Patents Issued in February 1, 2024
-
Publication number: 20240039698Abstract: An encryption processing device that processes a ciphertext, the ciphertext being a fully homomorphic ciphertext that has a value obtained by adding an error with a predetermined variance to a predetermined value, as a plaintext associated with an integer and that enables a predetermined operation between integers to be performed without decryption, the device including a processor which executes a process including generating, based on a first ciphertext as a multiplier, a third ciphertext having a first stepped polynomial as a plaintext and performing an operation based on the third ciphertext and a second ciphertext as a multiplicand to calculate a ciphertext corresponding to a result of multiplication between plaintexts of the first ciphertext and the second ciphertext as a fourth ciphertext of an operation result.Type: ApplicationFiled: July 13, 2023Publication date: February 1, 2024Applicant: AXELL CORPORATIONInventors: Yusuke HOSHIZUKI, Kotaro MATSUOKA
-
Publication number: 20240039699Abstract: A system and method for the analysis of log data is presented. The system uses SuperMinHash based locality sensitive hash signatures to describe the similarity between log lines. Signatures are created for incoming log lines and stored in signature indexes. Later similarity queries use those indexes to improve the query performance. The SuperMinHash algorithm uses a two staged approach to determine signature values, one stage uses a first random number to calculate the index of the signature value that is to update. The two staged approach improves the accuracy of the produced similarity estimation data for small sized signatures. The two staged approach may further be used to produce random numbers that are related, e.g. each created random number may be larger than its predecessors. This relation is used to optimize the algorithm by determining and terminating when further created random numbers have no influence on the created signature.Type: ApplicationFiled: October 5, 2023Publication date: February 1, 2024Applicant: Dynatrace LLCInventors: Otmar ERTL, Edyta KALKA
-
Publication number: 20240039700Abstract: Systems and methods for securing assigned peripheral device in virtualized computer system. An example method may comprise receiving, by a virtualized execution environment, a state measurement associated with a peripheral device of the computing system. Generating a guest cryptographic key. Responsive to validating the state measurement, transmitting, to the peripheral device, the guest cryptographic key encrypted using the device cryptographic key. Transmitting, to the peripheral device, an access request that is cryptographically signed using a first value derived from the device cryptographic key or a second value derived from the guest cryptographic key and encrypted using a third value derived from the guest cryptographic key.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Michael Tsirkin, Amnon Ilan
-
Publication number: 20240039701Abstract: An apparatus to facilitate confidential computing in a heterogeneous compute environment including a network-connected hardware accelerator is disclosed. The apparatus includes a processor to provide a first trusted execution environment (TEE) to run an application, and to send, via the application to a user mode driver (UMD) hosted in first the TEE, a command to transfer data of the application to a hardware accelerator device that is connected via network to the application; encrypt and integrity-protect, via the UMD, the data using shared secret data keys and a destination buffer address of the hardware accelerator device to generate encrypted and integrity-protected data, the shared secret data keys established with a remote service in a second TEE operating on an accelerator platform connected to the application; and interface, via the UMD with a local network interface card (NIC), to cause a copy over the network of the encrypted and integrity-protected data.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Intel CorporationInventors: Reshma Lal, Sarbartha Banerjee
-
Publication number: 20240039702Abstract: Described herein are systems, methods, and software to direct communications for a private network using advertised encryption key information. In one implementation, a first computing element identifies an encrypted communication from a second computing element and identifies a destination computing element from a plurality of destination computing elements based on an application of encryption keys to the encrypted communication. The first computing element further forwards the encrypted communication to the destination computing element.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventor: David J. Crawshaw
-
Publication number: 20240039703Abstract: Modules for hub network elements and methods are described, including a method comprising (a) generating a partial key indicative of a unique public key associated with a hub network element in a transport network, (b) sending a partial-key message comprising the partial key and an ordered sequence to a particular network element of the ordered sequence, (c) receiving, from the particular network element to which the partial-key message was sent, the partial-key message having been modified by a unique private key associated with the particular network element, (d) repeating steps (b) and (c) for each successive network element in the ordered sequence except for a source network element and a destination network element designated by the ordered sequence, and (e) sending the partial-key message to the destination network element. The transport network comprises a plurality of network elements including the hub network element and a plurality of leaf network elements.Type: ApplicationFiled: August 1, 2023Publication date: February 1, 2024Inventors: Radhakrishna Valiveti, Steven Joseph Hand, Rajan Rao
