Patents Examined by Philip J. Chea
-
Patent number: 11729153Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.Type: GrantFiled: August 15, 2021Date of Patent: August 15, 2023Assignee: NICIRA, INC.Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
-
Patent number: 11714925Abstract: A processing device sets a first flag that indicates whether a first critical security parameter (CSP) file exists. The first CSP file includes a first set of CSPs for a memory device. The processing device sets a second flag that indicates whether the first CSP file is valid. The processing device sets a third flag that indicates whether a second CSP file exists. The second CSP file includes a second set of CSPs for the memory device. The processing device sets a fourth flag that indicates whether the second critical security parameter file is valid. The processing device selects one of the first or second CSP file as an active CSP file based on an evaluation of the first, second, third, and fourth flags.Type: GrantFiled: December 9, 2020Date of Patent: August 1, 2023Assignee: Micron Technology, Inc.Inventor: Walter Andrew Hubis
-
Patent number: 11711353Abstract: Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products that are configured to provide authenticated access to a service application. The embodiments disclose an apparatus and system configured to launch an authenticated service application session in response to capturing authentication success rendering comprising visual authentication indicia. The authentication success rendering is a captured via a user device display, and includes visual authentication indicia. To facilitate rendering of the authentication success rendering, embodiments output a browser sign-in session request configured to launch a browser sign-in session associated with a browser application. Additionally, to facilitate capturing the rendering, embodiments initiate a display recorder module configured to capture, during the browser sign-in session and via the user device display, authentication success rendering comprising visual authentication indicia.Type: GrantFiled: December 6, 2019Date of Patent: July 25, 2023Assignee: Salesforce, Inc.Inventor: Jeremy Apthorp
-
Patent number: 11704444Abstract: A command to perform a data operation at a memory device is received. The command includes an encryption key tag. A first key table is accessed from local memory. The first key table includes a first set of key entries corresponding to a first set of encryption keys. The first key table is searched to determine whether it includes an entry corresponding to the encryption key tag. Based on determining the first key table does not include an entry corresponding to the tag, a second key table is accessed from RAM. The second key table includes a second set of key entries corresponding to a second set of encryption keys. A key entry corresponding to the encryption key tag is identified from the second key table. The key entry includes an encryption key corresponding to the encryption key tag. The command is processed using the encryption key.Type: GrantFiled: March 8, 2021Date of Patent: July 18, 2023Assignee: Micron Technology, Inc.Inventor: Walter Andrew Hubis
-
Patent number: 11698957Abstract: A system is disclosed for pre-registering authentication devices. A security key provider system may receive a request to pre-register a security key with identified applications from an enterprise. Responsive to receiving the request, the security key provider system instructs the security key to generate a unique authentication code for each of the applications. The security key provider system may generate pre-registration information based on the authentication codes and pre-register the authentication codes of the security key to the applications by providing the pre-registration information to the applications on behalf of the enterprise. The security key provider system may instead provide the pre-registration information to the enterprise to allow the enterprise to pre-register the authentication codes.Type: GrantFiled: June 17, 2020Date of Patent: July 11, 2023Assignee: Yubico ABInventors: Jakob Ehrensvärd, Christopher Harrell, Jerrod Chong
-
Patent number: 11698993Abstract: A unique hardware key is recorded a secure hardware environment. A first logic circuit of the secure hardware environment is configured to generate a unique derived key from said unique hardware key and at least one piece of information. The at least one piece of information relates to one or more of an execution context and a use of a secret key. The secure hardware environment further includes a first encryption device that performs a symmetric encryption of the secret key using the unique derived key. This symmetric encryption generates an encrypted secret key for use outside of the secure hardware environment.Type: GrantFiled: January 28, 2021Date of Patent: July 11, 2023Assignees: STMicroelectronics (Grenoble 2) SAS, STMicroelectronics (Alps) SASInventors: Gilles Pelissier, Nicolas Anquet, Delphine Le-Goascoz
-
Patent number: 11694212Abstract: The present disclosure describes techniques for dynamically monitoring and collating data associated with an agricultural operation for the purpose of demonstrating compliance with an agricultural compliance plan (ACP). More specifically, a decentralized governance compliance (D-GRC) controller is described that is configured to generate a distributed ledger that dynamically processes compliance of individual actions associated with an ACP. The distributed ledger may be configured to track regulatory compliance associated with a cycle of agricultural activities associated with an agricultural product. Agricultural activities may include an inventory inspection of agricultural products, a facility inspection of a facility used for an agricultural operation, or vehicle inspection of vehicles used to transport agricultural products.Type: GrantFiled: March 25, 2020Date of Patent: July 4, 2023Assignee: iUNU, Inc.Inventors: Matthew Charles King, Ethan Victor Takla, Adam Phillip Takla Greenberg
-
