Communication System Using Cryptography Patents (Class 380/255)
  • Patent number: 9973754
    Abstract: A low power video hardware engine is disclosed. The video hardware engine includes a video hardware accelerator unit. A shared memory is coupled to the video hardware accelerator unit, and a scrambler is coupled to the shared memory. A vDMA (video direct memory access) engine is coupled to the scrambler, and an external memory is coupled to the vDMA engine. The scrambler receives an LCU (largest coding unit) from the vDMA engine. The LCU comprises N×N pixels, and the scrambler scrambles N×N pixels in the LCU to generate a plurality of blocks with M×M pixels. N and M are integers and M is less than N.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: May 15, 2018
    Assignee: Texas Instruments Incorporated
    Inventors: Hetul Sanghvi, Mihir Narendra Mody, Niraj Nandan, Mahesh Madhukar Mehendale, Subrangshu Das, Dipan Kumar Mandal, Pavan Venkata Shastry
  • Patent number: 9973473
    Abstract: Methods, systems, and computer readable media for rapid filtering of opaque data traffic are disclosed. According to one method, the method includes receiving a packet containing a payload. The method also includes analyzing a portion of the payload for determining whether the packet contains compressed or encrypted data. The method further includes performing, if the packet contains compressed or encrypted data, at least one of sending the packet to an opaque traffic analysis engine for analysis, discarding the packet, logging the packet, or marking the packet.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 15, 2018
    Assignee: THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL
    Inventors: Andrew Maxwell White, Fabian Monrose, Srinivas Krishnan, Phillip Andrew Porras, Michael Donald Bailey
  • Patent number: 9971904
    Abstract: A method for searching encrypted data includes identifying, with a client, a plurality of values within a predetermined search range in a search index stored within a memory of the client, each value in the plurality of values being present in a plaintext representation of at least one encrypted file in a plurality of encrypted files stored in a server. The method further includes generating and transmitting at least one search query to the server through a data network, and receiving, with the client, at least one response from the server through the data network, the response including the encrypted keyword corresponding to the value in the plurality of values and an identifier of at least one file in the plurality of encrypted files stored on the server that includes the value.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: May 15, 2018
    Assignee: Robert Bosch GmbH
    Inventors: Xinxin Fan, Boyang Wang
  • Patent number: 9967353
    Abstract: A handheld wireless device makes a request for service from a server of a business on a global network, the request originating from the wireless device is automatically routed to the closest server of the business that is geographically closest to the location of the wireless device as determined by a GPS function in the device, or by a router server in the wireless network based on the group of cell towers being connected to by the wireless device, or based on the location of the wireless device in a global telephone network database, for faster access to the service and a response there from.
    Type: Grant
    Filed: February 25, 2015
    Date of Patent: May 8, 2018
    Inventor: Tara Chand Singhal
  • Patent number: 9955298
    Abstract: An embodiment of the present invention is directed to methods, systems and apparatuses enabling location sharing group formation and the tracking of group members. Groups may be bound by a geographical area that circumscribes the boundary of a location sharing group. Active members of a location sharing group may become active based on their relative location to the geographical area defining the location sharing group. The geographical area may be static, mobile or change size and shape based on parameters forming the location sharing group. Alerts may be generated informing members of the location sharing group of the entry or exit of members from the location sharing group. Active members of a location sharing group may share location information with other members of the location sharing group. A radius or other shape may identify a geographical area for location sharing between members.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: April 24, 2018
    Assignee: X One, Inc.
    Inventor: Richard D. Haney
  • Patent number: 9955208
    Abstract: A method of performing time-shift function and television receiver having a tuner and a personal video recorder for storing broadcast programs of at least one channel enables a broadcast program of a currently tuned channel to be continuously and efficiently stored to enable time-shifting, regardless of an interruption by switching channels or changing input sources or even in the case of an inadvertent power-off condition.
    Type: Grant
    Filed: July 22, 2011
    Date of Patent: April 24, 2018
    Assignee: LG ELECTRONICS INC.
