Symmetric Key Cryptography Patents (Class 380/259)
-
Patent number: 11627176Abstract: Methods and systems are provided for bitrate adaptation of a video asset to be streamed to a client device for playback. The method includes selecting a representation from a manifest which expresses a set of representations available for each chunk of the video asset and generating a dynamic manifest for the video asset in which the representation selected for the at least one chunk is recommended for streaming to the client device. The selection of the representation recommended for the chunk may be based on at least one of historic viewing behavior of previous viewers of the chunk, content analysis information for the chunk, a level of available network bandwidth, a level of available network storage, and data rate utilization information of network resources including current, average, peak, and minimum data rate of network resources.Type: GrantFiled: April 20, 2021Date of Patent: April 11, 2023Assignee: ARRIS Enterprises LLCInventors: Bhavan Gandhi, Faisal Ishtiaq, Anthony J. Braskich, Andrew Aftelak
-
Patent number: 11620647Abstract: Systems and methods are described for provisioning access credentials to a mobile device using device and authorization codes. Once provisioned, a mobile device can be used to conduct a transaction.Type: GrantFiled: February 4, 2021Date of Patent: April 4, 2023Assignee: Visa International Service AssociationInventors: Kim R. Wagner, John F. Sheets, Glenn Powell
-
Patent number: 11606366Abstract: In one embodiment, a sender node in a serial network identifies a message identifier for a packet to be sent by the sender node. The sender node selects a cyclical redundancy check (CRC) initialization vector associated with the message identifier. The sender node generates a CRC value for the packet, based on the selected initialization vector. The sender node sends the packet via the serial network. The sent packet includes the message identifier and the generated CRC value. In turn, a receiver node that receives the packet uses the generated CRC value to authenticate the sender node.Type: GrantFiled: July 2, 2019Date of Patent: March 14, 2023Assignee: Cisco Technology, Inc.Inventors: Yaron Sella, Kevin Holcomb, Raghuram S. Sudhaakar
-
Patent number: 11569979Abstract: Methods, systems and computer program products for improving performance of a cryptographic algorithm are described. First, data to be encrypted/decrypted is provided as input to the system. A primary key, or multiple keys (in case of asymmetric cryptography), is generated for the encryption/decryption process. The primary key consists of metadata as well as key blocks containing secondary keys. The metadata contains information explaining how the data will be handled from algorithmic structure to the base cryptographic scheme to be used. Further, the data is split and processed via relevant portions of the key blocks. Finally, the completed encrypted/decrypted data segments are combined in order to complete the process. The used process ensures higher performance as well as higher algorithmic entropy than comparable methods in literature or on the market.Type: GrantFiled: June 2, 2020Date of Patent: January 31, 2023Inventor: Sameer Khanna
-
Patent number: 11546136Abstract: The described technology is generally directed towards generating shared authentication keys using network connection characteristics. According to an embodiment, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise generating a first authenticator based on a first authentication key generated based on a first connection characteristic of the first device and a second connection characteristic of a second device. The operations can further comprise incorporating the first authenticator into first content for authentication by the second device employing a second authentication key, generated by the second device based on the first connection characteristic and the second connection characteristic. The operations can further comprise establishing, based on the first content, a connection with the second device.Type: GrantFiled: August 27, 2019Date of Patent: January 3, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Venkata L. R. Ippatapu, Kenneth Dorman
-
Patent number: 11533167Abstract: Method, device and computer program product for managing a plurality of encryption keys using a keystore seed that defines a seed bit set. A key management process defines a key mapping between the seed bit set and the plurality of encryption keys. The key management process enables each encryption key to be generated from the seed bit set using a corresponding keying material value and the key mapping. The key mapping specifies that an encryption key is generated by partitioning the seed bit set into a plurality of seed bit partitions, determining a keying value from the keying material value, determining a key sequence using the plurality of seed bit partitions and the keying value, and determining the encryption key from the key sequence. Management of a large number of encryption keys can be simplified through indirect management via the keystore seed and the key management process.Type: GrantFiled: May 21, 2020Date of Patent: December 20, 2022Assignee: BICDROID INC.Inventor: En-Hui Yang
-
Patent number: 11516004Abstract: A method for securing communications for a given network topology is provided. The method comprises generating by a node N(i) of the network, security parameters for the node N(i); transmitting by the node N(i), said security parameters to a controller for the network; maintaining by the controller said security parameters for the node N(i); receiving by the controller a request from a node N(j) for the security parameters for the node N(i); retrieving by the controller the security parameters for the node N(i); and transmitting by the controller said security parameters to the node N(j).Type: GrantFiled: January 29, 2021Date of Patent: November 29, 2022Assignee: Cisco Technology, Inc.Inventors: Syed Khalid Raza, Praveen Raju Kariyanahalli, Rameshbabu Prabagaran, Amir Khan
