Patents Examined by Lydia L Noel
-
Patent number: 12294665Abstract: A method of labeling video to provide authentication acquires an instruction to apply timestamp labeling. Each recorded video is labeled with a timestamp based on the instruction. The first mark information is generated based on a content of each recorded video as a hash value and is uploaded into a blockchain. Second mark information is generated based on a content of at least one video under investigation. By comparing the first mark information and the second mark information, a video under investigation is found to be undistorted and authentic when the first mark information is the same as the second mark information. The video under investigation is found to be non-authentic when the first mark information is different from the second mark information. A terminal device and a computer readable storage medium applying the method are also disclosed.Type: GrantFiled: May 19, 2022Date of Patent: May 6, 2025Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Chun-Wei Chiu
-
Patent number: 12284512Abstract: Low power devices are able to utilize encryption in communication. Low power devices typically cannot send/receive large amounts of data since sending/receiving more data uses more power. Implementing a key exchange with a small encrypted payload enables secure communication between the devices. A one-way data stream is implemented. The one-way data stream is able to be encrypted. The dynamic key exchange is able to be used for a moving target.Type: GrantFiled: December 4, 2023Date of Patent: April 22, 2025Assignee: Winkk, Inc.Inventor: Robert O. Keith, Jr.
-
Patent number: 12231888Abstract: A wireless network access method, apparatus, device, and system are provided.Type: GrantFiled: April 23, 2021Date of Patent: February 18, 2025Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Xiyi Yin, Jun Li, Boheng Liu
-
Patent number: 12212673Abstract: Methods and systems disclosed herein recite the use of linking cryptography-based digital repositories in order to perform blockchain operations in decentralized applications. For example, the system may link a first cryptography-based, storage application (e.g., a first digital wallet) with a second first cryptography-based, storage application (e.g., a second digital wallet). The first cryptography-based, storage application may correspond to a first private key, and wherein the first private key is stored on a first user device. The second cryptography-based, storage application corresponds to a first partial private key and a second partial private key, wherein the first partial private key is stored on a first remote device, and wherein the second partial private key is stored on the first user device.Type: GrantFiled: February 25, 2022Date of Patent: January 28, 2025Assignee: Coinbase, Inc.Inventors: Ankit Chiplunkar, Ben Schreck, Matt Moore, Olivia Thet, Peter Jihoon Kim, Trevor Aron
-
Patent number: 12192760Abstract: A method is disclosed. The method includes receiving a broadcast signal from a beacon device, the broadcast signal encoding a first credential associated with a first entity. In response to receipt of the broadcast signal, the mobile communication device transmits the received first credential to an authentication system. The authentication system determines if the first entity associated with the broadcast signal is authentic and generates a confirmation message confirming the authenticity of the first entity. The mobile communication device then receives the confirmation message indicating that the first entity is authentic. The mobile communication thereafter receives and transmits a second credential for the mobile communication device to the beacon device, which transmits the second credential to the authentication system. The authentication system then confirms the authenticity of the mobile communication device.Type: GrantFiled: December 7, 2022Date of Patent: January 7, 2025Assignee: Visa International Service AssociationInventors: Quan Wang, Kyle Crouse
-
Patent number: 12185103Abstract: Embodiments of a device and method are disclosed. In an embodiment, a method of communications involves at a head end (HE), receiving an authentication message from a wireless access point (AP) deployed at a customer site, at the HE, performing a load balance operation in response to the authentication message to select a first authenticator from authenticators of the HE, at the HE, performing an authentication operation using the first authenticator based on the authentication message to generate an authentication request, and from the HE, transmitting the authentication request to an authentication server.Type: GrantFiled: June 25, 2021Date of Patent: December 31, 2024Assignee: Nile Global, Inc.Inventors: Gopal Raman, Sathish Damodaran, Shibu Piriyath, Rupesh Raghuvaran, Venu Hemige
-
Patent number: 12156026Abstract: In one example, a method includes at a first network infrastructure computing device of a plurality of networked infrastructure computing devices receiving, from a user computing device, an authentication token indicating a user using the user computing device is authenticated with respect to an electronic service, based on the user being authenticated, executing a computing task associated with the electronic service for the user computing device, the computing task including computing task data, predicting a set of possible future locations of the user based on an output of a movement prediction model executing on the first network infrastructure computing device, identifying a set of network infrastructure computing devices correlated with the set of possible future locations, and transmitting the authentication token and the computing task data to the set of network infrastructure computing devices.Type: GrantFiled: June 7, 2021Date of Patent: November 26, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Ramanathan Ramanathan, Chris Theodore Kalaboukis, Rameshchandra Bhaskar Ketharaju, Andres J. Saenz, Andrew J. Garner, IV, Abhijit Rao, Joon Maeng
-
