Patents by Inventor Marcel Yung

Marcel Yung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250055693
    Abstract: The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device.
    Type: Application
    Filed: October 31, 2024
    Publication date: February 13, 2025
    Inventors: Gang Wang, Marcel Yung
  • Patent number: 12166886
    Abstract: The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device.
    Type: Grant
    Filed: June 21, 2022
    Date of Patent: December 10, 2024
    Assignee: Google LLC
    Inventors: Gang Wang, Marcel Yung
  • Patent number: 11388006
    Abstract: The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: July 12, 2022
    Assignee: Google LLC
    Inventors: Gang Wang, Marcel Yung
  • Publication number: 20210385085
    Abstract: The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device.
    Type: Application
    Filed: September 3, 2019
    Publication date: December 9, 2021
    Applicant: Google LLC
    Inventors: Gang Wang, Marcel Yung
  • Publication number: 20210367784
    Abstract: The present disclosure provides a secure, user-transparent, and highly efficient content provider-specific identifier read-only cookie (“ROC”). These ROCs can be generated by the client device and encrypted with a public key of the content provider, preventing third parties from indirectly identifying matches. The ROCs can include authentication token to enable the client device to determine whether the ROC was cached or otherwise misused by a content provider or other third-party.
    Type: Application
    Filed: April 16, 2019
    Publication date: November 25, 2021
    Applicant: Google LLC
    Inventors: Yian Gao, Gang Wang, Marcel Yung
  • Publication number: 20200366754
    Abstract: At least one aspect is directed to improving performance of a data processing system processing content item operations by identifying fraudulent content item operations. The data processing system can receive a content item operation including a content item device identifier and an attestation token from a client device. The attestation token can include a public key associated with the computing device, an attestation token time stamp, a message payload, and an embedded digital signature. The data processing system can verify a digital signature of a combination of the public key, the attestation token time stamp, and the message payload using the public key as a signature verification key. The system may process the content item operation only if the digital signature verification process succeeds.
    Type: Application
    Filed: August 8, 2019
    Publication date: November 19, 2020
    Applicant: Google LLC
    Inventors: Gang Wang, Marcel Yung
  • Patent number: 10616765
    Abstract: Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able to directly or indirectly, via an authorized resolver device, translate an encrypted broadcast into the identifiable information. The wireless security scheme disclosed herein also pertains to resolving the concealed data messages to obtain the identifiable information.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: April 7, 2020
    Assignee: Google LLC
    Inventors: Alon Ziv, Marcel Yung, Avinatan Hassidim, Yossi Matias
  • Patent number: 10158616
    Abstract: Systems and methods for online access credential transition are described, including receiving a first string of elements associated with a subsequent online access credential, during a credential transition period, receiving a second string of elements associated with an attempted subsequent online access credential, performing a matching operation to determine a degree of matching between the first string of elements and the second string of elements, and based on the degree of matching between the first string of elements and the second string of elements, providing online feedback, and prompting another attempted subsequent online access credential.
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: December 18, 2018
    Assignee: Google LLC
    Inventors: Dimitri Kanevsky, Marcel Yung
  • Publication number: 20180007555
    Abstract: Methods and systems are provided for concealing identifying data that may be used to identify a beacon or device in broadcasts unless an observer device is able to directly or indirectly, via an authorized resolver device, translate an encrypted broadcast into the identifiable information. The wireless security scheme disclosed herein also pertains to resolving the concealed data messages to obtain the identifiable information.
    Type: Application
    Filed: September 18, 2017
    Publication date: January 4, 2018
    Applicant: Google Inc.
    Inventors: Alon Ziv, Marcel Yung, Avinatan Hassidim
  • Publication number: 20080025510
    Abstract: A method of distributed cryptography for high consequence security systems which employs shared randomness between operating parties. Shared randomness is accomplished by sharing cryptographic keys stored in secure hardware tokens by potentially less secure software or general purpose computing units that perform distributed cryptography. The shared randomness is based on shared keys (at the tokens) and unique context. Shared random values are incorporated into the computation of partial results used in the distributed cryptographic calculation. The incorporation of shared randomness provides a hand-shake among the hardware tokens. When the operation is successful, a result is computed with assurance that the correct parties have taken part in forming the result. The hand-shake assures binding of operating parties and added system security.
    Type: Application
    Filed: August 31, 2007
    Publication date: January 31, 2008
    Inventors: Marcel Yung, Yair Frankel
  • Publication number: 20050018840
    Abstract: A method of distributed cryptography for high consequence security systems which employs shared randomness between operating parties. Shared randomness is accomplished by sharing cryptographic keys stored in secure hardware tokens by potentially less secure software or general purpose computing units that perform distributed cryptography. The shared randomness is based on shared keys (at the tokens) and unique context. Shared random values are incorporated into the computation of partial results used in the distributed cryptographic calculation. The incorporation of shared randomness provides a hand-shake among the hardware tokens. When the operation is successful, a result is computed with assurance that the correct parties have taken part in forming the result. The hand-shake assures binding of operating parties and added system security.
    Type: Application
    Filed: July 29, 2004
    Publication date: January 27, 2005
    Inventors: Marcel Yung, Yair Frankel