Patent number: 11687642Abstract: A system and method for identifying and authenticating a counterfeit article using digital fingerprints are disclosed. The system comprises a server with a processor and memory, and a database. The memory is configured to store a set of modules executable by the processor. The set of modules include, but not limited to, a digital image acquisition module, a comparison module, and a decision module. The digital image acquisition module is configured to extract analog identification indicium of the article from one or more images. The comparison module is configured to compare analog identification indicium with actual analog identification indicium of the article. The decision module detects the authenticity of the article based on the comparison results. The system further comprises an anti-counterfeiting network verification system in communication with the server, configured to securely protect the actual analog identification indicium of the article from unauthorized access and other potential crimes.Type: GrantFiled: October 23, 2019Date of Patent: June 27, 2023Assignee: Blue Cromos Management ABInventor: Fredrik Pontén
-
Patent number: 11681826Abstract: Systems and methods for protection of data across multiple users and devices are disclosed. According to one embodiment, in privacy server comprising at least one computer processor, a method for protection of data across multiple users and devices may include: (1) receiving, from a first user device, a data sharing permission for the first user device and a data sharing permission for a second user device, the first user device and the second user device associated with the same user; (2) provisioning the data sharing permission for the second user device; and (3) communicating the provisioned data sharing permission to the second user device, wherein the second user device shares data with the first user device according to the provisioned data sharing permission.Type: GrantFiled: December 1, 2020Date of Patent: June 20, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Tuan Dao, Howard Spector, Jeremy F. Bennett, Rod Bachelor, Pavan Mummareddi, Ralph Darmo
-
Patent number: 11669625Abstract: A processor includes a register to store an encoded pointer to a memory location in memory and the encoded pointer is to include an encrypted portion. The processor further includes circuitry to determine a first data encryption factor based on a first data access instruction, decode the encoded pointer to obtain a memory address of the memory location, use the memory address to access an encrypted first data element, and decrypt the encrypted first data element using a cryptographic algorithm with first inputs to generate a decrypted first data element. The first inputs include the first data encryption factor based on the first data access instruction and a second data encryption factor from the encoded pointer.Type: GrantFiled: December 26, 2020Date of Patent: June 6, 2023Assignee: Intel CorporationInventors: David M. Durham, Karanvir S. Grewal, Michael D. LeMay, Salmin Sultana
-
Patent number: 11671454Abstract: Systems, methods, and computer-readable media for communications between applications in a mobile operating system. A first application may receive a request for data from a second application. The first application may generate a first URL to the second application, a parameter of the first URL comprising an identifier of the first application. A mobile operating system may access the first URL to open the second application. The second application may validate credentials for an account and initiate a server on a port. The second application may generate a second URL to the first application, a parameter of the second URL comprising the port. The operating system may access the second URL to open the first application. The first application may establish a connection with the server using the port specified in the second URL and receive data from the second application via the connection with the server.Type: GrantFiled: June 10, 2021Date of Patent: June 6, 2023Assignee: Capital One Services, LLCInventor: Stephane Lunati
-
Patent number: 11663353Abstract: A system includes a server configured to store a plurality of imagery configured to be presented in an email template on an electronic device. The server is configured to receive a request to retrieve an imagery of the plurality of imagery for use in the email template. The system also includes a controller configured to perform operations that include monitoring information associated with the request, comparing monitored information associated with the request with expected information associated with the request, and determining unauthorized usage of the email template based on a mismatch between the monitored information and the expected information.Type: GrantFiled: May 11, 2021Date of Patent: May 30, 2023Assignee: United Services Automobile Association (USAA)Inventor: Christopher Thomas Wilkinson
-
Patent number: 11663315Abstract: A computer system for just-in-time authentication displays a user interface comprising a first portion and a second portion. The first portion of the user interface is associated with a first permission attribute, and the second portion of the user interface is associated with a second permission attribute. The first permission attribute is associated with a first user and the second permission attribute is associated with a second user. The computer system receives, from one or more proximity sensors, a proximity of the second user relative to the user interface. The computer system also receives, from an identity-verification sensor, a verification of an identification of the second user. Further, the computer system activates the second portion of the user interface for interaction from the second user.Type: GrantFiled: January 29, 2021Date of Patent: May 30, 2023Assignee: MasterControl Solutions, Inc.Inventors: Chad Milito, Terrance Lanham Holbrook, Brian Curran, Alan Rencher
-