-
Patent number: 11468796Abstract: This numerical splitting device: acquires a numerical value w and a parameter p; generates a first random number r1 and a second random number r2; computes a third random number r3 based on the numerical value w, parameter p, first random number r1, and second random number r2 according to an expression, r3=w?r1-r2 mod p; computes first to third segments s1, s2, s3 based on the first to third random numbers r1, r2, r3 and the parameter p according to expressions, s1=r1+r2 mod p, s2=r2+r3 mod p, and s3=r3+r1 mod p; and transmits a pair of the first segment s1 and the second random number r2, a pair of the second segment s2 and the third random number r3, and a pair of the third segment s3 and the first random number r1 to first to third secure computation devices, respectively.Type: GrantFiled: May 18, 2017Date of Patent: October 11, 2022Assignee: NEC CORPORATIONInventors: Toshinori Araki, Kazuma Ohara
-
Patent number: 11449888Abstract: Two different user spaces can be mapped to each other based on one or more categories of information that are common to both. The mapping is based on hash values generated by applying the same hash function to the same information of the categories of information that identifies users in each user space.Type: GrantFiled: December 17, 2019Date of Patent: September 20, 2022Assignee: Twitter, Inc.Inventor: Jeffrey Winner
-
Patent number: 11449310Abstract: A method for generating a random number, applied in a random number generator coupled to a flash memory is disclosed. the method comprises: selecting a plurality of cells from the flash memory; initializing the selecting cells of the flash memory; programming the selecting cells to obtain a plurality of first potential values of the selecting cells; re-initializing the selecting cells of the flash memory; re-programming the selecting cells to obtain a plurality of second potential values of the selecting cells; and processing the first potential values and the second potential values according to a predetermined algorithm to generating the random number.Type: GrantFiled: August 21, 2019Date of Patent: September 20, 2022Assignee: RAYMX MICROELECTRONICS CORP.Inventors: Shih-Fu Huang, Cheng-Yu Chen, Yi-Lin Hsieh, Jing-Long Xiao
-
Patent number: 11448522Abstract: Method and devices for wirelessly transmitting data packets in a meter reading system, wherein the method comprises generating at the meter device, a first data packet including payload data and a first message authentication code computed based the payload data and associated meter data stored in a memory of the meter device, transmitting the first data packet from the meter device to the receiver, and performing a primary authentication check of the first data packet and verifying the associated meter data at the receiver by recalculating the first message authentication code using the received payload data and current associated meter data stored in a memory of the receiver, as input.Type: GrantFiled: February 9, 2018Date of Patent: September 20, 2022Assignee: Kamstrup A/SInventors: Johnny Dørken Christiansen, Flemming Hald
-
Patent number: 11429739Abstract: A method and system that enables a data owner to write data in an encrypted manner to an immutable ledger, and yet still be able to grant read access to specific data elements, as they were written at particular moments in time, to a requesting party. Examples therefore provide a process for encryption of data onto an immutable ledger in a time indexed manner, together with a process by which a third party can request access to the data stored in the immutable ledger from the data owner, and the data owner can provide them with certain decryption keys that allow the third party to read the data directly from the immutable ledger, again based on time-indexed queries. The data the third party can read is restricted to specific elements only of the data written, and further restricted to within a time range or to a specific point in time.Type: GrantFiled: May 19, 2020Date of Patent: August 30, 2022Assignee: Ordnance Survey LimitedInventor: David Charles Alexander Stow
-
Patent number: 11405421Abstract: An electronic control apparatus includes: an obtaining unit configured to obtain data transmitted via a network in a system; and a judging unit configured to judge presence or absence of an anomaly in the data obtained by the obtaining unit, based on a transmission state of the data. The judging unit is configured to judge that an anomaly is present in the data, when the transmission state of the data is a transmission stopped state.Type: GrantFiled: June 10, 2019Date of Patent: August 2, 2022Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Kaoru Yokota, Toshihisa Nakano, Jun Anzai
-
Patent number: 11405192Abstract: A searchable symmetric encryption (SSE) system and method of processing inverted index is provided. The SSE system includes genKey, buildSecureIndex, genToken, and search operations. A compress X is integrated into at least one of the buildSecureIndex and search operations. The compress then X takes each entry of an encrypted index, compresses entry of the encrypted index into a compressed entry, and then processes the compressed entry with a function. The function comprises a linked list function and on array function. The search operation decompresses the processed entry and output the decompressed entry. The SSE comprises a client device and a server. The genKey, buildSecureIndex, and genToken operations are integrated into the client device and the search operation is integrated into the server.Type: GrantFiled: August 24, 2017Date of Patent: August 2, 2022Assignee: Robert Bosch GmbHInventors: Qingji Zheng, Xinxin Fan, Jorge Guajardo Merchan
