Communication System Using Cryptography Patents (Class 380/255)
  • Patent number: 9306739
    Abstract: A communication process is provided for sending a qubit message between Alice and Bob using a quantum channel for obviating a faked-state attack by Eve. The qubit message is composed of ensemble bits and transmitted as a plurality of photons into the quantum channel. Each photon has a corresponding bit value. The process includes: Alice preparing three uniformly random bit strings each of length 4N to produce strings R (raw key), P (bit basis) and U (unitary operation), and Bob preparing two uniformly random bit strings of the same length to produce strings M (bit basis) and V (unitary operation). Alice broadcasts P, applies her unitary operation and records a first weak measurement to the photons for transmission. Meanwhile Bob broadcasts M, applies his unitary operation and records both a second weak measurement and a strong measurement to the photons.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: April 5, 2016
    Assignee: The United States of America as Represented by the Secretary of the Navy
    Inventor: James E. Troupe
  • Patent number: 9305200
    Abstract: The imager and controller of an information apparatus images the back face of another information apparatus to acquire the manufacturing number of the other information apparatus corresponding to the two-dimensional bar code provided on the back face of the other information apparatus and acquire visible light information corresponding to blinking of light emitted by the light emitter arranged on the back face of the other information apparatus. Furthermore, the controller controls the imager so as to be able to image the two-dimensional bar code and the light emitted by the light emitter.
    Type: Grant
    Filed: January 16, 2015
    Date of Patent: April 5, 2016
    Assignee: CASIO COMPUTER CO., LTD
    Inventor: Masaaki Kikuchi
  • Patent number: 9298893
    Abstract: A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.
    Type: Grant
    Filed: November 1, 2013
    Date of Patent: March 29, 2016
    Assignee: Uniloc Luxembourg S.A.
    Inventor: Reuben Bahar
  • Patent number: 9301133
    Abstract: A method, a device, and a communication system include receiving one or more concurrent transmissions from one or more source devices in the communication system; responsive to the one or more concurrent transmissions comprising a single source transmission from a single source device, retransmitting the single source transmission either clear or encrypted based on the single source transmission; responsive to the one or more concurrent transmissions comprising multiple transmissions from multiple source devices, performing one of: summing audio to create a summed resultant stream and broadcasting the summed resultant stream based on matching encryption parameters associated with each of the multiple transmissions; and broadcasting only a selected transmission of the one or more concurrent transmissions from a higher priority source device based on an encryption parameter mismatch between the multiple transmissions, wherein the selected transmission is broadcast based on encryption parameters associated with
    Type: Grant
    Filed: April 28, 2014
    Date of Patent: March 29, 2016
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventor: Arthur L Fumarolo
  • Patent number: 9294276
    Abstract: Embodiments of the present invention relate to providing encrypted content to authorized content consumers while providing robust traitor tracing. In one embodiment, a key bundle comprising at least one device key is read. A key block is read. A media key precursor is determined from the key block and the at least one device key. A security program is read. At least one encrypted block key is read. The security program is executed to determine a decrypted block key from the media key precursor and the encrypted block key. Encrypted content is read. The decrypted block key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: February 10, 2014
    Date of Patent: March 22, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Jeffrey B. Lotspiech
  • Patent number: 9276998
    Abstract: A method of transferring files in a data-processing network using a current node within the network includes reading an outbound content and outbound characteristics of an outbound file. An outbound message is created having outbound strings including a first set of the outbound strings representing the outbound characteristics and a second set of the outbound strings representing the outbound content. The outbound message is sent to a receiver node within the network. An inbound message is received from a sender node within the network. The inbound message has inbound strings including a first set of the inbound strings representing inbound characteristics and a second set of the inbound strings representing inbound content. An inbound file having the inbound content is stored, and the inbound characteristics are applied to the inbound file.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: March 1, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vicenzo Dentamaro, Francesco Sardella, Mario Somma
  • Patent number: 9270452
    Abstract: Technologies are generally described for providing an encryption method using real-world objects. In some examples, a method may include capturing, by a first electronic device, an external object, generating an object signal associated with the external object, generating an encryption key based on the object signal, and transmitting data encrypted by the encryption key to a second electronic device.
