Patents Issued in December 24, 2020
  • Publication number: 20200401686
    Abstract: A system includes at least one data processor and memory storing instructions which, when executed by the at least one data processor, configures the at least one data processor to: provide, via a display, a visual stimulus including an animation containing at least a first object and a second object, the visual stimulus prompting for user input for authentication to a virtual domain; monitor movement of a user while providing the visual stimulus; identify, based on the monitoring, a sequence of dwell times of a characteristic of the user's movement with respect to the first object and the second object; compare the identified sequence of dwell times to a stored sequence of dwell times; and provide the comparison to enable authentication of the user in the virtual domain. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventor: Thierry Duchastel
  • Publication number: 20200401687
    Abstract: The disclosure relates to systems and methods for authorization of a user in a spatial 3D environment. The systems and methods can include receiving a request from an application executing on a mixed reality display system to authorize the user with a web service, displaying to the user an authorization window configured to accept user input associated with authorization by the web service and to prevent the application or other applications from receiving the user input, communicating the user input to the web service, receiving an access token from the web service, in which the access token is indicative of successful authorization by the web service, and communicating the access token to the application for authorization of the user. The authorization window can be a modal window displayed in an immersive mode by the mixed reality display system.
    Type: Application
    Filed: June 5, 2020
    Publication date: December 24, 2020
    Inventor: Genevieve Mak
  • Publication number: 20200401688
    Abstract: The present invention is directed to an information processing apparatus, comprising: upon accepting updating of a program, switching a predetermined verification function that is included in verification functions to an enabled state or a disabled state based on setting information regarding the verification functions for verifying validity of programs; and updating the program, wherein the control method further includes switching the predetermined verification function to the disabled state before the program is updated, and switching the predetermined verification function to the enabled state after updating of the program is ended.
    Type: Application
    Filed: June 15, 2020
    Publication date: December 24, 2020
    Inventor: Takumi Michishita
  • Publication number: 20200401689
    Abstract: A system provides resource monitoring and transmitting electronic alerts using event-based triggers. The system may determine, based on a user's identity, that the user requires additional security and monitoring products and/or services with respect to the user's account. In this regard, the system may continuously monitor the user's activity (e.g., to monitor a resource associated with the user account). The system may further define user events which may trigger the transmission of electronic alerts sent to computing devices of the user and/or third parties associated with the user.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 24, 2020
    Applicant: Bank of America Corporation
    Inventors: Andrew DongHo Kim, Enrique L. Valdez
  • Publication number: 20200401690
    Abstract: A sanitization circuit for sanitizing and authenticating a semiconductor device and method thereof are provided. The sanitization circuit is integrated in the semiconductor device and includes a memory verification module configured to verify any pre-programmed memory integrated in the semiconductor device; a memory eraser module configured to erase data stored in at least volatile memory accessed by the semiconductor device; and an implanted circuitry detection module configured to detect any unintended circuitry added to the semiconductor device.
    Type: Application
    Filed: June 22, 2020
    Publication date: December 24, 2020
    Applicant: Kameleonsec Inc.
    Inventors: Jorge MYSZNE, Ido NASHTEIN, Efi SASSON, Yigal EDERY
  • Publication number: 20200401691
    Abstract: Computing systems with dynamic architectures may be used to secure against code-injection attacks and other exploits. A system may generate multiple representations of instructions or other data associated with each of a set of configurations of the system. The system may periodically or randomly change configurations such that malicious code that is executable in one configuration cannot be executed in another configuration. A system may also detect malicious code by comparing code previously generated in one representation with different representations of the same code. If, during execution of a representation of a program code, the system determines that the representation specifies instructions that differ from other representations of the same program code, they system may stop executing the compromised program code, change its configuration, and continue to execute another representation of the program code that has not been compromised.