-
Patent number: 11405222Abstract: Methods and systems for implementing DevID enrollment for hardware redundant Trust Platform Modules (TPMs), are described. A system can include hardware redundancy for management modules, and for TPMs that correspond to each management module. Accordingly, a product can have a dual-TPM configuration, where both modules are associated with the same product. Further, a process that particularly considers the presence of dual-TPMs for creating, issuing, and enrolling DevID certificates is described. The process issues and maintains DevID certificates for each TPM by synchronizing dual sessions that correspond to each TPM. Also, the process accounts for duplicate identification data, for example allowing the certificate authority (CA) to sign certificates for dual-TPMs linked to the same chassis number. The process can include performing validation checks, rendezvous points, and locks to ensure that DevID certificates are successfully issued for each of the dual-TPMs, respectively.Type: GrantFiled: December 20, 2019Date of Patent: August 2, 2022Assignee: Hewlett Packard Enterprise Development LPInventor: Thomas M. Laffey
-
Patent number: 11381378Abstract: According to the chaotic communication method and system based on complex modified projective difference function synchronization provided in the present invention, when a chaotic signal has a relatively small amplitude, the amplitude of the chaotic signal can be adjusted by adjusting a proportional matrix, so as to mask plaintext better. Moreover, a robust controller is designed according to a filtered signal and a second coupling function, to ensure complex modified projective difference function synchronization, and such synchronization allows the bit error rate to be zero theoretically.Type: GrantFiled: September 30, 2020Date of Patent: July 5, 2022Assignees: Qilu University of Technology, Shandong Institute of Artificial IntelligenceInventors: Fangfang Zhang, Minglei Shu, Kai Sun, Mingming Huang, Xue Zhang
-
Patent number: 11374745Abstract: Disclosed systems and methods implement a tracking system that tracks accesses to a TPM-secured key. In embodiments, the key may be encrypted using an encryption key, which is sealed using the TPM. A first value indicating an initial access state of the key is stored in a PCR of the TPM, and the encryption key is sealed against the PCR, so that it can be unsealed when contents of PCR match a next value derived from the first value. When the key is accessed, contents of the PCR is verified against an expected access state. If successfully verified, the PCR is extended hold the next value, the encryption key is unsealed, and the key decrypted. With each access, the encryption key is repeatedly resealed against the successive states stored in PCR. In this manner, the PCR may be used to track accesses and detect unauthorized accesses to the key.Type: GrantFiled: November 29, 2017Date of Patent: June 28, 2022Assignee: Amazon Technologies, Inc.Inventor: Atul Khare
-
Patent number: 11374747Abstract: A vehicular system includes a first electronic control device that manages an encryption key, and a second electronic control device that uses the encryption key. The first electronic control device is configured to create the encryption key in response to that an owner of a vehicle has changed, and output the encryption key to the second electronic control device. The second electronic control device is configured to store a first encryption key and a third encryption key, receive a second encryption key, switch the encryption key being used, and update the first encryption key to the second encryption key.Type: GrantFiled: October 24, 2019Date of Patent: June 28, 2022Assignee: DENSO CORPORATIONInventor: Yasuharu Sugano
-
Patent number: 11334890Abstract: A method for generating payment credentials in a payment transaction includes: storing, in a memory, at least a single use key associated with a transaction account; receiving, by a receiving device, a personal identification number; identifying, by a processing device, a first session key; generating, by the processing device, a second session key based on at least the stored single use key and the received personal identification number; generating, by the processing device, a first application cryptogram based on at least the first session key; generating, by the processing device, a second application cryptogram based on at least the second session key; and transmitting, by a transmitting device, at least the first application cryptogram and second application cryptogram for use in a payment transaction.Type: GrantFiled: December 2, 2014Date of Patent: May 17, 2022Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventors: Mehdi Collinge, Patrik Smets, Axel Emile Jean Charles Cateland
-
Patent number: 11303436Abstract: Systems and methods for performing cryptographic data processing operations employing non-linear share encoding for protecting from external monitoring attacks. An example method includes: receiving a plurality of shares representing a secret value employed in a cryptographic operation, such that the plurality of shares includes a first share represented by an un-encoded form and a second share represented by an encoded form; producing a transformed form of the second share; and performing the cryptographic operation using the transformed form of the second share.Type: GrantFiled: June 23, 2017Date of Patent: April 12, 2022Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventor: Elke De Mulder
-