Patent number: 12137341Abstract: Message delivery in cellular roaming scenarios involves a user device activated with a home telecommunications service provider (TSP) that provides cellular service to the user device. The user device is located in a remote location and the user device is activated with a remote TSP providing roaming cellular service to the user device in a remote location on a cellular network of the remote TSP. A process includes, based on the user initiating a transaction with a remote application server that requires user authentication based on delivery of a transactional text message, receiving from the remote application server the transactional text message, encrypting the transactional text message to produce an encrypted transactional text message, and forwarding the encrypted transactional text message to the remote TSP for delivery as a short message service (SMS) text to the user device in the remote location via the cellular network of the remote TSP.Type: GrantFiled: August 31, 2021Date of Patent: November 5, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jignesh K Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Shilpa Shetty, Neha Shah, Vishal Awal
-
Patent number: 12124544Abstract: The present disclosure is directed to systems and methods for protecting software application information that is passed between a caller of an API and the logic contained within the API by using a Secure Calling Convention (SCC). The SCC involves performing a cryptographic operation on the information such that the true nature of the information is obfuscated. The SCC prevents a hacker from using the information to reverse-engineer the software application to behave as desired.Type: GrantFiled: September 10, 2019Date of Patent: October 22, 2024Assignee: Aveva Software, LLCInventor: Ian Peter George Steele
-
Patent number: 12101402Abstract: The present disclosure relates to a method for a cryptographic key rotation in a publish-subscribe system providing a broker service for routing stored encrypted messages to one or more subscribers of the topic to which the routed messages are assigned. The routing comprises decrypting the stored encrypted messages. The cryptographic key rotation comprises a re-encryption of the stored messages using a cryptographic replacement key. The re-encryption is executed by an encryption module of the publish-subscribe system as a background process, while the broker service is continued.Type: GrantFiled: December 14, 2020Date of Patent: September 24, 2024Assignee: International Business Machines CorporationInventors: Christopher J. Giblin, John G. Rooney, Florian Hermann Froese, Pascal Vetsch
-
Patent number: 12075253Abstract: There is provided mechanisms for attachment of a wireless device to an MNO. A method is performed by the wireless device. The method comprises providing an authorization token to an AMF node of the MNO in conjunction with authenticating with the AMF node. The method comprises completing attachment to the MNO upon successful validation of the authorization token by the AMF node.Type: GrantFiled: January 26, 2017Date of Patent: August 27, 2024Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Maria Esther Bas Sanchez, David Castellanos Zamora, Peter Hedman, Christine Jost, Monica Wifvesson
-
Patent number: 12074972Abstract: The invention is a method for updating a first secret data in a credential container including a subscriber identity module. The credential container comprises a set of secret parameters customized for a network operator and is configured to execute a symmetric mutual authentication algorithm using said set. The credential container receives from a remote server a second secret data enciphered using a second algorithm different from said symmetric mutual authentication algorithm and a subset of said secret parameters, the credential container deciphers the enciphered second secret data by using both the subset and a third algorithm and replaces the first secret data with the second secret data.Type: GrantFiled: August 22, 2019Date of Patent: August 27, 2024Assignee: THALES DIS FRANCE SASInventors: Michel Anslot, Jean-Yves Fine
-
Patent number: 12058516Abstract: During operation, an electronic device may encrypt an A-control subfield. Then, the electronic device may provide the frame addressed to a second electronic device, where the frame includes a media access control (MAC) header and the MAC header includes the A-control subfield that is encrypted. Note that the encrypted A-control subfield may be jointly encrypted with data in a payload in the frame. Moreover, the encrypted A-control subfield may be separated from the payload in the frame by one or more additional subfields or may be adjacent to the payload in the frame. Furthermore, the MAC header may include an indicator that indicates whether the A-control subfield is encrypted. Additionally, the frame may include a preamble that indicates whether the A-control subfield is encrypted. The frame may be received by the second electronic device. After receiving the frame, the second electronic device may decrypt the A-control subfield.Type: GrantFiled: October 19, 2021Date of Patent: August 6, 2024Assignee: Apple Inc.Inventors: Jinjing Jiang, Yong Liu, Su Khiong Yong, Tianyu Wu, Jarkko L. Kneckt, Lochan Verma, Qi Wang
-
Patent number: 12022281Abstract: Methods and systems are disclosed herein for secure communication between computing devices. A mobile device may communicate with an untrusted device to cause the untrusted device to send information (e.g., encrypted information that the untrusted device is unable to decrypt) to a server using an Internet connection of the untrusted device. The mobile device may have limited or no access to the Internet. To prevent potential security risks associated with using a public or untrusted device, the mobile device may encrypt information stored on the mobile device (e.g., stored in a mobile application associated with the server), send it to the untrusted device (e.g., by displaying a QR code to a camera of the untrusted device), and the untrusted device may send the information to the server via a network connection of the untrusted device.Type: GrantFiled: June 23, 2021Date of Patent: June 25, 2024Assignee: Capital One Services, LLCInventors: Rajko Ilincic, Lin Ni Lisa Cheng, Phoebe Atkins, Deny Daniel, Cruz Vargas
-