    Type: Application
    Filed: June 19, 2020
    Publication date: December 24, 2020
    Inventors: Paul G. Flikkema, Bertrand F. Cambou, James D. Palmer
  • Publication number: 20200401692
    Abstract: A management system detects a change at the target device. The management system transmits a request message to authorization devices of the authorization users of the multi-user authorization pool to from the authorization users an indication of whether the detected change is approved. The management system receives a plurality of response messages from authorization devices of the multi-user authorization pool indicating whether the detected change is approved by the corresponding authorization user, and based on at least three of the plurality of response messages indicating a disapproval, that the detected change is disapproved. In response to the determination that the change is disapproved, an instruction message is sent to a target managed device to instruct the target managed device to rollback to an earlier state.
    Type: Application
    Filed: June 21, 2020
    Publication date: December 24, 2020
    Inventors: Robert Pike, Gary Zelanko, Bryan Greene
  • Publication number: 20200401693
    Abstract: To confirm whether a computer in a kitted state kitted by kitting equipment is valid. Validity confirmation equipment (30) confirms whether a computer (10) in a kitted state kitted by kitting equipment (20) is valid. The validity confirmation equipment (30) includes a storage unit (32) that stores validity confirmation data set in advance in association with the kitting equipment (20), and a validity confirmation program used for confirming the validity of kitting work on the basis of the validity confirmation data. The validity confirmation equipment (30) starts the computer (10) using the validity confirmation program when the validity confirmation equipment (30) is connected to the computer (10) and then the computer is powered on, thereby causing the computer (10) to judge whether the kitted state is valid on the basis of the validity confirmation data.
    Type: Application
    Filed: May 13, 2020
    Publication date: December 24, 2020
    Inventors: Kazuhiro YAMATO, Hiroji NISHI
  • Publication number: 20200401694
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Application
    Filed: September 3, 2020
    Publication date: December 24, 2020
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Publication number: 20200401695
    Abstract: Certain examples described herein relate to components of a network computer system. These components may be one or more of a client computing device and a server computing device communicatively coupled to each other over a network. An example client computing device has a data storage device storing a plurality of files and a system agent. The system agent operates to apply a hash function to binary data read from the plurality of files to generate a set of data signatures. An example server computing device has a database interface to access a database representing a state of the network and data storage to store a set of exemplar data signatures resulting from a scan of one or more exemplar computing devices, each data signature being generated by applying a hash function to binary data representing a file. The client computing device is configured to receive the set of exemplar data signatures and compare these with the generated set of data signatures.
    Type: Application
    Filed: June 11, 2020
    Publication date: December 24, 2020
    Inventor: Andrew MAYO
  • Publication number: 20200401696
    Abstract: Mechanisms are provided to perform security incident disposition operations. A security incident is received that includes a security incident data structure comprising metadata describing properties of the security incident, and a corresponding security knowledge graph which includes nodes representing elements associated with the security incident and edges representing relationships between the nodes. The security incident data structure and security knowledge graph are processed to extract a set of security incident features corresponding to the security incident and input the extracted set of security incident features into a trained security incident machine learning model. The model generates a disposition classification output based on results of processing the extracted set of security incident features. The disposition classification output is output to the source of the security incident data structure.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventors: Burkhard Ringlein, Preeti Ravindra, Bradley E. Harris, Moazzam Khan, James B. Peterson
  • Publication number: 20200401697
    Abstract: Methods, apparatus, systems and articles of manufacture to create malware detection rules are disclosed. An example apparatus includes a rule generator to generate an augmented rule set based on a first training data set. A matrix generator is to create a matrix using the augmented rule set and a second training data set. A rule regulator to apply regularization to the augmented rule set based on the matrix to remove any number of rules from the augmented rule set, the rule regulator to create a reduced rule set. A reduced rule set checker to validate the reduced rule set.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 24, 2020
    Inventor: Nicholas T. Smith
  • Publication number: 20200401698
    Abstract: Provided is an analysis system including: an operation analysis unit that analyzes operation of an analysis target program that is a target program to be analyzed, by executing the analysis target program in a second execution environment that is a computing environment for analysis, the second execution environment being configured to emulate at least a partial configuration of a first execution environment that is a computing environment for real operation where the analysis target program is able to be executed; and a configuration unit that builds the second execution environment capable of emulating a specific configuration of the first execution environment, the specific configuration relevant to an operation of the analysis target program, by modifying at least a partial configuration of the second execution environment in accordance with the operation of the analysis target program analyzed by the operation analysis unit.