Patent number: 11303433Abstract: The present invention provides a method and a device for generating an HD wallet name card and a method and a device for generating an HD wallet trusted address. The method for generating the HD wallet name card comprises: first signature information is obtained by digitally signing first user information with a first private key; second signature information is obtained by digitally signing second user information with a first trusted private key; and the first user information, the second user information, the first signature information and the second signature information are integrated to generate the HD wallet name card. The present invention is advantageous in that the wallet information is digitally signed with the preset first trusted private key and the first private key, thus preventing the HD wallet name card from being forged, intercepted, and modified by a third party so as to ensure the security of transaction.Type: GrantFiled: May 9, 2019Date of Patent: April 12, 2022Inventor: Yanbin Kong
-
Patent number: 11303441Abstract: Provided are a computer program product, system, and method embodiments for reverting from a new security association to a previous security association in response to an error during a rekey operation. The responder maintains a first security association with the initiator having a first key to use to encrypt and decrypt messages transmitted with the initiator. The responder receives a message from the initiator for a rekey operation to establish a second security association with the initiator using a second key. The responder queues Input/Output (I/O) for transmission using the second key after completing the rekey operation. After activating the second security association, the responder receives a revert message from the initiator to revert back to using the first security association and first key in response to a failure of the rekey operation.Type: GrantFiled: September 25, 2019Date of Patent: April 12, 2022Assignee: International Business Machines CorporationInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, Mikel William Welsh, Alol Antony Crasta, John R. Flanagan
-
Patent number: 11283620Abstract: An approach is provided for a homomorphic cryptosystem for use in resource-constrained environments (e.g., vehicle-based use cases) or when computer resources are to be conserved. The approach involves, for example, generating a nonce at a first device (e.g., vehicle engine control unit (ECU)). The approach also involves performing a homomorphic operation on the nonce and a ciphertext to generate a resulting cipher. The ciphertext is provided by a second device (e.g., a data server). The approach further involves attaching the resulting cipher to a request payload (e.g., to request secure data from the data server). The approach further involves transmitting the request payload including the nonce to the second device (e.g., the server).Type: GrantFiled: October 1, 2019Date of Patent: March 22, 2022Assignee: HERE Global B.V.Inventor: Ali Abbas
-
Patent number: 11256478Abstract: The present invention relates to a method for securing against N-order side-channel attacks a cryptographic process using in a plurality of encryption rounds an initial Substitution box S0 comprising the steps of: —generating (E12) a first randomized substitution box S1 by masking said initial substitution box S0 such that S1(x XOR m1)=S0(x) XOR m2, with m1, m2 uniformly-distributed random values, for any input value x of the initial substitution box S0, —generating (E13) a first transrandomized Substitution box S(1,1) from the first randomized substitution box S1 and from masks m1,1, m?1,1 such that S(1, 1)[x]=S1[x xor (m1 xor m1,1)] xor (m2 xor m?1,1) for any input value x of the first transrandomized Substitution box S(1,1), —generating (E14) from the first transrandomized Substitution box S(1,1) a N?1th transrandomized Substitution box S(1, N?1) by performing iteratively N?2 times a step of generation of a ith transrandomized Substitution box S(1, i) from a i?1th transrandomized substitution box S(1, i?1)Type: GrantFiled: June 28, 2018Date of Patent: February 22, 2022Assignee: THALES DIS FRANCE SAInventor: David Vigilant
-
Patent number: 11245521Abstract: Provided are a computer program product, system, and method embodiments for reverting from a new security association to a previous security association in response to an error during a rekey operation. An initiator maintains a first security association with the responder having a first key to use to encrypt and decrypt data transmitted with the responder. The initiator initiates a rekey operation to establish a second security association with the responder using a second key. The initiator detects a failure of the rekey operation after the responder started using the second key for transmissions. A revert message is sent to the responder to revert back to using the first security association and first key in response to detecting the failure of the rekey operation.Type: GrantFiled: September 25, 2019Date of Patent: February 8, 2022Assignee: International Business Machines CorporationInventors: Roger G. Hathorn, Patricia G. Driever, Christopher J. Colonna, Mooheng Zee, John R. Flanagan, Alol Antony Crasta, Mikel William Welsh
-