    Type: Grant
    Filed: October 17, 2014
    Date of Patent: February 23, 2016
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventors: Yutaka Arakawa, Naoaki Yamanaka, Eiji Oki
  • Patent number: 9264407
    Abstract: A probabilistic system and method facilitates the sharing of a secret among participating users in a private way. The secret shares satisfy the condition that their sum equal a predefined number that is chosen by a third party aggregator. Without interacting with any other user, each user computes a secret share according to a predefined probability density function. If enough parties join, their secret shares can be combined by the aggregator with relative efficiency into a secret with a high likelihood of success.
    Type: Grant
    Filed: April 3, 2014
    Date of Patent: February 16, 2016
    Assignee: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Igor Bilogrevic, Julien Freudiger, Ersin Uzun
  • Patent number: 9256834
    Abstract: A quantum computer may include topologically protected quantum gates and non-protected quantum gates, which may be applied to topological qubits. The non-protected quantum gates may be implemented with a partial interferometric device. The partial interferometric device may include a Fabry-Pérot double point contact interferometer configured to apply “partial” interferometry to a topological qubit.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: February 9, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Parsa Bonderson, Michael H. Freedman
  • Patent number: 9258114
    Abstract: Described herein are techniques related to implementation of a quantum key distribution (QKD) scheme by a photonic integrated circuit (PIC). For example, the PIC is a component in a wireless device that is used for quantum communications in a quantum communications system.
    Type: Grant
    Filed: December 5, 2012
    Date of Patent: February 9, 2016
    Assignee: Intel Corporation
    Inventors: Christopher J Jezewski, Kelin J Kuhn, Marko Radosavljevic
  • Patent number: 9253234
    Abstract: A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically fetched, material specific, data handlers (e.g., download assistants). A download assistant fetches a data stream from a remote location and processes the streamed data iteratively using buffers and multi-threaded processes through the decoder (e.g., codec), allowing source material-specific processing of the data as it is streamed from one or more download sources as well as content-indifferent and platform-indifferent decoding. To minimize versioning issues, payload construction for secure delivery is simplified to packing and encrypting a directory tree containing any number of files or other digital media into an archive and, when needed, dividing a payload into multiple files or archives with a descriptor that lists the archives.
    Type: Grant
    Filed: July 2, 2014
    Date of Patent: February 2, 2016
    Assignee: Arvato Digital Services LLC
    Inventors: David Aldis, Kenneth Brown, Andrew Gallant
  • Patent number: 9253273
    Abstract: The present invention relates to a method for providing a Law Enforcement Agency with user data related to a target subscriber. A Multiservice Proxy (30) is hereby acting as Intercepting Control Element (16). The method comprises the following steps: A request to intercept traffic data related to the target is received (40,41) to the Intercepting Control Element (16). User data related to the target subscriber for which traffic data has been requested is collected (44) in the Intercepting Control Element. The collected data is forwarded (45,46) to a Law Enforcement Management Function.
    Type: Grant
    Filed: June 11, 2010
    Date of Patent: February 2, 2016
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventor: Francesco Attanasio
  • Patent number: 9239934
    Abstract: A mobile computing system for providing a high-security execution environment is provided. The mobile computing system separates execution environments in the same mobile device on the basis of virtualization technology and manages user-specific execution environments using the same hardware security module, thereby facilitating protection of personal privacy.
    Type: Grant
    Filed: March 18, 2013
    Date of Patent: January 19, 2016
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Hong-Il Ju, Yong-Sung Jeon, Young-Sae Kim, Seung-Yong Yoon, Jeong-Nyeo Kim
  • Patent number: 9235316
    Abstract: Embodiments of the present invention are directed to a method and system for developing an analytic process. The method includes displaying, within an electronic system, a plurality of components operable to be used for designing a data analysis process. A user makes a selection of a data access component from the plurality of components. The data access component is operable for configuring access to a data source. The method further includes the user making a selection of a data selection component from the plurality of components and a data display component. The data selection component is operable for selecting data accessed via the data access component. The data display component is operable for configuring display of data based on the data selection component. Configuration data corresponding to the data access component, the data selection component, and the data display component can then be stored.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: January 12, 2016
    Assignee: Accenture Global Services Limited
    Inventor: David Martin Hummel, Jr.