-
Publication number: 20240039704Abstract: Enabling End-to-End Efficient Encryption (E2EEE) with security chaining in an Information Handling System (IHS) network includes: a data source IHS writing metadata containing a key slot, in a trailer of a data block and sending an out-of-band signal to use the key slot; an IHS security chaining logic regenerates the signal to each next IHS E2EEE data connection segment interface; and an encryption configuration state machine of each interface setting a use slot and an active slot to the key slot, in response to the signal. Disabling E2EEE with security chaining includes: the data source IHS sending an out-of-band signal to not use a key slot; the IHS security chaining logic regenerating the signal to each next interface; and the state machine of each interface changing the state machine state to not use a key slot and to not set an active key slot, in response to the signal.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Dell Products, L.P.Inventors: Lejin Du, Oleksandr Babiychuk, Alykhan Nathoo, John T. Fitzgerald, Michael E. Specht, Seema G. Pai, Joann J. Kent
-
Publication number: 20240039705Abstract: Techniques for protecting data using two password asymmetric encryption based on time-constrained password-based partner tokens. To encrypt data, a first partner computing device receives a first partner token from a second computing device. The first partner computing device decrypts the first partner token to recover first public key data generated by the second partner computing device. The first partner computing device derives a cryptographic encryption key to encrypt the data based on the first public key data, and based on first private key data generated by the first partner computing device. The second computing device may decrypt the encrypted data based on a second partner token generated by the first partner computing device, using a cryptographic decryption key derived using second private key data generated by the second computing device and second public key data generated by the first computing device and embedded and encrypted in the second partner token.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Inventor: Hao Cheng
-
Publication number: 20240039706Abstract: A disclosed method for providing a non-credentialed user (NCU) with secure access to a remote endpoint of an edge computing platform, generates a support voucher for the NCU wherein the support voucher comprises a temporary ownership voucher including one or more digital signatures establishing a chain of trust from a root of trust to the NCU. The method provides a private key associated with the support voucher to the NCU. Responsive to detecting the NCU, using the private key to log into an edge platform resource and determining that the support voucher is recognized by the edge platform resource, the NCU is authenticated and the support voucher is validated to establish the NCU as a designated owner of the remote endpoint. Responsive to establishing the NCU as a designated owner, the NCU may access the edge platform resource and from there access the platform endpoint.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Dell Products L.P.Inventors: Anurag SHARMA, Daniel E. CUMMINS, Michael Emery BROWN
-
Publication number: 20240039707Abstract: Provided is a process for authentication of a user on a mobile device. The user of the mobile device may authenticate with the mobile device, and credentials may be conveyed to a server via a relying device. The mobile device may directly communicate credentials to the relying device. In some examples, the user of the mobile device may authenticate using the mobile device without inputting credentials on the relying device. Credentials conveyed to the server by the relying device and authenticated by the server may permit user access to the relying device or access to an online resource from the relying device.Type: ApplicationFiled: May 2, 2023Publication date: February 1, 2024Inventor: Michael McDonald
-
Publication number: 20240039708Abstract: A communication system includes an external device and a robotic garden tool. The external device is configured to generate a first key pair including a first private key for a robotic garden tool and a first public key for a server device. The external device transmits the first private key to the robotic garden tool, and transmits the first public key to the server device. The robotic garden tool is configured to receive an encrypted first instruction from the server device. The encrypted first instruction was encrypted by the server device using the first public key. The robotic garden tool is configured to decrypt the encrypted first instruction using the first private key to generate a decrypted first instruction. The robotic garden tool is configured to control operation of the robotic garden tool in accordance with the decrypted first instruction.Type: ApplicationFiled: July 24, 2023Publication date: February 1, 2024Inventor: Shing Hin LI
-
Publication number: 20240039709Abstract: Disclosed in the present application are a method and apparatus for sharing encrypted data, and a device and a readable medium. The method for sharing the encrypted data includes: receiving a data sharing request sent by a data owner, and generating a data owner public key and a data owner private key; generating a data user public key, and generating a proxy re-encryption key on the basis of the data user public key and the data owner private key; encrypting shared data on the basis of the data owner public key, and uploading the encrypted data to a data processing center; acquiring a corresponding proxy re-encryption key and corresponding encrypted data on the basis of the data sharing request, and re-encrypting the encrypted data on the basis of the proxy re-encryption key.Type: ApplicationFiled: April 22, 2022Publication date: February 1, 2024Inventor: Fuqiang MA