Patent number: 11222135Abstract: A method and system of protecting user sensitive information from an application program of a user device are provided. The application program to be installed is received on the user device. Permissions to resources of the user device for the application program are identified. For each permission, mapping the permission to one or more sections of a code of the application program. For each mapped section of the code, a recipient of user sensitive information facilitated by the permission is determined. For each recipient, it is determined whether the recipient should be restricted. Upon determining that the recipient should not be restricted, the user sensitive information facilitated by the permission is provided to the recipient. However, upon determining that the recipient should be restricted, alternate information to the recipient.Type: GrantFiled: May 28, 2018Date of Patent: January 11, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Omer Tripp, Julian Timothy Dolby, Marco Pistoia, Pietro Ferrara
-
Patent number: 11218463Abstract: In one example, a system is disclosed, which may include a network device, a new server connected to the network device, and a management server communicatively connected to a cloud-based service and the network device. The management server may include a server deployment engine to discover the new server in the system using the network device; obtain an encrypted data blob associated with the new server from the cloud-based service; establish a trust, via a secure protocol, with the new server using the encrypted data blob; and deploy the new server in the system upon establishing the trust with the new server.Type: GrantFiled: July 21, 2017Date of Patent: January 4, 2022Assignee: Hewlett Packard Enterprise Development LPInventors: Suhas Shivanna, Alan L Goodrum
-
Patent number: 11178108Abstract: The invention comprises a method for filtering data. The method comprises receiving a network request from a client, determining, based on one or more filtering criteria, whether to forward the network request to a server, and based on the determining, forwarding the network request to the server, or preventing the network request from reaching the server and blocking future network requests from the client.Type: GrantFiled: November 18, 2020Date of Patent: November 16, 2021Assignee: QIP SOLUTIONS LIMITEDInventor: Fiona Kane
-
Patent number: 11115187Abstract: The present disclosure relates to a block cipher apparatus and method for real-time data transmission and the block cipher apparatus according to an exemplary embodiment of the present disclosure includes: a block encryption unit which selects a key in accordance with an order of keys having different lengths to encrypt each plaintext block and generate a ciphertext block; and a message authentication unit which generates a message authentication code using a key selected at the time of encrypting a current plaintext block which is encrypted in the block encryption unit and a previous message authentication code generated by a plaintext block before the current plaintext block.Type: GrantFiled: May 28, 2019Date of Patent: September 7, 2021Assignee: KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATIONInventors: Hwangnam Kim, Seounghwan Oh, Seongjoon Park
-
Patent number: 11102236Abstract: Systems and methods provide for identification and remediation of IoT devices exhibiting anomalous behaviors. An IoT management system can identify IoT devices requiring remediation. The IoT management system may present a first interface including representations of the devices requiring remediation, where each representation can include identifying information for an IoT device, policies applied to the IoT device, and bandwidth/throughput information of the IoT device. The IoT management system can present a second remediation interface representing a detailed representation of a first IoT device. The detailed representation can include user interface elements representing actions to be performed relating to the first IoT device. The IoT management system can perform a first action corresponding to a selection of one of the user interface elements.Type: GrantFiled: November 19, 2018Date of Patent: August 24, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Mark Stephan Shurtleff, Jerome Henry, Bart Brinckman
-
Patent number: 11102248Abstract: A remote wipe message or notification may be sent from a server computer to one or more target client devices associated with a user. A managed container running on a target client device associated with the user and having a managed cache storing content managed by or through the server computer may, in response to the remote wipe message or notification, deleting the managed content or a portion thereof from its managed cache. The managed container may send back an acknowledgement or message to the server computer that it had completed the remote wipe. The remote wipe functionality can avoid having to deal with individual applications running on the client device and therefore can eliminate the complexity of having to deal with individual applications. Furthermore, the remote wipe can be done independently of the local operating system and without affecting non-managed information/applications on the client device.Type: GrantFiled: November 19, 2018Date of Patent: August 24, 2021Assignee: OPEN TEXT SA ULCInventors: Gregory Beckman, Robert Laird, Alain Gagne
-
Patent number: 11102007Abstract: A system and method are described that enables mobile devices (e.g. including but not limited to a mobile phone or the like), to intercept and respond to contactless card authentication requests, allowing mobile devices to be used in place of contactless cards. Enabling mobile phone devices to emulate contactless cards decreases issues related to lost or damaged cards, enabling a single device to be used to provide tokens related to multiple different contactless cards, and leverages functionality of the mobile device to provide dual-factor authentication.Type: GrantFiled: October 1, 2019Date of Patent: August 24, 2021Assignee: Capital One Services, LLCInventors: Jeffrey Rule, Kevin Osborn
-