  • Patent number: 9230091
    Abstract: Field programmable gate arrays can be used as a shared programmable co-processor resource in a general purpose computing system. Components of an FPGA are isolated to protect the FPGA and data transferred between the FPGA and other components of the computer system. For example, data written by the FPGA to memory is encrypted, and is decrypted within the FPGA when read back from memory. Data transferred between the FPGA and other components such as the CPU or GPU, whether directly or through memory, can similarly be encrypted using cryptographic keys known to the communicating components. Transferred data also can be digitally signed by the FPGA or other component to provide authentication. Code for programming the FPGA can be encrypted and signed by the author, loaded into the FPGA in an encrypted state, and then decrypted and authenticated by the FPGA itself, before programming the FPGA with the code.
    Type: Grant
    Filed: June 20, 2012
    Date of Patent: January 5, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Brian A. LaMacchia, Edmund B. Nightingale, Paul Barham
  • Patent number: 9232391
    Abstract: An authentication system for device-to-device (D2D) communication and an authentication method thereof are provided. The authentication system further includes first user equipment (UE) and an authentication server. The authentication server is located within a communication range of the first UE. When the first UE sends a connection request to the authentication server, the authentication server performs a routine authentication procedure on the first UE and provides key generation information to the first UE. The authentication server generates a server key according to the key generation information and a key derivation procedure. The first UE generates an equipment key according to the key generation information and the key derivation procedure to obtain authentication for D2D communication, such that the first user equipment and a second UE obtaining the authentication for D2D communication directly perform the D2D communication without performing the D2D communication through the authentication server.
    Type: Grant
    Filed: May 7, 2013
    Date of Patent: January 5, 2016
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Tzu-Ming Lin
  • Patent number: 9230129
    Abstract: A software trusted platform module (sTPM) operates in a hypervisor, receives trust assurances from specialized hardware, and extends this trust such that the hypervisor performs trust attestation. The hypervisor receives a startup sequence validation from a TPM, or Trusted Platform Module. The TPM performs bus monitoring during a boot sequence of the computer system, records the startup sequence from the bus, and performs a hash on the sequence. The TPM performs an authentication exchange with the hypervisor such that the hypervisor authenticates the attestation of the computer system from the TPM, and the hypervisor, now delegated with trust assurances from the TPM, provides assurances to users via an authentication chain. The ATCB then performs the attestation of the computer system according to the attestation protocol much faster than the TPM. In this manner, the hypervisor operates as a software delegate of the TPM for providing user assurances of trust.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: January 5, 2016
    Assignee: EMC Corporation
    Inventors: Wenbo Mao, Haibo Chen, Jun Li, Jingcheng Zhang
  • Patent number: 9231769
    Abstract: A computer-implemented method for providing interfaces for creating transport layer security certificates may include (1) displaying a user interface for configuring a proposed digital certificate for use in a transport layer security protocol, (2) receiving user input via the user interface that specifies a certificate configuration feature for the proposed digital certificate, (3) assessing a projected impact of the certificate configuration feature on a security metric of the proposed digital certificate, and (4) presenting the projected impact of the certification configuration feature on the security metric via the user interface. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 29, 2013
    Date of Patent: January 5, 2016
    Assignee: Symantec Corporation
    Inventor: Navin Naidu
  • Patent number: 9178623
    Abstract: The present invention utilizes a high-speed serial data transceiver to generate two high-speed electric pulse signals. After passing through a gain network, the signals are used for driving an electro-optic phase modulator (PM) so as to realize phase modulation of photon signals. The present invention may directly use a high-speed digital signal to realize a four-phase modulation function needed by the BB84 quantum key distribution protocol without using a digital to analog converter or an analog switch. This can prevent modulation rate from being restricted by links including digital-to-analog conversion, switching of the analog and the like. A dual-electrode electro-optic phase modulator scheme can also effectively reduce requirements for amplitude of a modulation driving signal, thus facilitating realization of high-speed phase modulation, which meets requirements of quantum key distribution.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: November 3, 2015
    Assignee: University of Science and Technology China
    Inventors: Wei Chen, Shuang Wang, Zhenqiang Yin, Dajun Huang, Yang Yang, Zheng Zhou, Deyong He, Yuhu Li, Zhengfu Han, Yonggang Wang, Guangcan Guo
  • Patent number: 9172692
    Abstract: Systems and methods for securely transferring authentication information between a user and an electronic resource are disclosed herein. The methods include providing an authentication image to a user interface. The authentication image is associated with a resource-side coordinate system and the providing includes encoding the resource-side coordinate system to generate a user-side coordinate system that is different from the resource-side coordinate system and transmitting the authentication image and the user-side coordinate system to the user interface. The methods further include receiving an encoded coordinate set, which uniquely identifies an authentication location in the user-side coordinate set and that is user-selected from the authentication image, from the user interface and decoding the encoded coordinate set to generate a decoded coordinate set that uniquely identifies the authentication location in the resource-side coordinate set. The systems include systems that perform the methods.