    Type: Application
    Filed: August 11, 2020
    Publication date: December 24, 2020
    Applicant: NEC Corporation
    Inventor: Masaru KAWAKITA
  • Publication number: 20200401699
    Abstract: Herein disclosed are approaches for protecting sensitive information within a fingerprint authentication system that can be snooped and utilized to access the device, secured information, or a secured application. The approaches can utilize encryption keys and hash functions that are unique to the device in which the fingerprint authentication is being performed to protect the sensitive information that can be snooped.
    Type: Application
    Filed: June 19, 2020
    Publication date: December 24, 2020
    Applicant: Analog Devices, Inc.
    Inventors: Patrick RIEHL, Tze Lei POO
  • Publication number: 20200401700
    Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to facilitate and/or support one or more operations and/or techniques for securing and/or managing IoT-type devices, such as implemented, at least in part, via one or more behavioral electronic documents and/or one or more electronic communications.
    Type: Application
    Filed: November 21, 2019
    Publication date: December 24, 2020
    Inventors: Brendan James Moran, Tony John Ibbs, Georgios Psimenos
  • Publication number: 20200401701
    Abstract: A method and system for security vulnerability diagnostic assessment of an enterprise software application. The method comprises receiving, at a security assessing server, a set of technical attributes of the software application; receiving a set of execution context attributes of the software application; and determining a security vulnerability diagnostic score for the software application based at least in part on the set of technical attributes and the set of execution context attributes.
    Type: Application
    Filed: June 21, 2019
    Publication date: December 24, 2020
    Inventors: Matthew Canada, Jerry Allen Craig, II, Kathrine Dass, Raja Krishnamurthy, David Anthony Rigsby, Richard Nathan Toney
  • Publication number: 20200401702
    Abstract: This invention is a computer-implemented method and system of using a secondary classification algorithm after using a primary source code vulnerability scanning tool to more accurately label true and false vulnerabilities in source code. The method and system use machine learning within a 10% dataset to develop a classifier model algorithm. A selection process identifies the most important features utilized in the algorithm to detect and distinguish the true and false positive findings of the static code analysis results. A personal identifier is used as a critical feature for the classification. The model is validated by experimentation and comparison against thirteen existing classifiers.
    Type: Application
    Filed: June 24, 2020
    Publication date: December 24, 2020
    Inventors: George Karabatis, Foteini Cheirdari-Argiropoulos
  • Publication number: 20200401703
    Abstract: A platform is described for collecting and providing intelligence regarding security and/or other aspect(s), and for providing an assessment of the security and/or other aspects of the organization based on the collected and analyzed intelligence. In some implementations, the platform may assess security according to a lean security paradigm, and the platform may be described as a lean security intelligence platform. The platform provides a set of integrated tools for measurement, analytics, and reporting of security aspects and/or other aspects of an organization. The platform provides master assessment scores that gauge the maturity levels of the organization's overall security and/or compliance readiness, in some instances in accordance with Lean Security practices and/or principles. The platform provides access to an organization's analysis with respect to various metrics that are monitored over time determine whether the organization's performance is improving (or degrading) with respect to the metrics.
    Type: Application
    Filed: February 13, 2019
    Publication date: December 24, 2020
    Inventors: Andrew Charles Storms, Daniel C. Riedel
  • Publication number: 20200401704
    Abstract: Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.