Patent number: 11095624Abstract: Systems, methods, software and apparatus enable end-to-end encryption of group communications by implementing a pairwise encryption process between a pair of end user devices that are members of a communication group. One end user device in the pairwise encryption process shares a group key with the paired end user device by encrypting the group key using a message key established using the pairwise encryption process. The group key is shared among group members using the pairwise process. When a transmitting member of the group communicates with members, the transmitting member generates a stream key, encrypts stream data using the stream key, encrypts the stream key with the group key, then transmits the encrypted stream key and encrypted stream data to group members. The group key can be updated through the pairwise encryption process. A new stream key can be generated for each transmission of streaming data such as voice communications.Type: GrantFiled: July 23, 2019Date of Patent: August 17, 2021Assignee: Orion Labs, Inc.Inventor: Greg Albrecht
-
Patent number: 11012245Abstract: Disclosed embodiments relate to securely facilitating decentralized management of identity data. Operations may include receiving, from an identity, encrypted data and an index associated with the encrypted data; receiving, from the identity, a first request including: the index, a first part of a first cryptographic key, and a target service cryptographic key; identifying, using the index, the encrypted data; encrypting a copy of the encrypted data using the target service cryptographic key to form a doubly encrypted data; sending a challenge token to the identity; receiving a second request, from a target service, the second request including: the index and a challenge response created based on the challenge token; and sending to the target service the doubly encrypted data and the first part of the first cryptographic key; wherein the target service is operable to decrypt the doubly encrypted data.Type: GrantFiled: September 10, 2020Date of Patent: May 18, 2021Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Patent number: 10984416Abstract: Various embodiments are generally directed to NFC-based mobile currency transfers. A mobile payment may be programmatically initialized when at least two mobile devices come into NFC communications range. A payment card associated with an account used to fund the currency transfer may be tapped to one or more of the devices to allow a server to validate the currency transfer.Type: GrantFiled: March 20, 2019Date of Patent: April 20, 2021Assignee: Capital One Services, LLCInventors: Rajko Ilincic, Jeffrey Rule
-
Patent number: 10984093Abstract: The disclosure describes methods and systems for a storage device that includes one or more memory devices, where the memory devices store a second challenge question and a first response key. The system also includes an interface and a storage controller coupled to the interface and coupled to the memory devices. The storage controller generates an enable signal for enabling access to the memory devices. The system also includes a security module coupled to the storage controller and configured to send and receive challenge requests and challenge responses, where the security module includes a first challenge question and a second response key corresponding to each of the memory devices.Type: GrantFiled: April 30, 2018Date of Patent: April 20, 2021Assignee: WESTERN DIGITAL TECHNOLOGIES, INC.Inventors: Danny Berler, Judah Gamliel Hahn
-
Patent number: 10984136Abstract: A secure memory device for secure data storage and related method are provided. The device may include an accessible data storage area configured to store data, a start location register that points to a start of the accessible data storage area, and a size-related register that allows a size of the accessible data storage area to be determined. A secret area comprises a device secret that is a value unique to the device, and that is not accessible from external to the device, and is accessible under at least one predefined conditions internal to the device, an access control element configured to prevent external access to the secret data. A generator generates a derived secret based on the storage data and the secret data that is usable to authenticate the storage data. The device may also include a memory bus over which the derived secret is communicated.Type: GrantFiled: August 31, 2017Date of Patent: April 20, 2021Assignee: Micron Technology, Inc.Inventor: Lance W. Dover
-
Patent number: 10986152Abstract: Methods and systems are provided for bitrate adaptation of a video asset to be streamed to a client device for playback. The method includes selecting a representation from a manifest which expresses a set of representations available for each chunk of the video asset and generating a dynamic manifest for the video asset in which the representation selected for the at least one chunk is recommended for streaming to the client device. The selection of the representation recommended for the chunk may be based on at least one of historic viewing behavior of previous viewers of the chunk, content analysis information for the chunk, a level of available network bandwidth, a level of available network storage, and data rate utilization information of network resources including current, average, peak, and minimum data rate of network resources.Type: GrantFiled: December 29, 2016Date of Patent: April 20, 2021Assignee: ARRIS Enterprises LLCInventors: Bhavan Gandhi, Faisal Ishtiaq, Anthony J. Braskich, Andrew Aftelak
-
