Patents Examined by Quazi Farooqui
  • Patent number: 12021981
    Abstract: An example method for a first host, being an owner of an object stored in a virtual storage area network (vSAN) cluster, to perform encryption and decryption operations during a rekey in the vSAN cluster is disclosed. The method includes obtaining a first encryption key and a first key identifier (ID) of the first encryption key; transmitting the first key ID and an active key index to a second host; using the first encryption key to perform encryption and decryption operations; and in response to a determination of receiving a key change notification from a master node of the vSAN cluster, terminating a connection with the second host.
    Type: Grant
    Filed: March 2, 2022
    Date of Patent: June 25, 2024
    Assignee: VMware, Inc.
    Inventors: Wenguang Wang, Abhay Kuamr Jain, Ruiling Dou, Tao Xie, Xin Li, Chandrakanth Gadhiraju, Kevin Rayfeng Li, Satish Pudi
  • Patent number: 12013925
    Abstract: The disclosure describes systems and methods for wirelessly authenticating devices based on proximity using time-of-flight.
    Type: Grant
    Filed: July 30, 2020
    Date of Patent: June 18, 2024
    Inventor: Bryant Hansen
  • Patent number: 12015711
    Abstract: The application provides a data security processing terminal, system and method, and is related to a field of data processing. The data security processing terminal includes: an image acquisition device configured to acquire image data and transmit the image data to a Trust Execution Environment through a secure channel; an image acquisition driver operating in the Trust Execution Environment and configured to drive, in response to a drive instruction from a processor, the image acquisition device to acquire the image data; the processor operating in the Trust Execution Environment and configured to send the drive instruction to the image acquisition driver, obtain the image data, encrypt the image data using a stored first key to obtain image ciphertext data, and output the image ciphertext data. The technical solution of the present applicant can be used to ensure the security of image data.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: June 18, 2024
    Assignee: CHINA UNIONPAY CO., LTD.
    Inventors: Jialiang Kang, Jien Zhou, Xi Shen
  • Patent number: 12010208
    Abstract: Multiple systems may determine neural-network output data and neural-network parameter data and may transmit the data therebetween to train and run the neural-network model to predict an event given input data. A data-provider system may perform a dot-product operation using encrypted data, and a secure-processing component may decrypt and process that data using an activation function to predict an event. Multiple secure-processing components may be used to perform a multiplication operation using homomorphic encrypted data.
    Type: Grant
    Filed: October 27, 2022
    Date of Patent: June 11, 2024
    Assignee: Via Science, Inc.
    Inventors: Kai Chung Cheung, Mathew Rogers, Jeremy Taylor
  • Patent number: 12008128
    Abstract: An image archiving facility creates an image and other data archive relating to an event at a location when prompted by a downloaded application for a host user. The host user may approve guest users to upload to the archive, Approval may come from an image of a person uploaded to the data archive and recognized from biometric data as an approved user. The host may control viewing of images in the archive either individually or generically.
    Type: Grant
    Filed: November 9, 2022
    Date of Patent: June 11, 2024
    Assignee: Hooga Holdings Pty Limited
    Inventors: Belinda Buckley, Adam Pryor, Toby Blyth
  • Patent number: 12002102
    Abstract: Provided are a system, method, and computer program product for patient authentication and identity risk assessment. The method includes receiving an initial patient authorization request from a medical provider computing device. The initial patient authorization request includes a patient identifier communicated by a mobile device of a user to the medical provider computing device. The method also includes generating, using an identification risk assessment model and based at least partly on the initial patient authorization request, an authenticity score. The method further includes communicating the authenticity score to an insurance provider system to cause the insurance provider system to approve or decline the initial patient authorization request. The method further includes receiving a primary insurance provider response from the insurance provider system and communicating at least a portion of the primary insurance provider response to the medical provider computing device.
    Type: Grant
    Filed: March 10, 2021
    Date of Patent: June 4, 2024
    Assignee: Visa International Service Association
    Inventors: William Joseph Leddy, III, Shengfei Gu, Minghua Xu
  • Patent number: 11989315
    Abstract: An information processing apparatus, a service providing system, and a method. The information processing apparatus stores in one or more memories, information on execution of each of a plurality of applications, which are available for use under a license contract and outputs suggestion to change the license contract according to a usage count of each application obtained from the information on execution of each application.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: May 21, 2024
    Assignee: RICOH COMPANY, LTD.