-
Publication number: 20240039710Abstract: According to an embodiment, a key manager (KM) apparatus includes one or more hardware processors configured to: perform inter-KM-apparatus connection authentication indicating authentication processing with an opposing KM apparatus, and KM-quantum key distribution (QKD) connection authentication indicating authentication processing with an opposing QKD apparatus; and enable a KM function in a case where the inter-KM-apparatus connection authentication is successful and the KM-QKD connection authentication is successful.Type: ApplicationFiled: March 8, 2023Publication date: February 1, 2024Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Yoshimichi TANIZAWA
-
Publication number: 20240039711Abstract: Bi-directional quantum interconnects are provided that include a first communication module and a second communication module. The first communication module includes a first quantum transmitter and a first quantum receiver, and the second communication module includes a second quantum transmitter and a second quantum receiver. The example interconnect further includes a first communication medium communicably coupling the first communication module and the second communication module such that communication is provided between the first quantum transmitter and the second quantum receiver and between the second quantum transmitter and the first quantum receiver via the first communication medium. The first quantum transmitter and the second quantum transmitter generate qubits having first and second quantum characteristics, respectively, to allow for bi-directional quantum communication over a common channel.Type: ApplicationFiled: August 1, 2022Publication date: February 1, 2024Inventors: Tali Septon, Elad Mentovich, Yonatan Piasetzky, Moshe B. Oron, Isabelle Cestier
-
Publication number: 20240039712Abstract: A quantum key distribution system may include a transceiver including a state randomizer to impart a random state transformation to one or more qubits of a generated faint pulse and a quantum bit encoder to reflect the faint pulse back to the transceiver with one or more encoded bits. The transceiver may receive a return pulse through the communication channel, where the state randomizer reverses the random state transformation. The transceiver may include three or more detectors to measure the return pulse at time-gated timeslots associated with possible paths of the return pulse. Reception of the faint pulse from the quantum bit encoder as the return pulse triggers a detector in a first known subset of the detectors, while reception of a faked-state pulse from a third party as the return pulse results in a non-zero probability of triggering of a detector in a second known subset of the detectors.Type: ApplicationFiled: January 5, 2023Publication date: February 1, 2024Inventors: Salem F. Hegazy, Bahaa E. A. Saleh
-
Publication number: 20240039713Abstract: According to an embodiment, a quantum key distribution (QKD) apparatus includes one or more hardware processors configured to: perform inter-QKD-apparatus connection authentication indicating authentication processing with an opposing QKD apparatus, and key manager (KM)-QKD connection authentication indicating authentication processing with an opposing KM apparatus; and enable a QKD function in a case where the inter-QKD-apparatus connection authentication is successful and the KM-QKD connection authentication is successful.Type: ApplicationFiled: March 7, 2023Publication date: February 1, 2024Applicant: Kabushiki Kaisha ToshibaInventor: Yoshimichi TANIZAWA
-
Publication number: 20240039714Abstract: Techniques are disclosed relating to relating to a public key infrastructure (PKI). In one embodiment, an integrated circuit is disclosed that includes at least one processor and a secure circuit isolated from access by the processor except through a mailbox mechanism. The secure circuit is configured to generate a key pair having a public key and a private key, and to issue, to a certificate authority (CA), a certificate signing request (CSR) for a certificate corresponding to the key pair. In some embodiments, the secure circuit may be configured to receive, via the mailbox mechanism, a first request from an application executing on the processor to issue a certificate to the application. The secure circuit may also be configured to perform, in response to a second request, a cryptographic operation using a public key circuit included in the secure circuit.Type: ApplicationFiled: August 9, 2023Publication date: February 1, 2024Inventors: Wade Benson, Libor Sykora, Vratislav Kuzela, Michael Brouwer, Andrew R. Whalley, Jerrold V. Hauck, David Finkelstein, Thomas Mensch
-
Publication number: 20240039715Abstract: A first device may provide a request to establish a secure communication with a second device, and may hide public keys based on a commutative legacy compatible encryption process sharing a modulus and based on quasi-Carmichael numbers larger than the modulus with quadratic residuals. The first device may utilize variable extendable-output function hashing, based on the modulus, with bloom filtering to generate an output that prevents creation of classical rainbow tables, and may utilize a key derivation function to generate a symmetric key based on the output. The first device may establish the secure communication with the second device based on the symmetric key.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Inventor: Benjamin Glen MCCARTY
-
Publication number: 20240039716Abstract: A system has a server and a processor electrically coupled to the server that receives an input binary string as an input and uses a decision matrix to determine via a plurality of cycles what a next state of a plurality of target cells being transformed will become to produce an output binary string that will be a cryptographic key.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventor: Brax Kinsey