    Type: Application
    Filed: August 31, 2020
    Publication date: December 24, 2020
    Inventors: Edward T. Bellis, Michael Roytman, Jeffrey Heuer
  • Publication number: 20200401705
    Abstract: A system for authenticating an encrypted device identity is provided. The system comprises a memory device with computer-readable program code stored thereon; a communication device connected to a network; and a processing device, wherein the processing device is configured to execute the computer-readable program code to: receive an encrypted device identification of a user device, the encrypted device identification comprising a stream of generated data; identify a unique stream pattern of the encrypted device identification, wherein the unique stream pattern is a distinguishable characteristic in the stream generated data; store the unique stream pattern; receive an interaction request comprising a provided device identification; analyze the provided device identification to determine if the provided device identification has the unique stream pattern; and based on determining that the provided device identification has the unique stream pattern, authenticate the interaction request.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Ion Chalmers Freeman
  • Publication number: 20200401706
    Abstract: A data comparison device holds first and second encrypted data of first and second plaintext, respectively. The first plaintext is divided into a plurality of blocks and the first encrypted data is generated by executing encryption of each of the plurality of blocks and shuffling of the plurality of blocks. The second plaintext is divided into a plurality of blocks and the second encrypted data is generated by executing encryption of each of the plurality of blocks. In at least one of the first encrypted data and the second encrypted data, a plaintext value is embedded as a value indicating a magnitude comparison result, and the data comparison device compares blocks at the same position before shuffling of the first encrypted data and the second encrypted data based on the embedded value and determines a magnitude relationship between the first plaintext and the second plaintext.
    Type: Application
    Filed: June 2, 2020
    Publication date: December 24, 2020
    Inventors: Masayuki YOSHINO, Ken NAGANUMA, Hisayoshi SATO
  • Publication number: 20200401707
    Abstract: A system for a storage medium that provides a method of integrating a non-volatile display, such as an e-paper with an electronic storage medium, and including a self-encrypting solid-state memory device. The system utilizes existing e-paper technology coupled with a receiver that can access various types of information to be displayed on the e-paper. This information can be dynamic user data, administrative data, security data, or other information. The receiver may obtain this information via wireless communication, through meta data on the storage medium, through a direct link through the storage medium or other related methodology.
    Type: Application
    Filed: June 3, 2020
    Publication date: December 24, 2020
    Inventor: JACK WADE
  • Publication number: 20200401708
    Abstract: Methods and systems for using consent policies to determine whether to proceed with actions relative to persons based on a hierarchy of consent values for that person are described. Responsive to a query, records are retrieved which pertain to a person's consent for another entity to perform an action relative to the person in view of data privacy laws. A consent policy is selected. The selected consent policy includes rules that are configurable to reflect a manner to comply with data privacy laws. The selected consent policy is applied to the records. Applying the selected consent policy comprises applying rules to find a result for a second level of the hierarchy of consent values, determining a result for a first level of the hierarchy of consent values, and applying rules to determine whether to proceed with the action relative to the person.
    Type: Application
    Filed: June 21, 2019
    Publication date: December 24, 2020
    Applicant: salesforce.com, inc.
    Inventor: Michael Allan Friedman
  • Publication number: 20200401709
    Abstract: Managing user access to data of a social media account, by providing a first user with access to data of a social media account of a second user based on determining that a first data access request by the first user conforms to an expected data access pattern.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Aparna Subramanian, Shishir Saha
  • Publication number: 20200401710
    Abstract: Described embodiments provide a method, computer program product, and computer system for identifying a user that is proximate to a computing device. The age type of the user may be identified. It may be determined that content displayed on the computing device is not permitted for the age type of the user. Display of the content may be altered on the computing device based upon, at least in part, determining that the content displayed on the computing device is not permitted for the age type of the user.
    Type: Application
    Filed: August 21, 2019
    Publication date: December 24, 2020
    Inventors: DAOWEN WEI, Jian Ding, Hengbo Wang
  • Publication number: 20200401711
    Abstract: Aspects of the disclosure relate to dynamically controlling access to linked content in electronic communications. A computing platform may receive, from a user computing device, a request for a uniform resource locator associated with an email message and may evaluate the request using one or more isolation criteria. Based on evaluating the request, the computing platform may identify that the request meets at least one isolation condition associated with the one or more isolation criteria. In response to identifying that the request meets the at least one isolation condition associated with the one or more isolation criteria, the computing platform may initiate a browser mirroring session with the user computing device to provide the user computing device with limited access to a resource corresponding to the uniform resource locator associated with the email message.