    Inventor: Yohta Kimura
  • Patent number: 11991275
    Abstract: Aspects and embodiments of the present invention relate to a method and system for generating a private cryptographic key for use in a secure cryptogram for transmission between a first entity and a second entity. The method may comprise: selecting a random vector defined in an n-dimensional vector space shared between the first entity and the second entity, the vector comprising one or more component coordinates defined in the n-dimensional vector space, each component coordinate being associated with one or more bits; determining the one or more bits associated with each component coordinate comprised in the random vector; and generating the private key in dependence on the one or more bits associated with each component coordinate comprised in the random vector.
    Type: Grant
    Filed: September 8, 2022
    Date of Patent: May 21, 2024
    Assignee: BTQ AG
    Inventors: Olivier Francois Roussy Newton, Andrew Deonarine, Nicolas Alexandre Roussy Newton, Railton Frith
  • Patent number: 11983547
    Abstract: System and methods discussed for automatically optimizing application and notification delivery based on user preferences and historical application usage. Applications that a user is likely to want to use at the present time or in the near future are displayed in an organizationally distinct way in an application catalog so they are easy to find and are pre-loaded on an application delivery server so they are available with minimal system lag caused by application loading processes. Application notifications are also optimized such that notifications that are likely to be relevant to users at the current time are identified and presented to them in an organizationally distinct way.
    Type: Grant
    Filed: May 18, 2021
    Date of Patent: May 14, 2024
    Assignee: Citrix Systems, Inc.
    Inventors: Xin Liu, Yimin Liu
  • Patent number: 11979421
    Abstract: In some examples, a system for decorating network traffic flows with outlier scores includes a processor and a memory device to store traffic flows received from a network. The processor is configured to receive a set of traffic flows from the memory device and generate a tree model to split the traffic flows into clusters of traffic flows. Each cluster corresponds with a leaf of the tree model. The processor is further configured to generate machine learning models for each of the clusters of traffic flows separately. For a new traffic flow, the processor is configured to identify a specific one of the machine learning models that corresponds with the new traffic flow, compute an outlier score for the new traffic flow using the identified specific one of the machine learning models, and decorate the new traffic flow with the outlier score.
    Type: Grant
    Filed: December 31, 2021
    Date of Patent: May 7, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yair Allouche, Aviad Cohen, Ravid Sagy, Ofer Haim Biller, Eitan Daniel Farchi
  • Patent number: 11979483
    Abstract: An encryption method, includes performing, by an encryption system, bit reversal permutation of pixel data of a 2D image, arranging the pixel data as first-pixel data, and applying the 2D image to a butterfly algorithm of fast Fourier transform; determining, by the encryption system, a plurality of data paths based on the first-pixel data; and performing, by the encryption system, a first encryption of the first-pixel data into second-pixel data on a specific data path based on a number of the specific data path among the plurality of data paths.
    Type: Grant
    Filed: March 15, 2022
    Date of Patent: May 7, 2024
    Assignee: Research & Business Foundation Sungkyunkwan University
    Inventors: Yeon Ho Lee, Jae Hun Song
  • Patent number: 11979489
    Abstract: A database stores a document as a plurality of encrypted records, where each record is indicative of an incremental change to the state of the document, and encrypted using a document key. The document key is stored with encryption decryptable using a group key, and the group key is stored with encryption decryptable using a first access key. In response to a request to rotate from the first access key to a second access key, the database decrypts the group key using the first access key, a stores a group key re-encrypted with the second access key.
    Type: Grant
    Filed: May 10, 2022
    Date of Patent: May 7, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Edwin Robbins, Bala Murali Krishna Ummaneni, Carr James Onstott, Thomas Barton, John Richter, Rong Xiao, Caroline Gordon, Shayna Weinstein
  • Patent number: 11968306
    Abstract: An integrated-circuit device comprises a physical-unclonable-function (PUF) unit, a secure module, and an interconnect system communicatively coupled to the PUF unit and to the secure module. The device transfers a PUF key from the PUF unit to the secure module, over the interconnect system. In order to do this, the secure module generates a random value. The secure module then sends the random value to the PUF unit. The PUF unit then performs a bitwise XOR operation between the received random value and the PUF key, to generate a masked value. The PUF unit then transfers the masked value over the interconnect system to the secure module. The secure module then unmasks the PUF key by performing a bitwise XOR operation between the received masked value and the random value.
    Type: Grant
    Filed: May 23, 2022
    Date of Patent: April 23, 2024
    Assignee: Nordic Semiconductor ASA
    Inventor: Frank Aune
  • Patent number: 11962686
    Abstract: Computer-readable media, methods, and systems are disclosed for handling intermediate data in connection with a database employing group-level encryption. Intermediate data is used during database operation and stored transiently such that the intermediate data is removed from memory upon database restart. To protect the privacy of the intermediate data, a random encryption key may be generated upon startup of a database instance. The random encryption key may be stored transiently. During database operation, the random encryption key may be used to encrypt and/or decrypt the intermediate data. The transient memory may be wiped upon database shut down such that the random encryption key is no longer accessible upon database restart.