    Type: Grant
    Filed: March 12, 2014
    Date of Patent: October 27, 2015
    Inventor: William M. Langley
  • Patent number: 9172935
    Abstract: A terminal device capable of managing a storage capacity is provided. The terminal device includes a storage which stores a plurality of contents, a controller which selects candidates to be deleted according to a characteristic value from among the plurality of contents and generates a deletion candidate list, a display which displays the deletion candidate list, and an input which receives a user command to select content to be deleted from the deletion candidate list. A method of managing a storage capacity includes checking a storage capacity of a terminal device; in response to the storage capacity meeting a preset capacity condition, selecting candidates to be deleted from among a plurality of contents and generating a deletion candidate list; displaying the deletion candidate list; and deleting at least one content selected from the deletion candidate list.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: October 27, 2015
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Young-kyun Jun, Jeong-rok Jang
  • Patent number: 9165559
    Abstract: Digital audio signal watermarking in real-time is difficult in an environment that has limited processing power. According to the invention, the channels in a data block-based audio multi-channel signal are prioritized with respect to watermarking importance, whereby the channel priority can change for different input signal data blocks. For a current input signal block, the most important channel is watermarked and the required processing time is determined. If this required processing time is shorter than a predefined application-dependent threshold, the next most important channel is marked and the additionally required processing time is determined, and so on. Due to the block-based nature of the audio watermarking including block overlap/add and due to the sensitivity of the resulting audio quality against blocking artifacts, several problems are solved in order to lead to acceptable performance and quality.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: October 20, 2015
    Inventors: Peter Georg Baum, Ulrich Gries, Michael Arnold, Xiaoming Chen
  • Patent number: 9166787
    Abstract: Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an administrator header. The administrator header may be encrypted with a protection key, the protection key created from a user identifier corresponding to the user, a volume identifier corresponding to the virtual hard disk, and two cryptographic secrets. The protection key may then destroyed after encrypting the administrator header and therefore, might never leave the encryption engine. The two cryptographic secrets may be stored in separate storage locations, one accessible to the user and the other accessible to administrators. Accordingly, the protection key might never transmitted or can be intercepted, and no single entity may be compromised to gain access to all of the information needed to recreate the protection key.
    Type: Grant
    Filed: February 12, 2014
    Date of Patent: October 20, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Harry Nord, Timothy Gaylor, Benjamin Elliot Tucker
  • Patent number: 9143317
    Abstract: Various embodiments of a computer-implemented method of information security using block cipher column rotations are described. The cipher state column rotations provide resistance to white box side channel memory correlation attacks designed to reverse-engineer a symmetric cipher key associated with the information security system. The column rotation operations can be performed on the cipher state of a block cipher, and then removed from the result, to provide obfuscation of the data when in memory, while not impacting the resulting output of the cipher or decipher operation. The method additionally includes performing a first rotation of an iteration specific cipher subkey according to the first rotation index, performing an iteration of the block cipher operations on the cipher state matrix, and rotating the columns of the cipher state matrix according to an inverse of the first rotation index.