    Type: Application
    Filed: May 15, 2020
    Publication date: December 24, 2020
    Inventors: Conor Brian Hayes, Michael Edward Jones, Alina V. Khayms, Kenny Lee, David Jonathan Melnick, Adrian Knox Roston
  • Publication number: 20200401712
    Abstract: A computer program product, a computerized apparatus and a method for strengthening the security of Command Line Interface (CLI) of an Operating System (OS), by limiting the allowed operations via the CLI. The method comprises: obtaining a user account having an access to the OS via a CLI configured to receive commands from the user and execute a predetermined functionality in the OS; creating an operation profile for the user account having a list of authorized commands in the CLI for the user account that excludes a command of the CLI or a parameter thereof; and deploying a CLI-Replacement Component (CRC) in the OS that is associated with the user account. The CRC is a CLI layer that is configured to limit executed commands in the OS based on the operation profile, whereby the CRC only sends commands adhering with the operation profile for execution by the OS.
    Type: Application
    Filed: September 1, 2020
    Publication date: December 24, 2020
    Inventor: Gil KEINI
  • Publication number: 20200401713
    Abstract: The system may include a method comprising requesting, by a computer, a receiver identifier associated with a receiver; receiving, by the computer, the receiver identifier in association with content; constructing, by the computer, a URL link comprising access to DICOM viewer code, DICOM data for the selected images, a sender identifier and the receiver identifier; generating, by the computer, a notification to the receiver, wherein the notification includes the URL link; and transmitting, by the computer, the notification to a receiver based on the receiver identifier.
    Type: Application
    Filed: September 8, 2020
    Publication date: December 24, 2020
    Applicant: MyMedicalImages.com, LLC
    Inventor: Troy Berg
  • Publication number: 20200401714
    Abstract: A method, apparatus, and computer program product for validating a structured data object. A computer system receives a request to access enterprise data within a human resources database. The request is received from a consuming service within an authentication context of the user. The computer system determines a view context for the human resources (HR) database by applying a business rule to the authentication context. The business rule comprises a set of data nodes that are composed into a structured data object according to a domain specific language. The computer system creates a data view of the human resources database according to the view context determined by the business rule. The computer system provides the data view to the consuming service. The consuming service natively accesses the enterprise data through the data view.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventors: Eitan Klein, Dan Bar-Lev, Richard Noad, Norman Azoulay, Robert Shewan
  • Publication number: 20200401715
    Abstract: A first request to perform an entity resolution operation is received from a first client. The first request is related to a first record uploaded by the first client. The first record has one or more first attributes. The first record is stored in a secure data store. The first request is transmitted to a first program split of a secure multi-party computation. An entity resolution operation is performed by the first program split of the secure multi-party computation and by a third program split of the secure multi-party computation. The entity resolution operation is performed based on the received request. The entity resolution operation is related to the first record and one or more second records uploaded to the secure data store by a second client. The third program split of the secure multi-party computation operates in the secure data store.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Jeb R. Linton, Dennis Kramer, Michael Amisano, John Melchionne
  • Publication number: 20200401716
    Abstract: An example method comprises: receiving a natural language text; transforming, by a neural network, the natural language text into a numeric representation comprising a plurality of numeric values; discarding the natural language text; and performing, using the numeric representation of the natural language text, an information extraction task.
    Type: Application
    Filed: June 16, 2020
    Publication date: December 24, 2020
    Inventors: David Yan, Victor Kuznetsov, Anton Kirillov, Viacheslav Seledkin
  • Publication number: 20200401717
    Abstract: Embodiments disclosed herein relate to systems and methods for providing a smart cache. In embodiments, a variable time to live (TTL) may be calculated and associated with data as it is stored in a cache. The variable TTL may be calculated based upon reputation and/or category information related to the source of the data. The reputation and/or category information may include TTL modifiers for adjusting the TTL for data from a particular data source that is stored in the cache. In further embodiments, a feedback method may be employed to update reputation and/or category information for a particular data source.