    Type: Grant
    Filed: December 13, 2021
    Date of Patent: April 16, 2024
    Assignee: SAP SE
    Inventors: Dirk Thomsen, Till Merker
  • Patent number: 11961009
    Abstract: Various embodiments that pertain to artificial intelligence algorithms. A repository can retain a reusable common set of artificial intelligence algorithms. Different users can access this common set of artificial intelligence algorithms and employ individual artificial intelligence algorithms in programs as appropriately as they are developing different applications and/or products. Employment of these individual artificial intelligence algorithms can include, for example, tailoring parameters based on the desires of the individual user's desires using the same common set of algorithms or individually or as a group as appropriate.
    Type: Grant
    Filed: November 2, 2020
    Date of Patent: April 16, 2024
    Assignee: The Government of the United States, as represented by the Secretary of the Army
    Inventor: Radhika Roy
  • Patent number: 11956273
    Abstract: Systems, methods, and computer-readable media for discovering trustworthy devices through attestation and authenticating devices through mutual attestation. A relying node in a network environment can receive attestation information from an attester node in the network environment as part of a unidirectional push of information from the attester node according to a unidirectional link layer communication scheme. A trustworthiness of the attester node can be verified by identifying a level of trust of the attester node from the attestation information. Further, network service access of the attester node through the relying node in the network environment can be controlled based on the level of trust of the attester node identified from the attestation information.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: April 9, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
  • Patent number: 11949694
    Abstract: A malware profile is received. The malware profile comprises a set of n-tuples of attributes that describe one or more activities associated with executing a copy of a known malicious application that is associated with the malware profile. A set of one or more log entries is analyzed for a set of entries that matches the malware profile. Based at least in part on identifying the set of entries matching the malware profile, a determination is made that a host was compromised. In response to determining that the host has been compromised, a remedial action is taken with respect to the host.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: April 2, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Jun Wang, Wei Xu
  • Patent number: 11936784
    Abstract: Techniques are disclosed for enabling attested end-to-end encryption for transporting data between devices. In one example, a destination device receives a policy profile that includes an origination key and a destination key, and the origination key corresponds to a public transfer key of a source device. The destination device verifies the policy profile based on the destination key corresponding to a public transfer key of the source device. The destination device receives a signed encrypted data encryption key from the source device. The destination device receives encrypted data from the source device. The destination device verifies the signed encrypted data encryption key originated from the source device based on the signed encrypted data key being signed with a private attestation identity key that corresponds to a public attestation identity key of the source device. The destination device decrypts encrypted data using a private transfer key of the destination device.
    Type: Grant
    Filed: July 15, 2022
    Date of Patent: March 19, 2024
    Assignee: Oracle International Corporation
    Inventors: Brian Spencer Payne, Saikat Chakrabarti, Pratibha Anjali Dohare, Rehan Loring Iftikhar
  • Patent number: 11936774
    Abstract: A method (300) and system (1) of determining a common secret for two nodes (3, 7). Each node (3, 7) has a respective asymmetric cryptography pair, each pair including a master private key and a master public key. Respective second private and public keys may be determined based on the master private key, master public key and a deterministic key. A common secret may be determined at each of the nodes based on the second private and public keys. In one example, a node (3, 7) may determine the common secret based on (i) a second private key based on the node's own master private key and the deterministic key; and (ii) a second public key based on the other node's master public key and the deterministic key. The invention may be suited for use with, but not limited to, digital wallets, blockchain (e.g. Bitcoin) technologies and personal device security.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: March 19, 2024
    Assignee: nChain Licensing AG
    Inventors: Craig Steven Wright, Stephane Savanah
  • Patent number: 11930357
    Abstract: This invention is a system and method for verifying a sender of messages on a mobile network. Software on a cloud messaging service generates a public/private key pair. The private key is securely retained in a cloud wallet service and is accessible to a messaging cloud service (the trusted sender). The public key is shared with a subscriber device that receives messages from the messaging cloud service. The cloud messaging service receives an inbound message for the subscriber device from a trusted enterprise application via a secure connection. The cloud messaging service signs a special header to the message with its private key. When the message is received by the subscriber device, the public key resident on the device verifies the message header signed with the public key of the cloud messaging service thereby verifying the sender.
    Type: Grant
    Filed: July 17, 2023
    Date of Patent: March 12, 2024
    Assignee: Syniverse Technologies, LLC
    Inventors: Rajan John Thomas, Chris Wright