a temporary access code (TAC) database. If the user has a problem, the user may select a TAC button on a webpage within the account of the user. The IPR may generate a TAC, store the TAC in association with the recent activities of the user in the TAC database and transmit the TAC to the user. The user may contact and provide the TAC to a customer support service center. The customer support service center may authenticate the user based solely on the TAC and determine the one or more recent actions of the user in the TAC database. The customer support service center may provide assistance to the user based at least partially on the one or more recent actions of the user.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: January 11, 2022
    Assignee: Go Daddy Operating Company, LLC
    Inventors: Arnold Neil Blinn, Mitchell Dean Olson, Jacob Louis Brooks, John Basyl Kercheval