    Type: Application
    Filed: June 29, 2020
    Publication date: December 24, 2020
    Inventors: HAL CASE LONAS, JR., THOMAS W. HELVEY
  • Publication number: 20200401718
    Abstract: The invention relates to a method for cryptographically secure storing a file (101) using a web application executed by a web browser (106) on a user computer system (104, 162, 168) of a user (102, 160). The method comprises: encrypting the file (101) on the user computer system (104, 162, 168) by the web application, providing a distribution plan by the web application, fragmenting the encrypted file (101) on the user computer system (104, 162, 168) by the web application into a plurality of file fragments (F1-F4) according to the distribution plan, sending the resulting file fragments (F1-F4) by the web application over the network (178) to the storage services identified by the distribution plan (SD1-SD6).
    Type: Application
    Filed: December 20, 2018
    Publication date: December 24, 2020
    Applicants: Bundesdruckerei GMBH, NEXENIO GMBH
    Inventors: Patrick HENNIG, Maxim SCHNJAKIN, Philipp BERGER, Manfred PAESCHKE
  • Publication number: 20200401719
    Abstract: In general, techniques for data access control are described, in which a policy engine implements and applies a declarative policy framework that can represent and reason about complex privacy policies. By using a common data model together with a formal shareability theory, this declarative policy framework enables the specification of expressive policies in a concise way without burdening the user with technical details of the underlying formalism of a data querying application or other knowledge representation scheme. The policy engine may be deployed as the policy decision point in a data access control system that also includes a policy enforcement point. The policy engine includes user interfaces for the creation, validation, and management of privacy policies. The policy engine may interface with systems that manage data requests and replies by coordinating policy engine decisions and access to databases.
    Type: Application
    Filed: September 4, 2019
    Publication date: December 24, 2020
    Inventors: Grit Denker, Karsten Martiny, Daniel Elenius
  • Publication number: 20200401720
    Abstract: A system and method for increasing user control of data comprising a first user device configured to create data; a user application configured to virtualize and fragment data created by the first user device; a data collector server configured to store, protect, and composite data fragments; a private user storage area configured to store and protect data fragments; and a second user device connected configured to request data uploaded by the first user device. The first user device creates data that gets sent the user application, which virtualizes, fragments and sends a majority of the data to the data collector servers and a minority of the data to the private user storage area. As a user via the second user device requests the data uploaded by the first user device, the data collector server composites the data fragments and transfers the composited data to the second user device.
    Type: Application
    Filed: June 17, 2020
    Publication date: December 24, 2020
    Applicant: TMRW Foundation IP & Holding S. À R.L.
    Inventor: Cevat Yerli
  • Publication number: 20200401721
    Abstract: A method for resolving ambiguity in computer data includes processing a record creation request transmitted from a computing device. The record creation request includes entity creation data and a login key. The login key includes a primary identifier and a password. The method also includes executing a matching algorithm with a selectable combination of the entity creation data at an entity database to identify a single entity record matching a selectable combination of the record creation request. The single entity record is linked to multiple different login keys. The method also includes updating one or more attributes of the single entity record with the entity creation data. Further, the method includes storing session data created during a session associated with the login key by using the login key to segregate the session data in the entity database, and linking the session data to the single entity record.
    Type: Application
    Filed: June 24, 2020
    Publication date: December 24, 2020
    Inventor: Michael H. Snyder
  • Publication number: 20200401722
    Abstract: Systems, methods, and devices for generating a secure join of database data are disclosed. A method includes determining data stored in a first account to be compared with data stored in a second account. The method includes determining a function for generating a secure join key, wherein the secure join key includes a hashed string that hashes one or more of a data entry of the first account and a data entry of the second account. The method includes providing the secure join key to the first account and/or the second account.