    Type: Grant
    Filed: May 24, 2013
    Date of Patent: September 22, 2015
    Assignee: Apple Inc.
    Inventors: Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia
  • Patent number: 9135725
    Abstract: Generic media covers can be generated for digital media items submitted by publishers without a personalized media cover. A generic media cover can be generated for a media item by hashing a unique identifier of the media item that remains consistent throughout the life cycle of the media item. Bytes of the hashed value can be translated into graphic parameters which are used to generate the generic graphic. The graphic parameters can be attached to the generic graphic, thus allowing a user to regenerate the generic graphic at a desired resolution at a later point in time. Also disclosed are techniques for ensuring that generic media covers for a bundle of media items appear substantially similar.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: September 15, 2015
    Assignee: Apple Inc.
    Inventors: David Makower, Jason N. Gould, Leo Lee
  • Patent number: 9137492
    Abstract: Described herein is a method and system for hierarchical wireless video with network coding which limits encryption operations to a critical set of network coding coefficients in combination with multi-resolution video coding. Such a method and system achieves hierarchical fidelity levels, robustness against wireless packet loss and efficient security by exploiting the algebraic structure of network coding.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 15, 2015
    Assignee: Massachusetts Institute of Technology
    Inventors: Luisa Lima, Steluta Gheorghiu, Joao Barros, Muriel Medard, Alberto Lopez Toledo, Joao Vilela
  • Patent number: 9122729
    Abstract: A method that builds a chain-of-custody for archived data is disclosed to ensure the integrity and reliability of the archived data. In one implementation, by using a certified Time Stamp Authority (TSA), an indelible record of each time the archived data is touched (e.g. created, stored, retrieved, accessed, tested, moved, or transformed) is generated to build verifiable links between events to ensure the custody of the data can be audited and verified that it has remained intact throughout its lifetime. The chain-of-custody, in combination with the storage architecture that ensures archive data has not changed through various software and hardware means (e.g., multiple hash signatures to ensure integrity, timestamp authorities to pinpoint each time the archived data was touched, location information to pinpoint physical location, and coordinated chain of custody on multiple replicas of the digital artifact) validates that the archived data has not changed since it was archived.
    Type: Grant
    Filed: July 30, 2010
    Date of Patent: September 1, 2015
    Assignee: Cumulus Data LLC
    Inventors: Joel Michael Love, Daniel Joseph Moore, Elliot Lawrence Gould, Laurence G. Walker, Timothy Allen Wright
  • Patent number: 9116706
    Abstract: This invention introduces a structured software engineering methodology for developing interactive network application systems that use a web browser as a user-dialog engine. The methodology uses two server types: Application Server(s) for instantiating and executing an application instance in binary code, and HTTP Server(s) for delivering to the user's browser the textual HTML+Javascript user-dialog documents used by this application instance during its execution. An application is accessed by executing at the user's browser an Application Instantiation Page (AIP) which is a part of this invention. The methodology is built into a notational programming language.
    Type: Grant
    Filed: October 4, 2013
    Date of Patent: August 25, 2015
    Inventor: Tamer Yunten
  • Patent number: 9106407
    Abstract: A cryptographic method, including generating, using a meta-secret, a first plurality of cryptographic keys, each cryptographic key associated with a respective key identifier, creating, using the meta-secret, a second plurality of sets of secret-shares, which are capable, by combining all the secrets-shares in any one of the sets together with the respective key identifier, of generating the associated cryptographic key, and performing cryptographic operations using the cryptographic keys. Related methods and apparatus are also included.
    Type: Grant
    Filed: April 23, 2012
    Date of Patent: August 11, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Aviad Kipnis, Eliphaz Hibshoosh
  • Patent number: 9098441
    Abstract: A method begins by a processing module generating an integrity check value for each encoded data slice of a set of encoded data slices to produce a set of integrity check values. The method continues with the processing module encoding the set of integrity check values to produce encoded integrity check values. The method continues with the processing module sending the encoded integrity check values for storage in a memory system.