Patent number: 10986175Abstract: Methods, systems, and devices for wireless communication are described. A managing device may create a group security configuration for each device of a group of devices managed by the managing device. The group security configuration may include a group security parameter associated with the group of devices and a device-specific security parameter associated with each device in the group of devices. The managing device may provide the group security configuration to one or more devices of the group of devices. The one or more devices may use the group security configuration to directly establish a secure connection for communications between the one or more devices, which may include an establishment of the secure connection without further communications with the managing device during the establishment.Type: GrantFiled: June 22, 2016Date of Patent: April 20, 2021Assignee: QUALCOMM IncorporatedInventors: Soo Bum Lee, Gavin Bernard Horn
-
Patent number: 10979226Abstract: A system for authenticating a user and his local device to a secured remote service with symmetrical keys, which utilizes a PIN from the user and a unique random value from the local device in such a way that prevents the remote service from ever learning the user's PIN, or a hash of that PIN. The system also provides mutual authentication, verifying to the user and local device that the correct remote service is being used. At the same time, the system protects against PIN guessing attacks by requiring communication with the said remote service in order to verify if the correct PIN is known. Also, the system works in such a way as to change the random value stored on the user's local device after each authentication session.Type: GrantFiled: April 16, 2019Date of Patent: April 13, 2021Assignee: CybrSecurity CorporationInventors: Roger E. Billings, John A. Billings
-
Patent number: 10972445Abstract: Aspects of the disclosure relate to dynamic crypto key management for mobility in a cloud environment. A computing platform may receive a request to generate a new tenant master key and a new server recovery key. Subsequently, the computing platform may send to a cloud-based key vault server, the new tenant master key and the new server recovery key. The computing platform may send to a tenant database, the encrypted server recovery key. As a result, the computing platform may provision the enrollment servers with the encrypted server recovery key. In some embodiments, the enrollment servers are configured to manage enrollment of policy-managed devices in a policy enforcement scheme and to authenticate with the key update service based on the encrypted server recovery key.Type: GrantFiled: November 1, 2017Date of Patent: April 6, 2021Assignee: Citrix Systems, Inc.Inventors: Benjamin Elliot Tucker, Timothy Ray Gaylor
-
Patent number: 10965457Abstract: Various methods and systems are provided for autonomous orchestration of secrets renewal and distribution across scope boundaries. A cross-scope secrets management service (“SMS”) can be utilized to store, renew and distribute secrets across boundaries in a distributed computing environment such as regional boundaries. In some embodiments, locally scoped secrets management services subscribe to receive updates from the cross-scope secrets management service. As secrets are renewed, they are automatically propagated to a subscribing local scope and distributed by the local secrets management service. In various embodiments, SMS can autonomously rollover storage account keys, track delivery of updated secrets to secrets recipients, deliver secrets using a secure blob, and/or facilitate autonomous rollover using secrets staging. In some embodiments, a service is pinned to the path where the service's secrets are stored.Type: GrantFiled: March 14, 2018Date of Patent: March 30, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Brian S. Lounsberry, Ashok Chandrasekaran, Chandan R. Reddy, Chuang Wang, Kahren Tevosyan, Mark Eugene Russinovich, Srinivas S. Nidadavolu, Vyom P. Munshi
-
Patent number: 10938790Abstract: A security system and method for improving the security of a file/data transmitted from a special purpose user computer to a recipient special purpose computer. A special purpose computer having an individualized encryption software application server that runs individualized encryption software is provided, along with an amino acid database generator having an amino acid database storing natural and/or synthetic amino data. The individualized encryption software applicant server sends a request to the secure amino acid database generator producing the mathematical characteristics of the natural and synthetic amino acids. This is used to construct an amino acid base layer. The amino acid base layer is folded into two or three dimensional shapes and have values assigned to them, and a secret key is provided such that the transmission cannot be opened by a recipient unless he or she has the key and the values associated with the folded amino acids.Type: GrantFiled: April 8, 2019Date of Patent: March 2, 2021Inventor: Carlos Enrique Brathwaite
-
Patent number: 10939413Abstract: A communication method and a related apparatus are disclosed. The method is performed by an MME, including: receiving an attach request message from an eNB, where the attach request message is used to request to attach to a network, and the attach request message includes an identity of the UE; sending, to an HSS according to the attach request message, an authentication data request message including the identity of the UE; receiving an authentication data response message including an AV from the HSS, where the authentication data response message is used to indicate that the authorization on the UE succeeds; and determining, according to the authentication data response message, that the UE is allowed to perform a V2X service, and performing authentication on the UE according to the AV. The method can enable a network side to perform authentication on UE during V2V communication, thereby reducing an air-interface resource overhead.Type: GrantFiled: January 26, 2018Date of Patent: March 2, 2021Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventor: Jiangwei Ying