    Type: Application
    Filed: August 27, 2020
    Publication date: December 24, 2020
    Inventors: Justin Langseth, Matthew J. Glickman, Christian Kleinerman, Robert Muglia, Daniel Freundel, Thierry Cruanes, Allison Waingold Lee
  • Publication number: 20200401723
    Abstract: A data security method may include storing user data to a first device and storing metadata corresponding to the user data to a second device. The method may further include making a first determination that at least one device selected from the group of the first device and the second device is not in communication with a third device. The method may further include disabling utilization of the user data in response to the first determination.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventors: Li Li, Barnabas Kadlecsik, Itzhack Goldberg, Su Liu, Etai Lev Ran
  • Publication number: 20200401724
    Abstract: An electronic device is disclosed. In addition, various embodiments recognized through the specification are possible. The electronic device includes a sensor, a processor operatively connected with the sensor, and a memory, operatively connected with the processor, including instructions. The instructions, when executed by the processor, cause the processor to perform biometric authentication for a user of the electronic device using the sensor, while a call connection procedure is performed with an ARS server, receive a voice signal for requesting private information of the user from the ARS server and convert the voice signal into text, and determine private information requested by the ARS server among at least one private information of the user, the at least one private information being previously stored in the memory, based on the converted text, and transmit the determined private information to the ARS server.
    Type: Application
    Filed: January 8, 2019
    Publication date: December 24, 2020
    Inventor: Jihye SONG
  • Publication number: 20200401725
    Abstract: A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device.
    Type: Application
    Filed: January 27, 2020
    Publication date: December 24, 2020
    Inventors: Raif Khassanov, Eugene Luskin, Yakov P. Grinberg, Eugene Kolker
  • Publication number: 20200401726
    Abstract: This document describes a system and method for sharing datasets between various modules or users whereby identity attributes in each dataset are obfuscated. The obfuscation is done such that when the separate datasets are combined, the identity attributes remain obfuscated while the remaining attributes in the combined datasets may be recovered by the users of the invention.
    Type: Application
    Filed: November 20, 2017
    Publication date: December 24, 2020
    Applicant: Singapore Telecommunications Limited
    Inventors: Hoon Wei LIM, Chittawar VARSHA
  • Publication number: 20200401727
    Abstract: A user device comprises an app that stores and maintains exclusive control of user data, and causes one or more processors to send a request for services according to a trial period to a distributed ledger associated with service providers and anonymously interact with the service providers according to a set of rules maintained in the distributed ledger by passing along a token uniquely associated with the user during for the respective interaction with each service provider without the user data being shared with the service providers.
    Type: Application
    Filed: June 18, 2020
    Publication date: December 24, 2020
    Inventors: MARK ANTHONY HENNESSY, MURTAZA BULUT, MARK THOMAS JOHNSON
  • Publication number: 20200401728
    Abstract: A compromised data exchange system extracts data from websites using a crawler, detects portions within the extracted data that resemble personally identifying information (PII) data based on PII data patterns using a risk assessment module, and compares a detected portion to data within a database of disassociated compromised PII data to determine a match using the risk assessment module. A risk score may be assigned to a data item within the database in response to determining the match. In some embodiments, URL data may also be detected in the extracted data. The detected URL data represents further web sites that can be automatically crawled by the system to detect further PII data.
    Type: Application
    Filed: September 1, 2020
    Publication date: December 24, 2020
    Applicant: Early Warning Services, LLC
    Inventors: Lester Leland Lockhart, III, David Hugh Munson, Gregor R. Bonin, Michael Cook
  • Publication number: 20200401729
    Abstract: Technologies are shown for secure management of evaluation data that involves receiving an evaluation value signal from a source, the evaluation value signal relating to an evaluation entity having an evaluation score secured on an evaluation data blockchain and verifying whether the source is identified in trusted source data.