    Inventor: Duck Jae Ahn
  • Patent number: 9942837
    Abstract: An apparatus and method are described for adjusting a scan interval or scan width of a BTLE device. For example, one embodiment of a method comprises: placing a Bluetooth Low Energy (BTLE) device of an IoT device into a low power or sleep state; waking the BTLE device from the low power or sleep state in response to a specified schedule or set of conditions; attempting to establish a connection between the BTLE device and a BTLE device of an IoT hub using a first scan width and/or scan interval; dynamically adjusting the first scan width and/or scan interval to a second scan width and/or scan interval, respectively, based on a randomly-selected value if a connection is not established after a specified time period; and reattempting to establish a connection between the BTLE device of the IoT device and the BTLE device of the IoT hub using the second scan width and/or scan interval.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: April 10, 2018
    Assignee: AFERO, INC.
    Inventor: Omar Zakaria
  • Patent number: 9942206
    Abstract: A method includes accessing genomic data of from a genomic database; generating, by a processor, a first hash by probabilistically and irreversibly encrypting a first portion of the genomic data encoding the first genomic sequence, the first hash projecting the first portion into reduced dimensions such that the first portion of the genomic data encoding the first genomic sequence becomes statistically improbable to recover outside the first processor; generating, by the processor, a first cryptogram by deterministically and reversibly encrypting a second portion of the genomic data encoding the first genomic sequence; generating, by the processor, a look-up table by using at least the first cryptogram as a key and the first portion of the genomic data encoding the first genomic sequence as the value, and transmitting data encoding the first hash and the first cryptogram to one or more processors that are different from the first processor.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: April 10, 2018
    Assignee: Quintiles IMS Incorporated
    Inventors: Ronald A. Miller, Luther Dunlap, Kenneth Park, John Muller, Dave Shell
  • Patent number: 9942024
    Abstract: An example communication system comprises a media access control (MAC) scheduler in a cable network, and a full band transceiver. The MAC scheduler implements a two-dimensional transmission-reception (T-R) coordination scheme among a plurality of cable modems in the cable network. According to the T-R coordination scheme, the cable modems are categorized into interference groups, such that no cable modem of any one interference group transmits upstream in a frequency range simultaneously as another cable modem in the same interference group receives downstream in the frequency range, facilitating full duplex communication in the cable network across the frequency range. The full band transceiver implements an adaptive interference cancellation scheme, which suppresses at a receiver of the respective component, a signal transmitted by a transmitter of the respective component.
    Type: Grant
    Filed: February 24, 2016
    Date of Patent: April 10, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Hang Jin, John T. Chapman
  • Patent number: 9942388
    Abstract: A Home Subscriber Server for handling IP Multimedia Subsystem subscriptions comprises means for maintaining associations between public user identities and Service Profiles, where two or more public user identities can be associated with a common Service Profile, and means for identifying to a network node all public user identities that are associated with a common Service Profile.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: April 10, 2018
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Nuria Esteban Vares, Stephen Terrill, Germán Blanco Blanco, Hubert Przybysz, Maria-Carmen Belinchón Vergara
  • Patent number: 9935924
    Abstract: A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In particular, the secure chat client allows users to create, configure, and manage secure chat rooms. Furthermore, the secure chat client provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: April 3, 2018
    Assignee: Wickr Inc.
    Inventors: Thomas Michael Leavy, Gerard Ryan
  • Patent number: 9935947
    Abstract: Biometric information from an initial sample is used to generate a biometric template for a user. The biometric template is split into multiple template shares using a polynomial secret sharing scheme, such that at least some threshold number of the resulting template shares must be combined to reconstruct the biometric template. After the biometric template is split, the resulting template shares are distributed to multiple components in the system, such as a server, and/or one more user devices, and the original copy of the biometric template is destroyed. To subsequently verify the identity of the user, the threshold number of template shares are obtained and combined to reconstruct the user's biometric template, and the reconstructed template is compared with biometric information extracted from one or more subsequently collected biometric samples. If there is a match between the reconstructed biometric template and the extracted biometric information, the user's identity is verified.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: April 3, 2018
    Assignee: EMC IP Holding Company LLC
    Inventor: Salah Machani
  • Patent number: 9934400
    Abstract: A system and associated methods for encrypting data are disclosed. In at least one embodiment, a key manager is located in memory on an at least one computing device and configured for creating and managing an at least one encryption key to be used for encrypting the data. An at least one key file is also located in memory on the at least one computing device and is associated with an at least one authorized user. The key file contains a key field comprising a pseudo random string of bytes and a unique hash value used to associate the key file to the user. A set of base characters are randomly selected from the key field, such that the base characters are a subset of the key field. An encryption key is generated by inputting the base characters into an encryption algorithm. The data is encrypted using the encryption key.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: April 3, 2018
    Assignee: RISOFTDEV, INC.