Patent number: 12003958Abstract: An electronic device and an electronic device operating method according to various embodiments comprises: a processor operationally connected to the first communication module, the second communication module, and the security module, wherein the processor can be configured to control the second communication module such that the second communication module activates the accessory in response to the reception, through the first communication scheme, of a discovery signal broadcasted by the external electronic device, control the second communication module such that the second communication module transmits, to the accessory through the third communication scheme, the data to be used for authentication with the external electronic device, and control the accessory such that the accessory transmits, to the external electronic device through the second communication scheme, the data to be used for authentication with the external electronic device.Type: GrantFiled: May 17, 2019Date of Patent: June 4, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Yi Yang, Jonghwan Kim, Jaehyung Seo, Jiho Shin, Jonghoon Jang
-
Patent number: 11997748Abstract: Methods and systems for MT (mobile terminated) call recovery in an IP multimedia system (IMS) network are discussed herein. A method according to an implementation comprises receiving, via a network, a request to establish a call session with a user equipment (UE); sending, to a first serving call session control function (S-CSCF), a first invite associated with the request; determining that no response is received from the first S-CSCF after a pre-set time period; sending, to a second S-CSCF, a second invite associated with the request, causing the second S-CSCF to perform actions including: obtaining an authentication to establish the call session; and sending, to a proxy call session control function (P-CSCF) of the UE, a third invite associated with the request; and receiving, via the network, a confirmation that the call session with the UE is established.Type: GrantFiled: August 24, 2021Date of Patent: May 28, 2024Assignee: T-Mobile USA, Inc.Inventors: Venkata Satya Sureshkumar Kondeti, Karthik Adepalli Sri Lakshmi
-
Patent number: 11974132Abstract: A routing method, apparatus, and system, related to the field of communications technologies, to update a routing indicator in a subscription concealed identifier when a user is migrated to a new unified subscriber data management UDM network element and the routing indicator in the subscription concealed identifier changes. The method includes: sending, by an authentication server function AUSF network element, a first authentication vector obtaining request to a first unified data management UDM network element; and if the AUSF network element receives a routing indicator RI sent by the first UDM network element, sending the RI to an access and mobility management function AMF network element. The method is applied to a process in which a terminal updates the RI.Type: GrantFiled: June 10, 2020Date of Patent: April 30, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Hua Li, Bo Zhang
-
Patent number: 11956627Abstract: Techniques for securing an identifier of user equipment for a request external to a communication network are disclosed. For example, a method comprises receiving, at a network entity, a request for identification information for user equipment from an entity external to a communication network to which the network entity belongs. The network entity generates a secure identifier for the user equipment, wherein the secure identifier comprises an encrypted form of a public subscription identifier associated with the user equipment. The network entity sends the secure identifier to the external entity. The network entity receives the secure identifier in a subsequent request from the external entity. The network entity utilizes the received secure identifier to confirm the received secure identifier corresponds to the user equipment.Type: GrantFiled: February 19, 2021Date of Patent: April 9, 2024Assignee: NOKIA TECHNOLOGIES OYInventors: Suresh Nair, Laurent Thiebaut, Omar Elloumi
-
Patent number: 11956215Abstract: Systems and methods for blurring connection information in virtual private networks are provided herein. In some embodiments, a method of blurring VPN connection metadata may comprise: receiving, by a VPN service provider infrastructure, a request from a user device to establish a VPN connection with one or more VPN servers, wherein the VPN service provider infrastructure includes a logic engine configured to perform statistical blurring of VPN connection metadata; establishing a connection between the user device and one or more target sites during a VPN session; receiving, from the one or more VPN servers, VPN connection metadata associated with the user's VPN connections and a user identifier associated with the user; performing statistical blurring of VPN connection metadata by modifying the VPN connection metadata using an unknown random value to create blurred connection metadata; and storing the blurred connection metadata in association with the user identifier received.Type: GrantFiled: November 8, 2021Date of Patent: April 9, 2024Assignee: UAB 360 ITInventor: Laimutis Nedzinskas
-
Patent number: 11902778Abstract: An electronic processor of a wireless fob is configured to establish a first communication link between the wireless fob and an external device, and receive, over the first communication link, first identification information and credential information of a power tool device from the external device. The electronic processor is further configured to receive, via the wireless transceiver, an identification signal including second identification information from the power tool device. The electronic processor is further configured to identify the power tool device by determining that the first identification information matches with the second identification information. The electronic processor is further configured to transmit the credential information to the power tool device to establish a second communication link between the wireless fob and the power tool device and transmit, over the second communication link, a command to the power tool device to control an operation of the power tool device.Type: GrantFiled: August 13, 2020Date of Patent: February 13, 2024Assignee: Milwaukee Electric Tool CorporationInventors: Anthony Davis, Corey J. Dickert, Timothy R. Obermann