    Type: Application
    Filed: July 30, 2020
    Publication date: December 24, 2020
    Inventor: Fausto DASSENNO
  • Publication number: 20200401730
    Abstract: The present invention relates to a software-defined radio chip or module suitable for integration on a host device. The software-defined radio chip comprises digital signal processing capability which includes standard digital signal processing hardware and reconfigurable programmable logic, the reconfigurable programmable logic is configured in such a way as to provide secure digital signal processing capability to the software-defined radio, thereby providing a secure software-defined radio.
    Type: Application
    Filed: November 28, 2018
    Publication date: December 24, 2020
    Inventor: Joël M. CONUS
  • Publication number: 20200401731
    Abstract: In general, this disclosure describes scalable, partitionable encryption engines. The partitionable encryption engines of this disclosure yield power savings, such as by controlling operation of partitioned sub-datapaths at reduced clock rates. An apparatus includes an interface configured to receive a block of encrypted data for decryption, and a decryption engine in communication with the interface. The decryption engine includes a plurality of decryption sub-datapaths, where each respective decryption sub-datapath has no data interdependency with any other decryption sub-datapath of the plurality of decryption sub-datapaths. The decryption engine is configured to selectively enable one or more decryption sub-datapaths of the plurality of decryption sub-datapaths to decrypt the block of encrypted data to form a decrypted block of data.
    Type: Application
    Filed: June 19, 2019
    Publication date: December 24, 2020
    Inventor: Sudhir Satpathy
  • Publication number: 20200401732
    Abstract: A method for determining whether or not a display panel is a duplicate is provided. The method includes: generating, by a code generator in an electronic module, a code, the electronic module including a plurality of electronic components; transmitting, by the code generator, the code to each of a first sequence generator in the electronic module and a second sequence generator in a display panel, the display panel being configured to be mounted to the electronic module; generating, by the first sequence generator, a first response value, and transmitting the first response value to a certification component in the electronic module; generating, by the second sequence generator, a second response value, and transmitting the second response value to the certification component; and comparing, by the certification component, the received first response value and the received second response value.
    Type: Application
    Filed: May 28, 2020
    Publication date: December 24, 2020
    Inventors: Moon Sang HWANG, Weon Jun CHOE, Deok Jun CHOI
  • Publication number: 20200401733
    Abstract: A cryptographic accelerator (processor) retrieves data blocks for processing from a memory. These data blocks arrive and are stored in an input buffer in the order they were stored in memory (or other known order)—typically sequentially according to memory address (i.e., in-order.) The processor waits until a certain number of data blocks are available in the input buffer and then randomly selects blocks from the input buffer for processing. This randomizes the processing order of the data blocks. The processing order of data blocks may be randomized within sets of data blocks associated with a single read transaction, or across sets of data blocks associated with multiple read transactions.
    Type: Application
    Filed: July 7, 2020
    Publication date: December 24, 2020
    Inventors: Andrew John LEISERSON, Mark Evan MARSON
  • Publication number: 20200401734
    Abstract: Encrypting and sharing one or more data objects stored or to be stored in a personal storage that is associated with a DID. First an encryption/decryption key is generated using a passphrase and an identifier of the personal storage that stores or is to store a data object in the personal storage. The data object stored or to be stored in the personal storage is then encrypted by the generated encryption/decryption key. The encrypted data object is then stored in the personal storage. The encrypted data object may then be accessed by a DID management module that is configured to manage the DID or be shared to another entity that is not associated with the DID.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventors: Brandon MURDOCH, Ankur PATEL, Ronald John Kamiel Eurphrasia BJONES, Daniel James BUCHNER
  • Publication number: 20200401735
    Abstract: An audio device includes a sound emission section which outputs a sound, and a sound reception section in which a sound is inputted. The audio device, when an electronic device is connected thereto, outputs to the electronic device unique authentication information acquired in accordance with an instruction received from the electronic device so as to acquire the authentication information.
    Type: Application
    Filed: September 8, 2020
    Publication date: December 24, 2020
    Applicant: CASIO COMPUTER CO., LTD.
    Inventor: Hiroshi KUROSAWA