    Inventor: Vincent Logan Gilbert
  • Patent number: 9930100
    Abstract: In one embodiment, a method includes accessing a first instance of content to be uploaded to a server, generating a second instance of the content from the first instance, automatically uploading to the server the second instance of the content, and automatically uploading to the server the first instance of the content in response to occurrence of a pre-determined upload condition. The first instance has a first file size and the second instance has a second file size that is smaller than the first file size. The upload of the second instance makes the content available for access at least in part by one or more second users at an immediate point in time. The upload of the first instance of the content makes the content available for access by the second users in an original version.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: March 27, 2018
    Assignee: Facebook, Inc.
    Inventors: Dirk John Stoop, Paul Carduner, Hamilton Chong, Alex Li
  • Patent number: 9930543
    Abstract: A gateway turns encrypted PS data traffic on the Iub interface into clear IP packets so that WAN stream de-duplication and other optimization can be performed to eliminate the transfer of repetitive data across the Iub interface, thereby increasing the throughput between the NodeB and the RNC of the WCDMA network. The gateway pulls PS data traffic out from Iub without disturbing the signaling and CS traffic. The bifurcated PS data traffic is redirected to the GTP I/O port of the gateway where the stream de-duplication is applied. Deployment of the gateway is transparent to the WCDMA network. No network reconfiguration is required to deploy the gateway on the Iub interface.
    Type: Grant
    Filed: May 1, 2013
    Date of Patent: March 27, 2018
    Assignee: Parallel Limited
    Inventors: Michael Godley, Richard Lord, Edmond Higgins, QiMing Zhu, Siu Bun Chan, Ian Walter
  • Patent number: 9923714
    Abstract: Described herein is a method and system for hierarchical wireless video with network coding which limits encryption operations to a critical set of network coding coefficients in combination with multi-resolution video coding. Such a method and system achieves hierarchical fidelity levels, robustness against wireless packet loss and efficient security by exploiting the algebraic structure of network coding.
    Type: Grant
    Filed: August 10, 2015
    Date of Patent: March 20, 2018
    Assignees: Massachusetts Institute of Technology, Universidade Do Porto, Telefonica, S.A.
    Inventors: Luisa Lima, Steluta Gheorghiu, Joao Barros, Muriel Medard, Alberto Lopez Toledo, Joao Vilela
  • Patent number: 9917978
    Abstract: A watermark generator for providing a watermark signal as a sequence of subsequent watermark coefficients based on a stream of subsequent stream values representing discrete valued data includes a differential encoder. The differential encoder is configured to apply a phase rotation to a current stream value of the stream values representing the discrete valued data or to a current watermark symbol, the current watermark symbol corresponding to a current stream value of the stream values representing the discrete valued data, to obtain a current watermark coefficient of the watermark signal. The differential encoder is configured to derive a phase of a previous spectral coefficient of a watermarked signal which is a combination of the host signal and the watermark signal, and to provide the watermark signal such that a phase angle of the phase rotation applied to the current stream value or the current watermark symbol is dependent on the phase of the previous spectral coefficient of the watermarked signal.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: March 13, 2018
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventors: Reinhard Zitzmann, Giovanni Del Galdo, Tobias Bliem, Juliane Borsum, Bert Greevenbosch, Stefan Kraegeloh, Joerg Pickel
  • Patent number: 9916601
    Abstract: An ad-marketplace system manages an exchange for advertisement opportunities from a plurality of content brokers. Each advertising opportunity can include one or more attributes that describe advertisement slots during a broadcast of a data stream. The ad-marketplace system can receive one or more bids for an advertising opportunity associated with a media stream, and can select a matching bid from an advertiser for the advertising opportunity. Each bid can specify one or more advertising requirements that are to be satisfied by the advertising opportunity. When the ad-marketplace system selects the matching bid, the ad-marketplace system establishes a contract between the media broker, and places an initial payment from the advertiser in escrow. The ad-marketplace system can provide a payment to the media broker after confirming that a set of consumers have consumed the advertisement.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: March 13, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Priya Mahadevan, Glenn C. Scott, Roger C. Meike
  • Patent number: 9912481
    Abstract: An apparatus and method are described for executing hash functions on a processor.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: March 6, 2018
    Assignee: Intel Corporation
    Inventors: Gilbert M. Wolrich, Vinodh Gopal, Kirk S. Yap, Wajdi K. Feghali
  • Patent number: 9911098
    Abstract: A dynamic notary system having one or more processors, and one or more non-transitory computer readable medium coupled to the one or more processors with at least one of the computer readable medium being local to the one or more processors. The one or more non-transitory computer readable medium stores computer executable instructions, that when executed by the one or more processors cause the one or more processors to: (1) verify a notary with user identification information stored on the at least one computer readable medium local to the one or more processors, (2) retrieve a document to be notarized from the one or more non-transitory computer readable medium, (3) receive a signatory's electronic signature, (4) receive the notary's electronic signature, (5) apply a notary seal to the document, and (6) lock the document in an unchangeable format.