Patent number: 11663314Abstract: An embodiment device comprises a first processing unit configured to process an initial data line and deliver a first processed data line, a first delay unit coupled to the output of the first processing unit and configured to deliver a delayed first processed data line delayed by a first delay, a second delay unit configured to deliver the delayed initial data line delayed by a second delay, a second processing unit coupled to the output of the second delay unit and configured to process the delayed initial data line and deliver a delayed second processed data line, and a comparison unit configured to compare the contents of the delayed first and second processed data lines and deliver a non-authentication signal if the contents are not identical, the first and second delays being equal to a variable value.Type: GrantFiled: October 15, 2020Date of Patent: May 30, 2023Assignee: STMicroelectronics (Rousset) SASInventor: Olivier Giaume
-
Patent number: 11657138Abstract: An example computing device includes a memory accessible at startup of the computing device, a buffer, and a set of instructions. The memory stores a configuration setting that is configurable by the application of a change request. The memory also stores a first public key and a second public key. The buffer stores change requests submitted by a remote entity, including a first change request to make a first setting change and a second change request to make a second setting change. The first change request is signed by a first private key corresponding to the first public key, and the second change request is signed by a second private key corresponding to the second public key. The set of instructions retrieves a change request from the buffer, determines whether the change request is authenticated by a public key, and if authenticated, applies the change request.Type: GrantFiled: February 28, 2019Date of Patent: May 23, 2023Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Richard Alden Bramley, Jr., Dallas M. Barlow, Patrick Lee Gibbons, Adrian John Baldwin, Tevin Jaupaul Richards, Robert Stephen Craig, Valiuddin Ali, Jeffrey Kevin Jeansonne
-
Patent number: 11658803Abstract: A method, apparatus, and computer program product for processing a data record including encrypted and decrypted data is described. Various embodiments include receiving a data record including ciphertext and plaintext blocks and determining whether each block in the data record is a ciphertext block or a plaintext block. If a block is a ciphertext block, the ciphertext block is stored into a ciphertext record, decrypted into a plaintext block utilizing a decryption algorithm, and stored in a plaintext record. If the block is a plaintext block, the plaintext block is stored into the plaintext record, encrypted into a ciphertext block utilizing an encryption algorithm, and stored in the ciphertext record. Embodiments described also include authenticating the data record by passing each block of the ciphertext record to an authentication scheme and outputting the plaintext record to a destination application.Type: GrantFiled: March 11, 2021Date of Patent: May 23, 2023Assignee: Mellanox Technologies, Ltd.Inventors: Boris Pismenny, Liran Liss, Ilya Lesokhin
-
Patent number: 11658982Abstract: Efficient authentication in a file system with multiple security groups is disclosed. A file system (FS) executing on at least one processor device receives, from a first client application of a plurality of client applications, a request to access a first object, the request including a unique object ID that identifies the first object. The FS determines, based on a data structure maintained by the FS and inaccessible to the first client application, that the first client application is associated with a first security group of a plurality of different security groups. The FS determines, based on metadata of the first object, that the first object is associated with the first security group, and grants the first client application access to the first object.Type: GrantFiled: October 6, 2017Date of Patent: May 23, 2023Assignee: Red Hat, Inc.Inventors: Shyamsundar Ranganathan, Jeffrey Darcy, Pranith K. Karampuri, Vijay Bellur
-
Patent number: 11650936Abstract: Systems and methods are provided for binding one or more components to an identification component of a hardware module. Each of the serial numbers for the one or more components are included within a module-specific authentication certificate that is stored within the identification component of the hardware module. When connected to a computing platform, an authentication system of the computing platform is capable of retrieving the module-specific authentication certificate. The authentication system can compare the list of serial numbers included in the module-specific authentication certificate with one or more serial numbers read over a first interface. If the two lists of serial numbers match, the authentication system can flag the hardware module as authenticate through authentication of all components of the hardware module.Type: GrantFiled: July 10, 2020Date of Patent: May 16, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Melvin K. Benedict, Nigel Edwards, Eric L. Pope
-
Patent number: 11645378Abstract: Examples disclosed herein relate to receiving an authentication credential from a user, generating a security key associated with a physical document selected for an image capture operation, receiving a request for a captured image file of the physical document, and providing the captured image file of the physical document upon determining that the request comprises the security key.Type: GrantFiled: February 11, 2019Date of Patent: May 9, 2023Assignee: Hewlett-Packard Development Company, L.P.Inventors: Shakti Amarendra, Vasu Agrawal, Balaji Yalamarthi, Anusha Ghali, . Sharanabasappa
-
Patent number: 11645426Abstract: An approach is provided to manage in-flight drones. The approach identifies a drone at a drone charging station with the identified drone being unauthorized to be at the drone charging station. Responsively, the approach then secures the identified drone and removes the identified drone from the drone charging station.Type: GrantFiled: January 22, 2021Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Jennifer L. Szkatulski, Shikhar Kwatra, Vijay Ekambaram, Padmanabha Venkatagiri Seshadri, Vijay Kumar Ananthapur Bache, Atul Mene