-
Publication number: 20240039717Abstract: The invention relates to an apparatus (1a) and a method for controlling a critical system (S), as well as to a device (3a,3b) and a method for the distribution of messages for controlling said critical system (S), wherein said apparatus (1a) is configured for encrypting a first control message by using the first private key, transmitting said first encrypted message to a second apparatus (1b), receiving a second encrypted message generated by a second apparatus (1b) and encrypted by said second apparatus (1b) by using a second private key, decrypting said second encrypted message by using a public key associated with said second private key, verifying the second decrypted message on the basis of said first message and, if the verification is successful, encrypting at least said second encrypted message with said first private key, thereby generating a third encrypted message, and transmitting said third encrypted message.Type: ApplicationFiled: December 1, 2021Publication date: February 1, 2024Inventors: Claudio PLESCOVICH, Paolo SANNINO
-
Publication number: 20240039718Abstract: In a recovery verification system, a template storage unit stores a template acquired by encrypting registration input information being biometric information about a registrant by using a secret key. A random number generation unit generates a random number in response to a request from the client. A protected template generation unit conceals the template by the random number, and transmits a protected template to the client. A determination unit acquires, from the client, information about a concealment index that is acquired by concealing a degree of similarity between registration input information and collation information being biometric information about an authenticated subject and is calculated based on the collation information and the protected template. A determination unit generates an index acquired by decrypting the concealment index by using a public key associated with the secret key and the random number, and performs authentication, based on the index.Type: ApplicationFiled: December 16, 2020Publication date: February 1, 2024Applicant: NEC CorporationInventors: Masahiro NARA, Toshihiko OKAMURA, Toshiyuki ISSHIKI, Hiroto TAMIYA
-
Publication number: 20240039719Abstract: A method is disclosed. The method includes receiving, by a processing network computer from a relying party computer associated with a relying party, a request for data associated with a user operating a user device. The processing network computer may retrieve first encrypted data of the user having a user-layer of encryption. The processing computer can then generate a second symmetric key to add a relying party-layer of encryption to the first encrypted data using a stream cipher. The doubly encrypted data may be transmitted to a user device that removes the user-layer of encryption on the first doubly encrypted data, and then adds a second relying party-layer of encryption to form second doubly encrypted data. The second doubly encrypted data may be transmitted to the relying party computer, which can remove both relying party-layers of encryption to gain access to the data associated with the user.Type: ApplicationFiled: February 10, 2022Publication date: February 1, 2024Applicant: Visa International Service AssociationInventors: Sunpreet Singh Arora, Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim Wagner, Gaven Watson
-
Publication number: 20240039720Abstract: A method for initiating a chat between participants in a group chat is provided. The method includes requesting, with a first client device from a first participant, to initiate a chat with a second client device from a second participant, receiving, from a chat server, an identification for the second participant, requesting, from a verifiable directory, an identity proof of the second participant associated with the identification for the second participant, wherein the verifiable directory includes a list of encryption keys for client devices associated with each of multiple users in the chat server, verifying the identity proof of the second participant, and initiating the chat with the second participant when the identity proof of the second participant is verified. A system including a memory storing instructions, and a processor to execute the instructions for the system to perform the above method are also provided.Type: ApplicationFiled: December 5, 2022Publication date: February 1, 2024Inventors: Viatcheslav Krassovsky, Kevin Lewi, Sean Francis Lawlor, Ercan Ozturk, Alexander Chernyak, Dillon George
-
Publication number: 20240039721Abstract: Methods and systems are described herein for enabling users to access user data of other users using cryptographic tokens. A data access system may be used to enable access. The system may receive a blockchain operation request for enabling access to first user data associated with a first user. The system may generate a cryptographic token and an access entry. When the system receives a second blockchain operation request for accessing the first user data, the system may determine one or more parameters for accessing the first user data. In response to verifying the one or more parameters, the data access system may enable access to the first user data.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Applicant: Capital One Services, LLCInventors: Andre YOUNG, Clayton JOHNSON, Cara WEIKEL, Judith RODRIGUEZ
-