    Type: Grant
    Filed: July 9, 2013
    Date of Patent: August 4, 2015
    Assignee: Cleversafe, Inc.
    Inventor: Jason K. Resch
  • Patent number: 9092640
    Abstract: A method, system, and computer program product for access control for a server application provided between a server executing an application and a client. Access control is added to an existing server application (for example, a legacy application) without changing the application or the database. The method includes: capturing a screen from the server application; determining if the screen includes sensitive content; and checking a client user's authorization before sending a screen including sensitive content to the client. Determining if the screen includes sensitive content may include: carrying out text recognition on the screen content; and analyzing the output of the text recognition to identify sensitive content.
    Type: Grant
    Filed: November 9, 2010
    Date of Patent: July 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: Tamar Domany, Ksenya Kveler
  • Patent number: 9064123
    Abstract: The efficiency of multiplication in secure function computation is increased to make the secret function computation faster than before. Three or more computing apparatuses cooperate to generate a secret value of a random number, perform secure function computation for secret values of arbitrary values by using a function including addition and multiplication to compute concealed function values, and compute a secret value. If the secret value is [0], a concealed function value is output; otherwise, information indicating that tampering has been detected is output.
    Type: Grant
    Filed: March 8, 2012
    Date of Patent: June 23, 2015
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Koki Hamada, Koji Chida
  • Patent number: 9065631
    Abstract: An integrated cryptographic apparatus providing confidentiality and integrity includes an integrated cryptographic module including confidentiality and integrity. Further, the integrated cryptographic apparatus includes a hash function unit for detecting whether a message is modified by using the integrated cryptographic module. Furthermore, the integrated cryptographic apparatus includes a block cipher unit for constructing a data encryption algorithm by using the integrated cryptographic module.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: June 23, 2015
    Assignees: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE, KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATION
    Inventors: Ku Young Chang, Seokhie Hong, Jesang Lee, Jaechul Sung, Jinkeon Kang
  • Patent number: 9049232
    Abstract: Methods and apparatus for a configurable-quality random data service are disclosed. A method includes implementing programmatic interfaces enabling a determination of respective characteristics of random data to be delivered to one or more clients of a random data service of a provider network. The method includes implementing security protocols for transmission of random data to the clients, including a protocol for transmission of random data to trusted clients at devices within the provider network. The method further includes obtaining, on behalf of a particular client and in accordance with the determined characteristics, random data from one or more servers of the provider network, and initiating a transmission of the random data directed to a destination associated with the particular client.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: June 2, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Nachiketh Rao Potlapally, Donald Lee Bailey, Jr., Andrew Paul Mikulski, Robert Eric Fitzgerald
  • Patent number: 9043827
    Abstract: A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data.
    Type: Grant
    Filed: December 16, 2009
    Date of Patent: May 26, 2015
    Assignee: PRIME RESEARCH ALLIANCE E, INC.
    Inventors: Maxim Rapoport, Charles A. Eldering
  • Publication number: 20150139421
    Abstract: Method and system of key distribution by trusted nodes for a vehicular ad hoc network, the nodes of said network having at least one pair of public-private keys and the corresponding certificates, issued by a CA, said method comprising each vehicle node, on entering said network region, requesting a set of keys from an RSU node that is within range and within that region, said RSU node sending said vehicle node a set of private keys, selected from a pool of private keys, and a list with the key identifiers of the private keys shared by said vehicle node and the other vehicle nodes that have most recently contacted said RSU for a predetermined period of time; such that two nodes are able to establish a secure connection without further interaction by deriving a shared secret which is a cryptographic hash function of the keys shared by said two nodes.
    Type: Application
    Filed: November 7, 2013
    Publication date: May 21, 2015
    Inventors: Joäo Francisco Cordeiro De Oliveira Barros, Joäo Paulo Patriarca De Almeida, Mate Boban, Saurabh Shintre
  • Patent number: 9037844
    Abstract: An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa in a secure manner. The network provides a communication medium for communicating via the C12.22 protocol for secure metering. A cryptographic backend is used to cryptographically process messages to be sent to the meter and to similarly cryptographically process messages sent from the meter. By providing appropriate cryptographic measures such as key management, confidentiality and authentication, the meter can only interpret and process messages from a legitimate utility and the utility can ensure that the messages it receives are from a legitimate meter and contain legitimate information.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: May 19, 2015
    Assignee: Itron, Inc.