-
Patent number: 10931651Abstract: A data encryption device obtains at least one piece of data to be encrypted. The data encryption device calculates, for each particular piece of data of the at least one piece of data, a data-specific key corresponding to the particular piece of data, the data-specific key being calculated based on a prestored root key and a data identifier of the particular piece of data using a one-way function, where the one-way function is such that the root key is not uniquely derivable from the data-specific key using the one-way function. The data encryption device generates encrypted data corresponding to the particular piece of data by encrypting the particular piece of data using the data-specific key corresponding to the piece of data.Type: GrantFiled: February 28, 2020Date of Patent: February 23, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Huabing Du
-
Patent number: 10931454Abstract: Disclosed embodiments relate to securely facilitating decentralized management of identity data. Operations may include identifying a prompt to perform an attestation process for an identity; receiving, from the identity, a first request including: an index associated with encrypted data, a second part of a first cryptographic key, and a challenge token; generating a challenge response based on the challenge token; sending a second request to a data management hub including: the index and the challenge response; receiving a response to the second request, from the data management hub, the response including: doubly encrypted data formed by encrypting a copy of the encrypted data and a first part of the first cryptographic key; and decrypting the doubly encrypted data.Type: GrantFiled: September 10, 2020Date of Patent: February 23, 2021Assignee: CYBERARK SOFTWARE LTD.Inventor: Ofer Rivlin
-
Patent number: 10878950Abstract: Methods, systems and computer program products for data analytics. An information ecosystem comprises a plurality of participants and a plurality of data sets associated with the participants. An event initiates performance of a computation over different obfuscated data sets to determine an obfuscated computational result. An integrity value pertaining to constituent data of the different obfuscated data sets and, correspondingly, an integrity value pertaining to the computational result itself, is quantified by checking if the earlier offered data set or any constituents thereof are consistent with one or more aspects of later retrieved data. Certain variations of methods, systems and computer program products are used for verifying data accuracy in privacy-preserving computations that are performed in a health ecosystem where the data sets pertain to health information associated with the participants.Type: GrantFiled: August 9, 2019Date of Patent: December 29, 2020Inventors: Brian Jun, Jan T. Liphardt
-
Patent number: 10868666Abstract: A fully homomorphic encryption method based on modular operation, the method including: acquiring a plaintext of any numerical value data type in an encryption process and converting the plaintext to a corresponding plaintext system plaintext according to an encryption requirement; performing an encryption operation on each number in the system plaintext, and combining ciphertexts acquired by the encryption operation to obtain a corresponding ciphertext combination; performing a ciphertext operation on the ciphertext combination using a ciphertext source code, a ciphertext radix-minus-one complement, and a ciphertext complement code based on modular encryption; and using modular division to decrypt a result of the ciphertext operation to obtain a decrypted plaintext.Type: GrantFiled: August 21, 2018Date of Patent: December 15, 2020Assignees: SHENZHEN FHE TECHNOLOGIES CO., LTDInventors: Heping Hu, Yunfeng Liao
-
Patent number: 10841225Abstract: Packet forwarding includes creating a first lookup table for mapping packets to nodes based on the number of nodes in a first set of nodes. A received packet is mapped to a mapping value using a predetermined mapping function. The first lookup table is indexed using a first subset of bits comprising the mapping value. A second lookup table is created in response to adding a node to the first set of nodes. A subsequently received packet is mapped to a mapping value using the same predetermined mapping function to index the second lookup table using a second subset of bits comprising the mapping value.Type: GrantFiled: March 6, 2019Date of Patent: November 17, 2020Assignee: Arista Networks, Inc.Inventor: Peter Lam
-
Patent number: 10831912Abstract: A method and system for performing an operation on protected sensitive data. A processor of a data processing system receives, from a computing system: (i) the protected sensitive data, (ii) an identification of an operation that accesses and utilizes the protected sensitive data during performance of the operation, and (iii) a request to perform the operation, wherein the computing system is external to the data processing system. The processor de-protects the received protected sensitive data, which generates unprotected sensitive data from the protected sensitive data. The processor performs the operation, which includes accessing and utilizing the unprotected sensitive data and generating a result. After the operation is performed, the processor re-protects the unprotected sensitive data, which restores the protected sensitive data. The processor sends the result to the computing system.Type: GrantFiled: February 26, 2019Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventor: Holger Karn