    Type: Grant
    Filed: May 4, 2012
    Date of Patent: March 6, 2018
    Inventors: David C. Hackler, Kenneth M. Stoner
  • Patent number: 9912696
    Abstract: Data received through a proxy for a service is analyzed for compliance with one or more data policies, such as one or more data loss prevention policies. When data satisfies the criteria of one or more data policies, the data is manipulated at the proxy prior to transmission of the data to the service. In some examples, the manipulation of the data includes encryption.
    Type: Grant
    Filed: July 1, 2013
    Date of Patent: March 6, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Eric Jason Brandwine, Matthew James Wren
  • Patent number: 9906952
    Abstract: Methods, systems, and devices are described for the prevention of network peripheral takeover activity. In some embodiments, peripheral devices may implement an anti-takeover mechanism encrypting messages and transmitting unencrypted decryption keys for a limited period of time. Anti-takeover peripheral devices may transition from a plain operational mode, to a decryption key transmission mode, to a secure mode based on pre-defined triggering events, commands, or timers. Random decryption key values may be generated by peripheral devices and transmitted to listening devices for later storage and retrieval by the listening device. Decryption keys may be stored in remote data stores for later retrieval by anti-takeover aware controller devices.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: February 27, 2018
    Assignee: Vivint, Inc.
    Inventor: Jeremy B. Warren
  • Patent number: 9904934
    Abstract: This disclosure is directed to techniques and systems to enable customers to make secure electronic payments to entities (e.g., merchants, vending machines, etc.). The entities may be at brick-and-mortar locations or other locations where the entities are “offline” and may not readily receive payments from customers that have payment accounts stored and managed by a host. In various embodiments, a customer may direct the host to transfer a payment to a merchant after the customer and merchant exchange a code that includes a payment instruction. The code may be used in place of usernames, passwords, or other personal information and may be difficult for others (e.g., bystanders, etc.) to intercept. After the exchange of the code, the customer may authorize the host to a transfer payment to the merchant based on the payment instruction.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: February 27, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Bharath Kumar, Kevin J. Steuer, Jr.
  • Patent number: 9906513
    Abstract: A system includes a key repository and a network node. The key repository is configured to generate a private key and a public key of the network node, to communicate the private key and the public key to the network node, to verify whether the network node is authorized to operate on a network, to generate a first message indicating whether the network node is authorized to operate on the network, to encrypt the first message using the public key, and to communicate the encrypted first message to the network node. The network node is configured to decrypt the encrypted first message using the private key, to generate a second message based on the first message, to encrypt the second message using the private key, and to record the encrypted second message to a ledger.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: February 27, 2018
    Assignee: Bank of America Corporation
    Inventor: Michael Wuehler
  • Patent number: 9906239
    Abstract: Systems, apparatuses, and methods for implementing a parallel Huffman decoding scheme are disclosed herein. A system with a plurality of execution units receives a Huffman encoded bitstream. The system partitions the encoded bitstream into a plurality of chunks. Each execution unit is assigned to decode a separate chunk of the encoded bitstream as well as an extra portion of an adjacent chunk. With this approach, the decoding of the bitstream overlaps for a programmable amount of data at each chunk boundary since each execution unit, excluding the first execution unit decoding the first chunk of the bitstream, will likely decode a certain number of symbols incorrectly at the beginning of the chunk since the chunk boundaries will not be aligned with symbol boundaries. The system determines, from the decoded extra portion at each chunk boundary, where incorrectly decoded ends and where correctly decoded data begins for each decoded chunk.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: February 27, 2018
    Assignee: ATI Technologies ULC
    Inventor: Kyle Plumadore
  • Patent number: 9898497
    Abstract: A user interface may be designed to receive conflicting data from multiple data sources during a merger of legacy computer systems. The interface automatically validates the conflicting data against each other to generate a final data set for review. Summary information for each data set can be displayed in a single interface such that the summary data sets are individually selectable and provide an overview of the data merger process for each data set. By drilling down through the summary data, the user interface can display individual data sets where data conflicts can be resolved, missing data can be provided, and duplicate data can be eliminated. When the merger process is complete, the interface can translate the data set into a standardized format that can be exported to form generation modules to generate, for example, a welcome letter based on the translated data set.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: February 20, 2018