    Inventors: Michael T. Garrison Stuber, Richard Eric Robinson
  • Patent number: 9031227
    Abstract: A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the crypto-module so as to generate an intermediate stream including sequential output symbols corresponding respectively to the input symbols, and converting the intermediate stream to an output stream from the crypto-module by comparing successive groups of the input symbols and the corresponding output symbols to the reserved pattern and, upon finding a match to the reserved pattern in a given group, substituting the input symbols in the group into the intermediate stream in place of the corresponding output symbols. Related hardware and systems are also described.
    Type: Grant
    Filed: December 28, 2009
    Date of Patent: May 12, 2015
    Assignee: Cisco Technology Inc.
    Inventors: Yaacov Belenky, Chaim D. Shen-Orr
  • Patent number: 9032208
    Abstract: A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not completely matched between communication terminals. A cipher key transfer device acquires a one-time pad cipher key from a key sharing system, divides the acquired one-time pad cipher key with a predetermined number of bits, and transfers the same to a mobile communication terminal after converting the same into one-time pad cipher key cartridges. Along with the partner's terminal, the mobile communication terminal negotiates which one-time pad cipher key cartridge will be used to perform cipher communication, decides the one-time pad cipher key cartridge to be used, and begins cipher communication.
    Type: Grant
    Filed: August 24, 2010
    Date of Patent: May 12, 2015
    Assignee: Mitsubishi Electric Corporation
    Inventors: Hirosato Tsuji, Yoichi Shibata
  • Patent number: 9032221
    Abstract: An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is operable to configure a configurable microprocessor system. The configuration apparatus is further operable to be coupled to the logging apparatus in order to log a configuration of the microprocessor system using the logging apparatus.
    Type: Grant
    Filed: September 28, 2010
    Date of Patent: May 12, 2015
    Assignee: Infineon Technologies AG
    Inventor: Stefan Rueping
  • Patent number: 9025770
    Abstract: A method for encrypting a file using a combination of an electronic device and a protection communication-enabled (PCE) wireless device is provided. The method includes using an encryption/decryption engine executing on the electronic device to encrypt a first flag string, which is a binary string stored in a header of the file, with a digest value to create an encrypted flag string. The digest value is associated with the PCE wireless device, which is a device having a transmission application program installed thereon for enabling interaction between the PCE wireless device and the encryption/decryption engine. The method also includes encrypting at least a portion of the file using the digest value and a first password provided by a user, thereby generating an encrypted file that includes an encrypted version of at least a portion of the file, the encrypted flag string, and the first flag string.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: May 5, 2015
    Assignee: Trend Micro Incorporated
    Inventors: WeiChao Dai, Chao Fang, Zhentao Huang
  • Patent number: 9026788
    Abstract: In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at the client and injected into the authentication form using the parameters and code.
    Type: Grant
    Filed: April 25, 2013
    Date of Patent: May 5, 2015
    Assignee: Symantec Corporation
    Inventors: Barry Ferg, Gary Krall, David M'Raihi, Nicolas Popp
  • Patent number: 9021463
    Abstract: A method, system and apparatus for management of push content is provided. An intermediation infrastructure mediates traffic from a push content server that is addressed to a computing device. The intermediation infrastructure enforces various policies such that, for example, unwanted communications are not pushed to the computing device.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: April 28, 2015
    Assignee: BlackBerry Limited
    Inventors: Han Zhen Yang, Rakesh Kumar Arora, Onofre Manuel De Melo
  • Patent number: 9021557
    Abstract: A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this respect, both the mobile device (which may be a mobile phone, for example) and the paired remote device (which may be a keychain, for example) include a SIM card that may have identification data stored therein. Once paired, the two devices may communicate encrypted security messages back and forth in order to implement various security measures to protect data and wireless communications. Such messages may be generated from initial information known only to each respective device such as a randomly generated offset number and a common time reference.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: April 28, 2015
    Assignee: STMicroelectronics Pte Ltd
    Inventor: Olivier Leneel
  • Patent number: 9020149
    Abstract: Disclosed are various embodiments for obtaining a service request from a client, the service request including plaintext data to be encrypted and associated metadata. Ciphertext data is generated based upon the plaintext data. The ciphertext data is stored in a record in a data store of a cryptographic device. A service response is provided to the client, which includes a record identifier for the record in the data store.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 28, 2015
    Assignee: Amazon Technologies, Inc.