Publication number: 20240039722Abstract: According to a present invention embodiment, a system for utilizing different user identifiers for performing activities of applications based on activity context comprises one or more memories and at least one processor coupled to the one or more memories. The system determines context information for an activity of an application performed by a user. A non-fungible token of the user is identified with one or more attributes corresponding to the context information. The application is directed to use the identified non-fungible token as a user identifier for performing the activity. Embodiments of the present invention further include a method and computer program product for utilizing different user identifiers for performing activities of applications based on activity context in substantially the same manner described above.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Inventor: Lisa Seacat DeLuca
-
Publication number: 20240039723Abstract: According to one embodiment, an information processing apparatus, includes: a first token issuer issuing a first token in response to a token issuance demand from a user; a first storage storing information on the user and the first token; a second storage storing ownership registration information of a device owned by the user; a first token acceptor accepting the first token provided from the device; an owner verifier to perform owner verification including verifying whether information on the device providing the first token is stored in the second storage and whether the first token accepted by the first token acceptor matches with the first token in the first storage, and determine the user corresponding to the first token for which the owner verification succeeds as an owner of the device; and a third storage storing verified data including information on the device for which the owner is determined.Type: ApplicationFiled: March 8, 2023Publication date: February 1, 2024Applicant: Kabushiki Kaisha ToshibaInventor: Toshio ITO
-
Publication number: 20240039724Abstract: Participants as requestors using a requesting network element request one or more tokenization processors to generate tokens that represent a sanitized version of data such that the resultant tokens are amenable to comparison across participants. As circumstances warrant, one or more such tokens can be submitted to the tokenization processor(s) to privately retrieve the original data. Role-based access control scope parameters and tokenization processor-specific tokenization processor secrets can be embedded into reversible tokens that remain invariant under updating of the tokenization processor secrets across tokenization processors.Type: ApplicationFiled: July 31, 2023Publication date: February 1, 2024Inventors: David William Kravitz, Michael Young, Mollie Zechlin Halverson, Matthew Benjamin Smith
-
Publication number: 20240039725Abstract: The present invention relates to a system and a method for editing a custom decorated digital image and issuing them as a non fungible token, and according to an exemplary embodiment of the present invention, the NFT issuance system for issuing custom decorated digital images as a non fungible token (NFT) may include: a user terminal device; a service providing server; and a blockchain server, and the user terminal device may recognize and authenticate a digital image related identifier, the service providing server may provide a digital image and a decoration code for decoration edition to the user terminal device based on the authenticated identifier, the user terminal device may enter a decoration page related to the provided digital image, and perform the decoration edition on a digital image provided based on the provided decoration code in the decoration page to generate and store the custom decorated digital image, the service providing server may receive an NFT issuance request for the generated and sType: ApplicationFiled: July 27, 2023Publication date: February 1, 2024Applicant: Kaura Inc.Inventor: Jae Ho KANG
-
Publication number: 20240039726Abstract: A method for securely accessing legacy data includes associating a first user account with a security token upon reception of the security token by an enterprise server from a security token service. The security token from the enterprise server is directly communicated to a legacy access provider. The legacy access provider is caused to initiate communication over a network directly with the security token service to request that the security token service authenticate the security token. Access to the legacy system is prevented upon the legacy access provider not verifying authentication of the security token.Type: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Inventors: Ahmed Farouk SHAABAN, Venkat THANDRA
-
Publication number: 20240039727Abstract: A data processing method includes executing, by a relay node belonging to a sub-blockchain network, transaction data for a target sub-chain account to obtain a transaction execution result, obtaining total account status data in the sub-blockchain network that includes status data of at least two sub-chain accounts including the target sub-chain account, generating candidate total account status data that includes data obtained by modifying the status data of the target sub-chain account in the total account status data according to the transaction execution result, generating zero-knowledge proof data using a preset zero-knowledge proof circuit according to the total account status data and the candidate total account status data, and committing the zero-knowledge proof data and status change information associated with the transaction execution result to a main chain node belonging to a main blockchain network. The target sub-chain account is associated with a target main chain account.Type: ApplicationFiled: October 11, 2023Publication date: February 1, 2024Inventor: Zimin CHEN
-
Publication number: 20240039728Abstract: There is disclosed a computer implemented method (300) of managing user accounts at a biometric database, the biometric database comprising biometric data of a user. The method comprises the steps of: receiving (301), at the biometric database, a message from a user device to suspend a user's account, the message comprising a cryptographic parameter; suspending (303) the user's account, the step of suspending comprising: encrypting (305), at the biometric database, biometric data of the user associated with the user's account using the cryptographic parameter; storing (307), the encrypted biometric data; and discarding (309), at the biometric database, the cryptographic parameter; and transmitting (311), from the biometric database, a message to the user device indicating that the user's account has been suspended.Type: ApplicationFiled: July 27, 2022Publication date: February 1, 2024Applicant: MASTERCARD INTERNATIONAL INCORPORATEDInventors: John BERIC, Patrik SMETS, Prashant SHARMA
-
Publication number: 20240039729Abstract: An authentication system facilitates a transfer of enrollment in authentication services between client devices. The authentication system enrolls a client device in authentication services to enable the client device to be used for authenticating requests to access one or more services. As part of enrolling the client device, the authentication system receives authentication enrollment information for the client device that is associated with one or more authentication credentials securely stored on the client device (e.g., a multi-factor authentication (MFA) certificate). The authentication system facilitates one or more processes for transferring the enrollment from an enrolled client device to a non-enrolled client device that limit the number and complexity of actions performed by the user.Type: ApplicationFiled: October 5, 2023Publication date: February 1, 2024Inventors: Chandra Shirashyad, lldar Abdullin, Umang Shah, Naveen Kumar Keerthy, Cedric Beust
-
HASHING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
Publication number: 20240039730Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques include: while monitoring activity on the at least one computer network, obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information; generating a hashed signature of the first asset by applying a locality sensitive hashing (LSH) technique to the signature; associating the first asset with at least one asset in the asset catalog using the hashed signature of the first asset and at least one hashed signature of the at least one asset in the asset catalog; and outputting information identifying the at least one asset with which the first asset was associated.Type: ApplicationFiled: March 27, 2023Publication date: February 1, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart -
Publication number: 20240039731Abstract: Example systems and methods for a node of a blockchain are disclosed. The node may receive a request message for placing an entry on the blockchain, the message including; a request specification including an action and identity of a party subject to the action, an indicator that the entry was authorized by a trusted entity, and a plurality of cryptographic verification codes generated by a plurality of trust verifiers, each cryptographic verification code including an encoded action-payload from the trusted entity and cryptographically signed by one of the trust verifiers. The node may apply a public encryption key of each trust verifier to its cryptographic verification code to decrypt an encoded action-payload, and then verify that at least a threshold, number of the decrypted corresponding encoded action-payloads are identical. The node may then submit the entity for processing to be added to the blockchain responsive to at least the verification.Type: ApplicationFiled: March 11, 2022Publication date: February 1, 2024Inventors: Michael Ira Kanovitz, Jon Isaac Loevy
-
Publication number: 20240039732Abstract: A signature graph method is proposed to authenticate shared high-entropy data using a graph that can be easily identified by human eyes (or by computer image recognition algorithms). An example method for authenticating a shared data element comprises receiving a data element to be shared; transforming the data element to be shared into signature graph data, using at least one collision-resistant one-way mapping function; and rendering a human-perceptible representation of the signature graph data, such as an audible and/or visual representation, for perception by a human user. In some embodiments, transforming the data element comprises applying a cryptographic hash function to the data element, to obtain a first hash output, and applying a cryptographic hash function to the first hash output, to obtain the signature graph data.Type: ApplicationFiled: August 1, 2022Publication date: February 1, 2024Applicant: Cypress Semiconductor CorporationInventors: Hui LUO, Hans VAN ANTWERPEN
-
Publication number: 20240039733Abstract: Techniques for verifying correctness of associations between assets related to events detected in at least one computer network and assets in an asset catalog for the at least one computer network. The techniques include: obtaining information specifying a first asset and a first set of assets with which the first asset was previously associated; generating a signature of the first asset from computer network addressing information for the first asset using at least one trained machine learning model; associating the first asset with a second set of assets using the signature and at least one signature of the at least one asset, wherein the at least one signature was previously determined using the at least one trained machine learning model; and when it is determined that the second set includes the first set, outputting an indication that the first asset was correctly associated with the first set of assets.Type: ApplicationFiled: March 27, 2023Publication date: February 1, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
Publication number: 20240039734Abstract: A signing system for validating stateful hash-based digital signatures includes a signing device, a logging device and a verifying device, wherein each signing device is configured to receive data, generate a hash-based digital signature including a one-time signature, generate a one-time public key, send the generated one-time public key, send the hash-based digital signature, the verifying device is configured to generate a validation one-time public key, send the validation one-time public key, and the logging device is configured to store the generated one-time public key, receive a validation one-time public key, compare the validation one-time public key with all one-time public keys provide a validation feedback signal, if the validation one-time public key coincides with exactly one stored one-time private key, and provide a warning feedback signal, if the validation one-time public key does not coincide with exactly one stored one-time private key.Type: ApplicationFiled: March 9, 2022Publication date: February 1, 2024Inventors: Fabrizio De Santis, Antonio Vaira
-
Publication number: 20240039735Abstract: A method includes a computing device verifying authenticity of a blockchain-encoded record representing a statement of words and an entigen group to produce an authenticity indicator where a set of identigens is determined utilizing a knowledge database for each word to produce sets of identigens and where the sets of identigens is interpreted to produce the entigen group. When the authenticity indicator indicates an authentic status, the method further includes interpreting, based on an updated knowledge database, updated sets of identigens to produce an updated entigen group. The method further includes updating the blockchain-encoded record to represent the statement and the updated entigen group to facilitate subsequent utilization of an updated validated interpretation of the statement as the updated entigen group.Type: ApplicationFiled: September 30, 2023Publication date: February 1, 2024Applicant: entigenlogic LLCInventor: Gary W. Grube
-
Publication number: 20240039736Abstract: A computer-implemented method is disclosed. The method includes: receiving, via a client device, a resource transfer request for resources to be transferred to a transferee account; generating a secure data object based on request data of the resource transfer request, the secure data object including a first hash computed based on an input string comprising a transferee account identifier; signing the secure data object using a private key of a transferee resource account management system; and sending the signed secure data object to a messaging address associated with a transferor account.Type: ApplicationFiled: October 6, 2023Publication date: February 1, 2024Applicant: The Toronto-Dominion BankInventors: Milos DUNJIC, Asad JOHEB, David Samuel TAX
-
Publication number: 20240039737Abstract: A system for establishing a trusted path for secure communication between client devices and server devices, such as between an account holder and a financial institution, can provide the core security attributes of confidentiality (of the parties), integrity (of the information), anti-replay (protection against replay fraud) and/or anti-tampering (protection against unauthorized changes to information being exchanged and/or modules that generate and communicate such information). A messaging layer implementation in favor of a transport layer implementation can provide a trusted path. This infrastructure features secure cryptographic key storage, and implementation of a trusted path built using the cryptographic infrastructure. The trusted path protects against unauthorized information disclosure, modification, or replays. These services can effectively protect against Man-in-the-Middle, Man-in-the-Application, and other attacks.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Inventor: Glenn S. BENSON
-
Publication number: 20240039738Abstract: Disclosed are a system for providing event data recorder (EDR) data of a vehicle and a method thereof. The system may include a user terminal and a server. The user terminal may determine a first hash value of a certificate, and transmit the first hash value to a server. The server may receive the certificate and encrypted EDR data from an autonomous driving controller, decrypt, using a public key included in the certificate, a digital signature of the certificate to obtain a second hash value, and, based on a comparison between the first and second hash values, decrypt, using a private key, the encrypted EDR data, and transmit the decrypted EDR data to the user terminal.Type: ApplicationFiled: December 15, 2022Publication date: February 1, 2024Inventors: Hong Yeol Lim, Bong Ju Kim
-
Publication number: 20240039739Abstract: The present disclosure involves systems, software, and computer implemented methods for user-controlled access control for user information. One example method includes sending an authentication request to authenticate as a requesting entity to a first decentralized resource directory of a providing entity. An authentication challenge is received, via the connection, from the providing entity, and in response to the authentication request, to store an authentication challenge value for an authentication challenge key in a second decentralized resource directory of the requesting entity. The authentication challenge value for the authentication challenge key is stored in the second decentralized resource directory. An authentication challenge response is sent to the providing entity requesting the providing entity to verify the authentication challenge.Type: ApplicationFiled: October 12, 2023Publication date: February 1, 2024Inventors: Kevin Nickels, Colin Constable, Jagannadh Vanguri
-
Publication number: 20240039740Abstract: A key holder includes a ferrule, a multimode light guide at least partly embedded inside the ferrule, an optical key which has a light scattering material, and a mechanical mount which mounts each of the ferrule, the multimode light guide, and the optical key. The multimode light guide has a front facet and a back facet which are arranged at opposite ends. The back facet of the multimode light guide contacts the optical key. Light can enter into the multimode light guide via the front facet, propagate through the multimode light guide, be scattered by the optical key, and propagate back through the multimode light guide and exit via the front facet. The mechanical mount is detachably connected to a mechanical mount terminator. The front facet of the multimode light guide is oriented in a direction of the mechanical mount terminator.Type: ApplicationFiled: December 10, 2021Publication date: February 1, 2024Applicant: UNIVERSITEIT TWENTEInventors: PEPIJN PINKSE, MATTHIJS VELSINK
-
Publication number: 20240039741Abstract: A method implements anonymous uncensorable cryptographic chains. The method includes receiving, from a first application, verifiable data for a current record and unverified data for the current record. The unverified data for the current record was received by the first application from a second application. The method further includes verifying the verifiable data for the current record with unverified data from a previous record. The method further includes recording the verifiable data for the current record and the unverified data for the current record to the current record responsive to verifying the verifiable data for the current record. The method further includes presenting the current record to one or more of the first application and to the second application.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: INTUIT INC.Inventor: Glenn Carter SCOTT
-
Publication number: 20240039742Abstract: A computer-implemented method of alerting users to on-chain events, wherein a primary user is associated with a primary user public key, and wherein the method is performed by an alerting entity and comprises: identifying one or more event transactions, wherein each event transaction comprising respective event data; generating a primary alert transaction, wherein the primary alert transaction comprises a first output locked to the primary user public key, and a second output comprising alert data, and wherein the alert data comprises a respective identifier of each identified event transaction; and transmitting the primary alert transaction to the blockchain network.Type: ApplicationFiled: July 21, 2021Publication date: February 1, 2024Inventors: Liuxuan PAN, Chloe TARTAN, Craig Steven WRIGHT
-
Publication number: 20240039743Abstract: Presented herein are techniques to conserve power by network devices in a software define wide area network (SDWAN). A method includes monitoring operations of a software defined wide area network including a network device in the software defined wide area network, based on results of the monitoring, generating a usage model for the network device, determining, based on the usage model, an interface selection scheme for the network device, and causing the network device to execute the interface selection scheme.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Harikrishnan Pillai, Jie Zhou, Niels-Peder Mosegard Jensen, Christine Lan Yu
-
Publication number: 20240039744Abstract: Systems, apparatuses, and methods are described for wireless communications. A policy control function may determine a policy and charging control rule comprising one or more Ethernet source MAC addresses and a quality of service policy. The policy control function may send the policy and charging control rule to a session management function to provide an Ethernet PDU session for a wireless device.Type: ApplicationFiled: July 6, 2023Publication date: February 1, 2024Inventors: Weihua Qiao, Esmael Hejazi Dinan, Kyungmin Park, Peyman Talebi Fard
-
Publication number: 20240039745Abstract: In some implementations, a method includes transmitting, from a first terminal node, a first audio message to a second terminal node, where the first terminal node includes a first left ear device and a first right ear device, and where the second terminal node includes a second left ear device and a second right ear device. The method further includes transmitting, from the second terminal node, a second audio message to the first terminal node, where audio transmissions of a voice chat are transmitted directly between the first terminal node and the second terminal node.Type: ApplicationFiled: July 29, 2022Publication date: February 1, 2024Applicant: Sony Group CorporationInventor: Andrew Estrada
-
Publication number: 20240039746Abstract: A conferencing system transmits a graphical output associated with a conference that is in progress to a client device for display without requiring the client device to connect to the conference. Prior to the client device connecting to the conference, the conferencing system grants the client device access to an in-conference communication application based on a request to communicate with a participant device. The conferencing system receives a chat message from the client device via the in-conference communication application. The conferencing system updates a topic of the conference based on the chat message.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Inventor: Nick Swerdlow
-
Publication number: 20240039747Abstract: A conference system transmits a first graphical output for display on a panel interface associated with a conference. Prior to the client device joining the conference, the conference system determines participant information based on a request. The conference system transmits a second graphical output to the client device to display the participant information without the client device having to join the conference.Type: ApplicationFiled: October 16, 2023Publication date: February 1, 2024Inventor: Nick Swerdlow