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Lesvia Elena Ruiz Velazquez, Paolo Juvara, Renzo Zagni, Benjamin Villegas Medina, Ami Davis, Calvin Nakata
  • Patent number: 9900294
    Abstract: A method for accessing a remote computer system may include obtaining a private key, storing the private key in a file system owned by a root account, disabling login access to the root account from user accounts, installing a secure application with root execution privileges, mounting, via the secure application, the file system, obtaining, via the secure application, the private key from the file system, and accessing, via the secure application and over a network, the remote computer system using the private key.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: February 20, 2018
    Assignee: Oracle International Corporation
    Inventor: Thierry Manfe
  • Patent number: 9893884
    Abstract: According to an embodiment, a communication device is connected to another communication device through an optical communication path to generate an identical cryptographic key shared among the communication devices. The communication device includes a key sharing unit, a key distilling unit, a measuring unit, and a varying unit. The key sharing unit is configured to generate a shared bit string through quantum key distribution with the another communication device. The key distilling unit is configured to generate the cryptographic key from the shared bit string by a key distillation process. The measuring unit is configured to measure an error rate occurring in a photon string transmitted and received via a photon communication channel. The varying unit is configured to vary, based on the error rate, a communication function by applying a limitation on the optical data communication of an optical data communication channel or by releasing the limitation.
    Type: Grant
    Filed: March 11, 2015
    Date of Patent: February 13, 2018
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshimichi Tanizawa, Alex Dixon
  • Patent number: 9892089
    Abstract: In various embodiments an arithmetic logical unit array is provided, which may include: at least two data registers for storing data, a plurality of fixed instruction registers for storing machine code instructions, and at least one programmable instruction register for storing instruction data being representative for a machine code instruction. A selection circuit of the arithmetic logical unit array may be configured to select one of the machine code instructions from the fixed instruction registers or the machine code instruction represented by the instruction data. An arithmetic logical unit of the arithmetic logical unit array may be configured to apply an operation in accordance with the machine code instruction selected by the selection circuit to the data stored in the data registers.
    Type: Grant
    Filed: January 3, 2014
    Date of Patent: February 13, 2018
    Assignee: Infineon Technologies AG
    Inventor: Tomaz Felicijan
  • Patent number: 9887978
    Abstract: A system and method for efficiently obtaining user configuration information for a given device. Multiple devices are deployed in an environment and may be storage appliances. A directory service and an authentication service may be used to determine whether a login session attempt on a deployed device is successful. An identity and access manager (IAM) is used to for this determination and to communicate with the directory service and the authentication service. A device of the one or more of the deployed devices does not store user configuration information. Responsive to an attempted login by a user, the device mimics the existence of the user and generates a request for directory lookup and authentication for the user which is conveyed to an external device. If a positive response is received in response to the request, the user is permitted to login to the device and a session is created for the user.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: February 6, 2018
    Assignee: Veritas Technologies LLC
    Inventor: Vikas Goel
  • Patent number: 9887843
    Abstract: A cryptographically-enabled RFID tag stores a primary secret key and derives secondary keys from the primary key. A secondary key may be derived by combining the primary key with one or more other parameters using one or more algorithms. The tag uses a derived secondary key to encrypt or electronically sign a tag response sent to a verifying entity. The verifying entity does not know the derived secondary key, but knows the tag primary key and the parameters and algorithms used to derive the secondary key and can derive all of the potential secondary keys. The verifying entity can then attempt to authenticate the tag or tag response by trying potential secondary keys.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: February 6, 2018
    Assignee: IMPINJ, INC.
    Inventors: Matthew Robshaw, Alberto Pesavento, Christopher Diorio
  • Patent number: 9887857
    Abstract: A method for scheduling a management operation on devices in a home network is provided. The method includes identifying at least one device among a plurality of devices in a home network to schedule the management operation by a management server; obtaining log information from the at least one device identified by the management server; determining nature of the management operation on the at least one device identified by the management server; and scheduling the management operation on the at least one device identified by the management server in response to the determined nature and the obtained log information.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: February 6, 2018
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Chethan Konanakere Puttanna, Bharat Kumar Prathipati, Deepraj Prabhakar Patkar
  • Patent number: 9882807
    Abstract: A computer implemented method and system comprising receiving a data packet from a network source, extracting source and destination data from the received data packet, determining a user from the extracted source and destination data from the received data packet. If a label does not exist for the extracted source and destination data from the received data packet, creating a label for the data packet, the label comprising the extracted source data and historic source data for the determined user, calling a chaotic function with the label for the received data packet. If the chaotic function returns false, calling an alternative function for an output with the label for the received data packet. If the chaotic function returns true, capturing the output of the chaotic function, and updating the label with the output of the chaotic function or with the output of the alternative function.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: January 30, 2018
    Assignee: International Business Machines Corporation
    Inventors: Luis Campo Giralte, Jose Luis Mujeriego Gomez
  • Patent number: 9882881
    Abstract: A method and system for providing personalized and confidential data management and sharing services to the subscriber are disclosed. The method includes enabling an individual to register with a personalized and confidential data management and sharing system to become a subscriber. The subscriber may enter personalized and confidential data and designate recipients to receive personalized and confidential data and upload photographs of the recipients. The method includes determining the existence of the subscriber by tracking the visiting/login history of the subscriber at regular intervals, transmitting communication messages to the personalized digital account of the subscriber upon identifying the subscriber not logging in to the subscriber account and establishing a voice call with the contact number of the subscriber and/or the affiliates to confirm the demise/existence of the subscriber.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: January 30, 2018
    Inventors: Jyoth Singh Kohli, Parminder Singh Kohli
  • Patent number: 9876774
    Abstract: A communication security system includes a secure communication application module and a chip module. The communication security system is installed in a mobile device. Accordingly, the communication security system of the present invention allows mobile devices of users to encrypt and decrypt communication data between the users. A communication security method includes the steps of generating keys, requesting a key exchange by a first mobile device, receiving a key exchange by a second mobile device, receiving a key exchange by the first mobile device, activating a key by the second mobile device, activating a key by the first mobile device, and starting secure communication between the first and second devices. Thus, the encrypted communication can avoid theft and unauthorized falsification.
    Type: Grant
    Filed: February 6, 2015
    Date of Patent: January 23, 2018
    Assignee: GOTRUST TECHNOLOGY INC.
    Inventors: Tien-Chi Lee, Jeng Lung Li, Yi-Hsiung Huang
  • Patent number: 9871862
    Abstract: A method, system, and computer program product for managing an object related to a plurality of groups of users is disclosed. The method, system, and computer program product include utilizing identifiers of objects so that a requesting user can submit an object-request for access to the object utilizing a chosen identifier of the user. The method, system, and computer program product may work on a number of collaborative systems, file sharing mediums, or operating systems.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: January 16, 2018
    Assignee: International Business Machines Corporation
    Inventors: Al Chakra, Liam Harpur, John Rice
  • Patent number: 9870273
    Abstract: The present disclosure provides methods, systems, and media for allowing access to quantum ready and/or quantum enabled computers in a distributed computing environment (e.g., the cloud). Such methods and systems may provide optimization and computational services on the cloud. Methods and systems of the present disclosure may enable quantum computing to be relatively and readily scaled across various types of quantum computers and users at various locations, in some cases without the need for users to have a deep understanding of the resources, implementation or the knowledge that may be required for solving optimization problems using a quantum computer. Systems provided herein may include user interfaces that enable users to perform data analysis in a distributed computing environment while taking advantage of quantum technology in the backend.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: January 16, 2018
    Assignee: 1QB INFORMATION TECHNOLOGIES INC.
    Inventors: Majid Dadashikelayeh, Arman Zaribafiyan
  • Patent number: 9870458
    Abstract: A concealed data matching method for a computer including: registering a first concealed vector obtained by concealing registered data and key data based on a first random number and a linear combination of row vectors of a determination matrix; acquiring a second concealed vector; calculating a remainder vector indicating a remainder obtained by dividing the difference between the first concealed vector and the second concealed vector; determining the similarity between the registered data and the matching data based on the remainder vector; extracting the key data from the remainder vector if it is determined they are similar; calculating an inter-vector distance between the registered data and the matching data; and determining the similarity between the registered data and the matching data based on the magnitude of the inter-vector distance.
    Type: Grant
    Filed: November 16, 2016
    Date of Patent: January 16, 2018
    Assignee: FUJITSU LIMITED
    Inventor: Yuka Jo
  • Patent number: 9870463
    Abstract: A permission management method, apparatus, and terminal. The permission management method includes obtaining an installation package of a first application program, where the installation package carries a first certificate and permission request information of the first application program, determining, according to the permission request information, a first permission that the first application program requires during running, where the first permission is a system administrator permission of a system, and granting the first permission to the first application program according to the first certificate of the first application program. In this way, the first permission that the first application program requires during running is granted to the first application program.
    Type: Grant
    Filed: February 22, 2017
    Date of Patent: January 16, 2018
    Assignee: HUAWEI DEVICE (DONGGUAN) CO., LTD.
    Inventors: Xi Huang, Huangwei Wu
  • Patent number: 9866372
    Abstract: An encryption apparatus includes a setting generator configured to generate an increasing function parameter regarding a predetermined one-way increasing function and a secret key necessary for encryption, and an encryptor configured to generate a first order-preserving encryption area regarding a plaintext using the one-way increasing function where the increasing function parameter is applied, generate a second encryption area regarding the plain text using the secret key, and generate a ciphertext by concatenating the generated first encryption area and the generated second encryption area.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: January 9, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jae-woo Seo, Yong-ho Hwang
  • Patent number: 9866620
    Abstract: A method of transferring files in a data-processing network using a current node within the network includes reading an outbound content and outbound characteristics of an outbound file. An outbound message is created having outbound strings including a first set of the outbound strings representing the outbound characteristics and a second set of the outbound strings representing the outbound content. The outbound message is sent to a receiver node within the network. An inbound message is received from a sender node within the network. The inbound message has inbound strings including a first set of the inbound strings representing inbound characteristics and a second set of the inbound strings representing inbound content. An inbound file having the inbound content is stored, and the inbound characteristics are applied to the inbound file.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: January 9, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vicenzo Dentamaro, Francesco Sardella, Mario Somma
  • Patent number: 9859981
    Abstract: A system includes first signal processing circuitry to transmit a signal including a plurality of data streams over a link. The first signal processing circuitry generates a plurality of composite data streams by overlaying at least one first data signal of the plurality of data signals in a first data layer with at least one second data signal of the plurality of data signals in a second data layer. Second circuitry processes the plurality of composite data streams to associate with each of the plurality of composite data streams a function to provide minimization of a time-bandwidth product of the plurality of composite data streams to enable transmission of each of the plurality of composite data streams on the link at a same time.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: January 2, 2018
    Assignee: NxGen Partners IP, LLC
    Inventors: Solyman Ashrafi, Roger Linquist, Nima Ashrafi
  • Patent number: 9853785
    Abstract: A method for transmitting a control signal, performed by a wireless device. The method according to one embodiment includes allocating resource elements (REs) for a control channel; and transmitting the control signal through the Res. Each RE in the REs for the control channel is associated with one out of two antenna ports. The two antenna ports are included in a plurality of antenna ports used for transmitting demodulation reference signals (DM RS).
    Type: Grant
    Filed: December 24, 2014
    Date of Patent: December 26, 2017
    Assignee: LG ELECTRONICS INC.
    Inventors: Han Byul Seo, Dae Won Lee, Byoung Hoon Kim, Hak Seong Kim, Yu Jin Noh
  • Patent number: 9853741
    Abstract: A fiber optic encryption method is provided. The method includes transmitting an initial security key to a laser receiver apparatus over an out of band (OOB) signaling channel of a plurality of channels of a laser transmitter apparatus. The OOB signaling channel is secured based on the initial security key resulting in a secure OOB signaling channel. A secure bundle is generated. The secure bundle includes the secure OOB signaling channel and a group of channels and associated transmission frequencies. Data is transmitted via the secure bundle and it is determined if any channels do not transmit the data.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: December 26, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ricardo A. Golcher Ugalde, Franz F. Liebinger Portela
  • Patent number: 9848002
    Abstract: A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A computing device may execute the first module within a runtime environment. A module integrator may operate within the runtime environment for receiving a request from the first module to access a service provided by a second module and only allowing the first module to access the service when the first module is authorized to access the service according to a service authorization table. The sandbox validator may ensure the first module correctly identifies itself when requesting a service provide by another module and that the first module includes runtime policing functions for non-deterministic operations. A service authorizer may generate an authorization policy for the first module, which is sent to the computing device along with the first module.
    Type: Grant
    Filed: October 11, 2016
    Date of Patent: December 19, 2017
    Assignee: Guest Tek Interactive Entertainment Ltd.
    Inventor: Gary R. Court
  • Patent number: 9843929
    Abstract: A method and system for connecting an Internet of Things (IoT) hub to a wireless network. One embodiment of the method includes establishing a secure communication channel between an IoT hub and an IoT service through a client device using a first secret; generating a second secret on the client device and transmitting it to the IoT hub; encrypting a wireless key using the second secret to generate a first-encrypted key and transmitting it to the IoT service; encrypting the first-encrypted key using the first secret to generate a twice-encrypted key and transmitting it to the IoT hub over the secure communication channel; decrypting the twice-encrypted key at the IoT hub using the first secret to generate the first-encrypted key and decrypting it using the second secret to generate the wireless key usable to establish a secure wireless connection between the IoT hub and the local wireless network.
    Type: Grant
    Filed: August 21, 2015
    Date of Patent: December 12, 2017
    Assignee: Afero, Inc.
    Inventors: Scott Zimmerman, Evan Jeng, Shannon Holland, Clif Liu, Chris Aiuto
  • Patent number: 9838361
    Abstract: Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function. Methods secure migration of a virtual machine from a source to a target server. A server includes multiple cores where each core is dedicated to a compute function and a unique key encrypts data of each compute function. A non-transitory computer-readable medium encodes programs that execute the above methods.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: December 5, 2017
    Inventor: Ari Birger
  • Patent number: 9832103
    Abstract: A method for sending and receiving a data through multiple communication paths and an apparatus for receiving a data through multiple communication paths. A method for receiving a data through multiple communication paths by an apparatus for receiving a data includes receiving at least t (here, 0<t=n and n and t are natural numbers) of n shares generated from one unit data by a threshold encryption scheme by an apparatus for sending a data and sent through multiple communication paths on a network; and recovering the unit data using the at least t shares. According to exemplary embodiments of the present invention, data may be sent and received while ensuring confidentiality, integrity, and availability.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: November 28, 2017
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Hwan-Jo Heo, Jung-Ho Myung, Nam-Seok Ko
  • Patent number: 9819728
    Abstract: A system, computer-readable storage medium storing at least one program, and a computer-implemented method for facilitating deduplication of operations to be performed is presented. An operation to be performed is received. A mapping function is applied to at least one parameter of the operation to produce a mapping value in a target mapping space, the target mapping space being partitioned between target servers in a set of target servers proportional to resource capacities of the target servers in the set of target servers. A target server in the set of target servers whose portion of the target mapping space includes the mapping value is identified. The operation is issued to the target server.
    Type: Grant
    Filed: April 30, 2013
    Date of Patent: November 14, 2017
    Assignee: GOOGLE INC.
    Inventors: Alex Kesselman, Alexandre Drobychev
  • Patent number: 9817983
    Abstract: A method of printing comprising, at an imaging device, receiving a print-by-reference print request and an encryption key from a mobile device, transmitting the print-by-reference print request and the encryption key to a print service, receiving encrypted print content from the print service, receiving a decryption key from the mobile device, decrypting the encrypted print content, creating decrypted print content, and printing the decrypted print content. A method of printing content requested from a mobile device, comprising receiving a print request and encrypted print content, receiving a decryption key from the mobile device, decrypting the encrypted print content, and printing the decrypted print content.
    Type: Grant
    Filed: August 9, 2012
    Date of Patent: November 14, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Daniel Revel, Jeremy Bunn