    Inventor: Yogesh Vilas Golwalkar
  • Patent number: 9020150
    Abstract: Differential uncloneable variability-based cryptography techniques are provided. The differential cryptography includes a hardware based public physically uncloneable function (PPUF) to perform the cryptography. The PPUF includes a first physically uncloneable function (PUF) and a second physically uncloneable function. An arbiter determines the output of the circuit using the outputs of the first and second PUFs. Cryptography can be performed by simulating the PPUF with selected input. The output of the simulation, along with timing information about a set of inputs from where the corresponding input is randomly selected for simulation, is used by the communicating party that has the integrated circuit with the PPUF to search for an input that produces the output. The input can be configured to be the secret key or a part of the secret key.
    Type: Grant
    Filed: May 5, 2013
    Date of Patent: April 28, 2015
    Assignee: Empire Technology Development LLC
    Inventors: Nathan Zachary Beckmann, Miodrag Potkonjak
  • Patent number: 9008311
    Abstract: A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is equipped with computational resources stronger than the computational resources of an adversary computer. There is provided a method for sending a secret from the sender computer to a designated receiver computer. The sender computer defining a succession of computational tasks having respective solutions. The computational tasks are so defined such that the duration of solving each task by the receiver computer is shorter than what would have been required for the adversary computer to solve the task. Next, the sender computer sending through the link the succession of tasks encrypted by previous solutions and the receiver computer receiving the tasks and is capable of decrypting the secret faster than what would have been required for the adversary computer to decrypt the secret.
    Type: Grant
    Filed: June 23, 2005
    Date of Patent: April 14, 2015
    Assignee: Ben-Gurion University of the Negev Research and Development Authority
    Inventors: Shlomi Dolev, Ephraim Korach, Galit Uzan
  • Patent number: 9008314
    Abstract: A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption protocol, encrypts a second set of packets using a second encryption protocol, where the second encryption protocol is different from the first encryption protocol, transmits, using a first channel over a wireless network, the first set of packets, and transmits, using a second channel over the wireless network, the second set of packets. The receiving access point receives the first set of packets and the second set of packets, decrypts the first set of packets using the first encryption protocol, and decrypts the second set of packets using the second encryption protocol.
    Type: Grant
    Filed: November 18, 2008
    Date of Patent: April 14, 2015
    Assignee: Verizon Patent and Licensing Inc.
    Inventor: Scott D. Arena
  • Patent number: 9008313
    Abstract: A system for generating random key stream cipher texts passes an unencrypted random key stream through an AES engine to produce encrypted cipher text having a first block size in a first frequency domain; converts the encrypted cipher text in the first frequency domain to encrypted cipher text in a second frequency domain; and converts the encrypted cipher text having the first block size in the second frequency domain into smaller block sizes. The frequency in the first frequency domain is preferably lower than the frequency in the second frequency domain. The converting of the encrypted cipher text in the first frequency domain to encrypted cipher text in a second frequency domain may be effected by a dual clock domain FIFO.
    Type: Grant
    Filed: July 24, 2014
    Date of Patent: April 14, 2015
    Assignee: Elliptic Technologies Inc.
    Inventors: Michael James Lewis, Neil Leckett, A. A. Jithra Adikari
  • Patent number: 9008312
    Abstract: A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding the transfer of the key offers several advantages over existing encryption methods.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: April 14, 2015
    Assignee: Koolspan, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo