Symmetric Key Synchronization Patents (Class 380/260)
-
Patent number: 11924335Abstract: Systems, apparatuses, methods, and computer program products are disclosed for session authentication. In an exemplary embodiment, a session authentication system encodes and decodes a set of quantum bits using different quantum bases in order to generate a random number used to generate a session key or a random seed (e.g., a set of bits that is randomized due to quantum effects such as the principle of quantum uncertainty) for pseudorandom number generation used to establish a secure session. An example system includes decoding circuitry configured to receive, over a quantum line, a set of qbits generated based on a first set of quantum bases not received by the decoding circuitry, and decode, based on a second set of quantum bases, the set of qbits to generate a decoded set of bits; and session authentication circuitry configured to generate a session key based on the decoded set of bits.Type: GrantFiled: June 17, 2020Date of Patent: March 5, 2024Assignee: Wells Fargo Bank, N.A.Inventor: Masoud Vakili
-
Patent number: 11924524Abstract: Systems and methods are described for securely distributing metadata using a block chain. The system generates a block for a distributed blockchain ledger such that the block includes an encrypted metadata item of a media asset. The system, at a first time, transmits the block for storage in the distributed blockchain ledger such that a copy of the distributed blockchain ledger is stored by the first computing device and a second computing device. The system generates a smart contract that includes a decryption key for the encrypted metadata item and an identifier of the second computing device. The system transmits the smart contract for storage in the distributed blockchain ledger. The smart contract is configured to be automatically executed at the execution time that is later than the first time, to provide the second computing device with the decryption key for the encrypted metadata item.Type: GrantFiled: December 20, 2018Date of Patent: March 5, 2024Assignee: Rovi Guides, Inc.Inventor: Robert Barr Thompson
-
Patent number: 11824978Abstract: A computing device may be configured to receive a set of inputs from other computing devices. The set of inputs may include inputs derived by the computing devices utilizing cryptographic keys of the computing devices. The set of inputs may be stored in a blockchain such that the inputs are tamper resistant. A symmetric key may be generated (periodically, upon expiration of a timer, according to a protocol set, upon request, etc.) from two or more of the set of inputs. The generated symmetric key may be distributed to the computing devices. The symmetric key may be utilized to encrypt and decrypt communications between two computing devices.Type: GrantFiled: May 24, 2022Date of Patent: November 21, 2023Assignee: Visa International Service AssociationInventor: Quan Wang
-
Patent number: 11751061Abstract: Devices, systems and methods are provided to implement key generation for secure pairing between first and second devices using embedded out-of-band (OOB) key generation and without requiring the devices to have input/output (IO) capability to enter authentication information. Bluetooth Smart or Low Energy (BLE) OOB pairing option can be used for pairing medical devices with added security of OOB key generation. The OOB key generation comprises providing first and second devices with the same predefined credential and secure hashing algorithm, and making input of the hashing algorithm of the first and second devices the same. The first device transmits unique data to second device (e.g., via BLE advertising) to share and compute a similar input. The first and second devices use the credential and shared data with the hashing function to generate a key that is the same at each of first and second devices.Type: GrantFiled: November 17, 2022Date of Patent: September 5, 2023Assignee: Becton, Dickinson and CompanyInventors: Yi Su, Ping Zheng, Mojtaba Kashef
-
Patent number: 11750579Abstract: Seamless connectivity utilizing multi-domain security by storing a global key on each participant computing devices. When a participant computing device tries to connect to a network, the network sends encryption keys for that network in response to that participant computing device providing the global key and not being blacklisted. The participant computing device can then connect to the network using that network's encryption key. A meta-message container is generated for the message based on a next participant in a route from the transmitting participant to the destination participant. One or more series of one or more line items are generated for the message, with each line item being tagged tag with network information. The line items are encrypted based on the network information. The meta-message container and the encrypted series of line items are then transmitted to the next participant.Type: GrantFiled: September 1, 2022Date of Patent: September 5, 2023Assignee: QUIXOTIC HOLDINGS, LLCInventors: Ryan Scott Luther, Anthony Samuel Jacobs
-
Patent number: 11601820Abstract: Aspects of the disclosure relate to wireless communication over a shared spectrum carrier utilizing a broadcast, common control channel. The broadcast control channel may be multiplexed with a unicast control channel. Further, a scheduling entity may allocate a semi-static set of resources for the broadcast control channel, providing a shared search space on the shared spectrum carrier. The resource allocation for the shared search space may be based on one or more parameters, which may be cell-specific parameters. This shared search space may include resources distributed across the shared spectrum carrier, or a contiguous set of resources that spans only a portion of the carrier. The broadcast control channel may be configured for high reliability, and may carry time-critical control information relating to access control for the shared spectrum carrier. Other aspects, embodiments, and features are also claimed and described.Type: GrantFiled: January 25, 2018Date of Patent: March 7, 2023Assignee: QUALCOMM IncorporatedInventor: Jing Lei
-
Patent number: 11456867Abstract: A method manages cryptographic objects (COs). The method includes accessing an entropy-based random number and instructing to store this random number. The method includes generating one or more COs based on a deterministic algorithm that causes to interact with a security module (SM), such as a hardware security module (HSM), to generate a seed according to both a reference key of the SM and the random number accessed. A random number generator is seeded with the generated seed to generate the desired COs.Type: GrantFiled: October 25, 2019Date of Patent: September 27, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Martin Schmatz, Navaneeth Rameshan, Patricia M. Sagmeister
-
Patent number: 11438312Abstract: Seamless connectivity utilizing multi-domain security by storing a global key on each participant computing devices. When a participant computing device tries to connect to a network, the network sends encryption keys for that network in response to that participant computing device providing the global key and not being blacklisted. The participant computing device can then connect to the network using that network's encryption key. A meta-message container is generated for the message based on a next participant in a route from the transmitting participant to the destination participant. One or more series of one or more line items are generated for the message, with each line item being tagged tag with network information. The line items are encrypted based on the network information. The meta-message container and the encrypted series of line items are then transmitted to the next participant.Type: GrantFiled: April 24, 2020Date of Patent: September 6, 2022Assignee: QUIXOTIC HOLDINGS, LLCInventors: Ryan Scott Luther, Anthony Samuel Jacobs
-
Patent number: 11387980Abstract: A hardware cipher engine encrypts or decrypts a block of input data from a sequence of blocks using a cipher operation where the block of output data depends on the input block's position in the sequence. In a random-access mode of operation, the engine receives a sequence position, receives a block of input data having that position, and outputs a block of output data without outputting data that encrypts, or that decrypts, every block of input data preceding the received position. In some embodiments, the operation is a stream cipher, and the engine generates a sequence of keystream blocks and performs a combining operation between the input block and a keystream block having a corresponding sequence position. In other embodiments, the cipher operation is a block cipher, and the engine generates, but doesn't output, blocks of data that encrypt, or decrypt, one or more blocks preceding the received input block.Type: GrantFiled: December 13, 2018Date of Patent: July 12, 2022Assignee: Nordic Semiconductor ASAInventors: Veli-Pekka Junttila, Harri Matomäki, James Nevala, Matti Tiikkainen, Markku Vähätaini, Marko Winblad
-
Patent number: 11362845Abstract: A client device is fabricated using a semiconductor fabrication process. One or more uncontrollable random physical processes in the semiconductor fabrication process can cause small differences between the client device and other client devices. When the client device is presented with a challenge from a server device, the client device generates a random response that depends on its physical properties. The server device stores this random response as a part of a virtual PUF circuitry storage device having other random responses from the other client devices. The server device uses the random response of the client device stored in the virtual PUF circuitry storage device for one or more encryption algorithms to encrypt information to be provided to the client device.Type: GrantFiled: February 24, 2017Date of Patent: June 14, 2022Inventor: Shih-Lien Linus Lu
-
Patent number: 11329965Abstract: A method for dynamic encryption and signing includes: obtaining, by a terminal during session connection, a predetermined first key index and a randomly-generated first signature index; signing session request data with a first signature corresponding to the first signature index; encrypting the session request data with a first key corresponding to the first key index; sending the encrypted session request data and the first signature index to the server; and receiving, from the server, session response data signed with a second signature corresponding to a second signature index and encrypted with a second key corresponding to a second key index, after decryption and signature verification by the server over the session request data succeed. The second signature index and the second key index are randomly selected by the server and saved in a login session object accessible by both the server and the terminal.Type: GrantFiled: June 25, 2020Date of Patent: May 10, 2022Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Yixin Guo, Hang Yu, Chun Wang, Xianhua Du
-
Patent number: 11239997Abstract: Various embodiments are generally directed to techniques for converting between different cipher systems, such as, for instance, between a cipher system used for a first encryption environment and a different cipher system used for a second encryption environment, for instance. Some embodiments are particularly directed to an encryption engine that supports memory operations between two or more encryption environments. Each encryption environment can use different cipher systems while the encryption engine can translate ciphertext between the different cipher systems. In various embodiments, for instance, the first encryption environment may include a main memory that uses a position dependent cipher system and the second encrypted environment may include a secondary memory that uses a position independent cipher system.Type: GrantFiled: May 30, 2019Date of Patent: February 1, 2022Assignee: INTEL CORPORATIONInventors: Siddhartha Chhabra, David M. Durham
-
Patent number: 11237875Abstract: Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.Type: GrantFiled: September 16, 2019Date of Patent: February 1, 2022Assignee: LOOKOUT, INC.Inventors: Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
-
Patent number: 11190343Abstract: An electronic device including a key generator is disclosed. The key generator acquires a first affine map, a second affine map, and a third map, and generates a public key using the first affine map, the second affine map, and the third map, the third map is a system of multivariate quadratic polynomials having n variables and m equations, at least one of the multivariate quadratic polynomials has oil-oil quadratic terms with non-zero coefficients, and the third map includes at least one set for defining vinegar variables used in an Oil and Vinegar method and index sets for defining oil variables used in the Oil and Vinegar method, and each of the first affine map, the second affine map, and the third map is a finite field.Type: GrantFiled: November 26, 2018Date of Patent: November 30, 2021Assignee: INSTITUTE FOR BASIC SCIENCEInventor: Kyung Ah Shim
-
Patent number: 11101998Abstract: A communication device according to the present invention includes: a memory; and at least one processor coupled to the memory. The processor performs operations. The operations includes: according to synchronization accuracy representing a frequency of timings at which a cryptosystem used for encryption communication between the communication device and another communication device can be changed, selecting the cryptosystem with different processing load on cryptographic processing in the encryption communication; and executing at least one of encryption processing and decryption processing on communication data with the another communication device by using the cryptosystem selected.Type: GrantFiled: October 2, 2017Date of Patent: August 24, 2021Assignee: NEC CORPORATIONInventor: Masakazu Ono
-
Patent number: 11082406Abstract: A system and method for encrypting metadata in a communication system, including defining paths from a source node to a destination node through intermediate nodes and anchor nodes; dividing messages and sending a portion in each path by: dividing the path into sub-paths, where each two contiguous sub-paths are connected by an anchor node; calculating a secret value including a list of nodes of a first sub-path and an encrypted form of a remaining portion of the path; calculating a first random point on a linear line connecting a first metadata share of a symmetric key of the source node and a first intermediate node, and a metadata share including a second x-value of the symmetric key of the source node and the first intermediate node in the path and the secret value; and sending the portion together with the first random point to the first intermediate node.Type: GrantFiled: November 29, 2018Date of Patent: August 3, 2021Assignee: SECRET DOUBLE OCTOPUS LTDInventor: Shimrit Tzur-David
-
Patent number: 11057772Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to compile, from information comprised in a message received in the apparatus, a protection bit sequence, the protection bit sequence comprising a first part and a second part, identify a sender of the message based on identifying a secret key that decrypts the first part into a plaintext bit sequence comprised in the message, and verify the protection bit sequence has been advanced with respect to a protection bit sequence in a previous message from the same sender.Type: GrantFiled: October 16, 2015Date of Patent: July 6, 2021Assignee: Nokia Technologies OyInventor: Olli Oskari Koskimies
-
Patent number: 11057208Abstract: A management system includes a first management device (110) and a second management device (120). The first management device (110) includes a first updater (111) that updates first secret information that is managed in association with a first identifier; a first extractor (112) that extracts a first old fragment and a first new fragment, the first old fragment being included in the first secret information prior to an update but not included in the first secret information subsequent to the update, the first new fragment being not included in the first secret information prior to the update but included in the first secret information subsequent to the update; and a first sender (113) that sends a first notice that specifies the first identifier, the first old fragment, and the first new fragment to the second management device (120).Type: GrantFiled: August 22, 2016Date of Patent: July 6, 2021Assignee: Rakuten, Inc.Inventor: Yuki Fukuda
-
Patent number: 11038852Abstract: One embodiment provides a system for establishing a secure network. During operation, a server can distribute at least one symmetric encryption key among a plurality of hosts to enable the hosts to communicate securely with each other. Each host comprises at least a smart network interface card and a central processing unit (CPU) of each host computer supports remote attestation. Distributing the symmetric encryption key among the hosts can include performing a remote attestation operation to establish a trusted channel between the server and a protected region within the CPU of a respective host; and transmitting, over the trusted channel, the symmetric encryption key to the CPU of the respective host, which in turn forwards the symmetric encryption key to the smart network interface card of the respective host over a secure channel established between the protected region within the CPU and the smart network interface card.Type: GrantFiled: February 8, 2019Date of Patent: June 15, 2021Assignee: Alibaba Group Holding LimitedInventors: Xiaoning Li, Li Shen, Yanhui Zhao
-
Patent number: 11019016Abstract: Techniques are described herein for transmitting subgroup messages and displaying such subgroup messages within a group-based message interface. The subgroup message includes both a message intended for the subgroup and a subgroup command indicating that the message is sent to a subgroup of a group participating in a group-based message interface. The subgroup members are then determined from the subgroup command and the subgroup message is displayed to the subgroup members.Type: GrantFiled: October 27, 2018Date of Patent: May 25, 2021Assignee: International Business Machines CorporationInventors: Yuan Jin, Xiao Cao Cao, Yin Qian, Xin Chen Zhao
-
Patent number: 10944555Abstract: A system and method for securely verifying a connection between a remote device and an audio device. The method includes establishing a wireless connection between the remote device and the audio device. The remote device has an application configured to control operation of the audio device. An identity resolving key (IRK) for the application is obtained with the remote device. The IRK is transmitted to the audio device via the wireless connection. An instruction to is transmitted the audio device to generate a random resolvable address for the application using the IRK and to broadcast data containing the random resolvable address. The data containing the random resolvable address is received by the application of the remote device. An active audio connection between the remote device and the audio device is identified if the random resolvable address is able to be resolved by the application using the IRK.Type: GrantFiled: May 17, 2018Date of Patent: March 9, 2021Assignee: Bose CorporationInventors: Douglas Warren Young, Prasanna Rao, Jim Lambert, Niall Tone Kavanagh, Matthew Jannace
-
Patent number: 10931468Abstract: Provided is an analysis system configured to obtain an encryption key for encryption communication between an information communication apparatus and a communication network, from memory space provided in the information communication apparatus.Type: GrantFiled: September 17, 2015Date of Patent: February 23, 2021Assignee: NEC CORPORATIONInventors: Masato Yamane, Yuki Ashino, Masafumi Watanabe
-
Patent number: 10755241Abstract: A system and method for transaction bitcoin is described. Bitcoin can be sent to an email address. No miner's fee is paid by a host computer system. Hot wallet functionality is provided that transfers values of some Bitcoin addresses to a vault for purposes of security. A private key of a Bitcoin address of the vault is split and distributed to keep the vault secure. Instant exchange allows for merchants and customers to lock in a local currency price. A vault has multiple email addresses to authorize a transfer of bitcoin out of the vault. User can opt to have private keys stored in locations that are under their control. A tip button rewards content creators for their efforts. A bitcoin exchange allows for users to set prices that they are willing to sell or buy bitcoin and execute such trades.Type: GrantFiled: March 17, 2015Date of Patent: August 25, 2020Assignee: Coinbase, Inc.Inventors: Julian Langschaedel, Brian D. Armstrong, Fred E. Ehrsam
-
Patent number: 10742620Abstract: A method for dynamic encryption and signing, a terminal and a server are provided. The method includes that: at least one key and at least one signature are generated through native data; a first predetermined key index and a first random signature index are selected during session connection; a first key and a first signature are located from the at least one key and the at least one signature according to the first key index and the first signature index; session request data is signed with the first signature, and the session request data is encrypted with the first key and sent to a server; and session response data signed with a second random signature and encrypted with a second random key is received from the server after decryption and signature verification by the server over the session request data succeed.Type: GrantFiled: August 31, 2017Date of Patent: August 11, 2020Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Yixin Guo, Hang Yu, Chun Wang, Xianhua Du
-
Patent number: 10691496Abstract: A device may receive a set of heartbeat messages. The set of heartbeat messages may be related to determining a respective priority of a set of computing nodes for processing a set of jobs. The device may identify a heartbeat message, of the set of heartbeat messages, associated with a lowest offset relative to offsets associated with other heartbeat messages of the set of heartbeat messages. The device may determine the respective priority of the set of computing nodes based on one or more factors related to the set of computing nodes or the set of heartbeat messages. The device may determine whether to perform a subset of the set of jobs based on the respective priority of the set of computing nodes. The device may perform a set of actions after determining whether to perform the subset of the set of jobs.Type: GrantFiled: April 22, 2019Date of Patent: June 23, 2020Assignee: Capital One Services, LLCInventors: Gopi Kancharla, Krishna Mellacheruvu, Kush Patel
-
Patent number: 10693634Abstract: The disclosure provides a key generation method and apparatus. The key generation method comprises: encrypting a first key factor generated by a first device with an initial key, and sending the encrypted first key factor to a second device through a first secure channel, wherein the initial key is a key preset for the first device and the second device; receiving, through the first secure channel, a second key factor encrypted with the initial key, wherein the second key factor is generated by the second device; decrypting the second key factor encrypted with the initial key and received through the first secure channel, so as to obtain the second key factor; and generating a shared key between the first device and the second device according to the first key factor and the second key factor.Type: GrantFiled: August 16, 2016Date of Patent: June 23, 2020Assignee: ALIBABA GROUP HOLDING LIMITEDInventors: Qing An, Yingfang Fu
-
Patent number: 10681539Abstract: A multi-band channel encrypting switch control device is provided. The device comprises a transmission part and a receiving part. The transmission part comprises: a first controller to store a secret key and to send a digital signal; an encrypting unit to encrypt the digital signal; a multi-band transmitter to select a plurality of wavebands to transmit the encrypted signal on the plurality of wavebands under control of the secret key; and a switch. The receiving part comprises: a multi-band detector to receive the encrypted signal transmitted on the plurality of wavebands; a decrypting unit to decrypt the encrypted signal; and a second controller to store the secret key and to decide whether or not to issue a switch signal by processing the signal and making decisions using the process result. A transmission device, a receiving device, and a control method are also provided.Type: GrantFiled: December 21, 2016Date of Patent: June 9, 2020Assignee: INSTITUTE OF SEMICONDUCTORS, CHINESE ACADEMY OF SCIENCESInventors: Ninghua Zhu, Wei Chen, Jianguo Liu
-
Patent number: 10671738Abstract: Systems and methods are disclosed herein for publishing sensitive content at a future time, where prior to the future time, receiving an encrypted version of the sensitive content is received and a sequence of proof rules are applied to random portions of the encrypted version of the sensitive content. Upon successful application of the sequence of proof rules, the encrypted version of the sensitive content is prepared for publication and optionally published in encrypted form. At the future time, an encryption key is received for the encrypted version of the sensitive content and the encrypted version of the sensitive content is decrypted with the encryption key to produce the sensitive content.Type: GrantFiled: December 18, 2018Date of Patent: June 2, 2020Assignee: Adobe, Inc.Inventors: Antonio Sanso, Philipp Suter
-
Patent number: 10652014Abstract: A method (300) and system (1) of determining a common secret for two nodes (3, 7). Each node (3, 7) has a respective asymmetric cryptography pair, each pair including a master private key and a master public key. Respective second private and public keys may be determined based on the master private key, master public key and a deterministic key. A common secret may be determined at each of the nodes based on the second private and public keys. In one example, a node (3, 7) may determine the common secret based on (i) a second private key based on the node's own master private key and the deterministic key; and (ii) a second public key based on the other node's master public key and the deterministic key. The invention may be suited for use with, but not limited to, digital wallets, blockchain (e.g. Bitcoin) technologies and personal device security.Type: GrantFiled: February 16, 2017Date of Patent: May 12, 2020Assignee: nChain Holdings LimitedInventors: Craig Steven Wright, Stephane Savanah
-
Patent number: 10652240Abstract: A system and method for determining a compromise risk associated with a unique device identifier. In a method conducted at a server an interaction data element is received from a mobile handset, the handset having provided a unique device identifier usable by the server in identifying the handset. The received interaction data element is validated against a record associated with the device identifier including identifying the received interaction data element in a list including a subset of previously used interaction data elements. If the received interaction data element is valid a newly generated interaction data element is obtained. The list of previously used interaction data elements is updated with the newly generated interaction data element. The newly generated interaction data element is transmitted to the handset for presentation to the server. If the received interaction data element is not valid, the device identifier is associated with a potential security threat.Type: GrantFiled: March 21, 2017Date of Patent: May 12, 2020Assignee: Entersekt International LimitedInventor: Christiaan Johannes Petrus Brand
-
Patent number: 10623448Abstract: An audio data transfer device includes a processor configured to generate primary transfer paths for transmitting audio data between the audio data transfer device and a plurality of terminals, respectively. The processor is configured to transfer, upon receiving audio data from one terminal of the plurality of terminals, the received audio data to the plurality of terminals other than the one terminal through the primary transfer paths. The processor is configured to receive first key information for identifying a second terminal of the plurality of terminals from a first terminal of the plurality of terminals. The second terminal is different from the first terminal. The processor is configured to suppress transfer of first audio data to the first terminal upon receiving the first audio data from a third terminal of the plurality of terminals. The third terminal is different from the first terminal and the second terminal.Type: GrantFiled: October 10, 2017Date of Patent: April 14, 2020Assignee: FUJITSU LIMITEDInventors: Susumu Koga, Keisuke Saito
-
Patent number: 10616215Abstract: A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more specifically to limit the amount of information available to a potential defrauder, electronic components such as circuits, I/O, cryptographic, memory and dummy objects are built, modified or influenced on demand from physical characteristics of an eligible person or device. Digitized unique biometric or hardware identifiers are read upon start-up and runtime of the device and, in case of an eligible person or device, subsequently supply all values necessary for determination of the characteristics of the user specific virtual smart cards objects, their placement and connections. By multi-factor authentication, the end-user or device will retain sole control of its keys and use them for authentication, signature or encryption purposes as if he had a physical smart card in his hand.Type: GrantFiled: December 4, 2018Date of Patent: April 7, 2020Assignee: Open Invention Network LLCInventor: Martin Wieland
-
Patent number: 10523428Abstract: A method and apparatus provides cryptographic keys using, for example, a cryptographic co-processor (CCP) that uses spare processor cycles to work on cryptographic key generation in advance of the keys being needed by a requestor such as an application, or other process in the device. In one example, the cryptographic co-processor detects an idle condition of the CCP such as an idle condition of a cryptographic engine in the CCP. Control logic causes the CCP to generate at least one asymmetric key component corresponding to an asymmetric cryptographic key in response to detecting the idle condition. The method and apparatus stores the asymmetric key component(s) in persistent memory and generates the asymmetric cryptographic key using the stored asymmetric key component that was generated in response to detection of the idle condition of the CCP.Type: GrantFiled: November 22, 2017Date of Patent: December 31, 2019Assignee: Advanced Micro Devices, Inc.Inventors: Gongyuan Zhuang, Thomas R. Woller
-
Patent number: 10455476Abstract: In accordance with an embodiment, a network device includes a network controller and at least one network interface coupled to the network controller that includes at least one media access control (MAC) device configured to be coupled to at least one physical layer interface (PHY). The network controller may be configured to determine a network path comprising the at least one network interface that has a lowest power consumption and minimum security attributes of available media types coupled to the at least one PHY.Type: GrantFiled: October 4, 2017Date of Patent: October 22, 2019Assignee: STMICROELECTRONICS, INC.Inventors: Oleg Logvinov, Aidan Cully, James D. Allen
-
Patent number: 10419409Abstract: Methods and apparatuses are disclosed for secure network communications. An exemplary method may include sending a handshake request message to a server. The handshake request message contains a first random number encrypted by using a first public key and first service request data encrypted by using the first public key. The method may also include receiving a handshake response message replied from the server. The handshake response message contains the first service response data encrypted by using the first random number and a second random number encrypted by using the first random number. The method may further include decrypting the handshake response message by using the first random number to obtain the first service response data and the second random number. In addition, the method may include calculating a session key used in a session with the server in accordance with the first random number and the second random number.Type: GrantFiled: April 27, 2017Date of Patent: September 17, 2019Assignee: ALIBABA GROUP HOLDING LIMITEDInventor: Xiaojiang Chen
-
Patent number: 10397198Abstract: An information communication system has a plug-in stored in a transmitting terminal and a second program stored in a cloud server. The cloud server is configured to communicate with the transmitting terminal and a receiving terminal through the Internet W in a confidential state. The plug-in generates an encryption password 8 for encrypting an attachment file and transmits the encryption password to the cloud server. The second program determines whether or not a receiver e-mail address is registered, generates a first URL information, and transmits the first URL information to the transmitting terminal. The plug-in generates an e-mail including the encrypted attachment file and the first URL information, and the second program returns the encryption password to the receiving terminal when an access to the first URL from the receiver is authenticated.Type: GrantFiled: June 14, 2018Date of Patent: August 27, 2019Assignee: PRIME BRAINS, INC.Inventor: Motohide Gotanda
-
Patent number: 10326740Abstract: An encryption module encrypts starting data using a random key to produce encrypted data. A hash module performs a secure hash function on the encrypted data using a secret key to produce a hash value. Processing circuitry masks the random key using the hash value to produce a masked random key, and combines the encrypted data and the masked random key to produce a secure package. A distributed storage and task module encodes the secure package to produce a set of encoded data slices. The secret key and a decode threshold number of the encoded data slices included in the set of encoded data slices are sufficient to recover the secure package and the starting data. The set of encoded data slices is stored in a set of storage units.Type: GrantFiled: January 19, 2017Date of Patent: June 18, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason K. Resch, Mark D. Seaborn, Ilya Volvovski
-
Patent number: 10310906Abstract: A device may receive a set of heartbeat messages. The set of heartbeat messages may be related to determining a respective priority of a set of computing nodes for processing a set of jobs. The device may identify a heartbeat message, of the set of heartbeat messages, associated with a lowest offset relative to offsets associated with other heartbeat messages of the set of heartbeat messages. The device may determine the respective priority of the set of computing nodes based on one or more factors related to the set of computing nodes or the set of heartbeat messages. The device may determine whether to perform a subset of the set of jobs based on the respective priority of the set of computing nodes. The device may perform a set of actions after determining whether to perform the subset of the set of jobs.Type: GrantFiled: April 6, 2018Date of Patent: June 4, 2019Assignee: Capital One Services, LLCInventors: Gopi Kancharla, Krishna Mellacheruvu, Kush Patel
-
Patent number: 10289827Abstract: The present invention provides an information display device which may simply display a defined information to improve the convenience. The information display device is able to read the member card having the member identification code, and access the member management server storing the plurality of information associated with the user, and display the plurality of information associated with the user. In the member management server, the plurality of information associated with the user is distinguished to be information not requiring to be authenticated and information requiring to be authenticated respectively and then is stored. The information display device acquires the information not requiring to be authenticated from the member management server according to the member identification code under the condition of reading the member card, and directly display the acquired information not requiring to be authenticated without being authenticated by the user.Type: GrantFiled: March 28, 2017Date of Patent: May 14, 2019Assignee: Universal Entertainment CorporationInventor: Shigehiko Kitagawa
-
Patent number: 10255442Abstract: Systems and methods are disclosed herein for publishing sensitive content at a future time, where prior to the future time, receiving an encrypted version of the sensitive content is received and a sequence of proof rules are applied to random portions of the encrypted version of the sensitive content. Upon successful application of the sequence of proof rules, the encrypted version of the sensitive content is prepared for publication and optionally published in encrypted form. At the future time, an encryption key is received for the encrypted version of the sensitive content and the encrypted version of the sensitive content is decrypted with the encryption key to produce the sensitive content.Type: GrantFiled: November 15, 2016Date of Patent: April 9, 2019Assignee: Adobe Inc.Inventors: Antonio Sanso, Philipp Suter
-
Patent number: 10250522Abstract: A system for performing distributed computing. The system comprises a plurality of compute node resources for performing computations for the distributed computing, a management resource for managing each of the compute node resources in the plurality, and a virtual cloud network. The management resource and the plurality of compute node resources are interconnected via the virtual cloud network.Type: GrantFiled: September 20, 2017Date of Patent: April 2, 2019Inventor: Neil Anderson
-
Patent number: 10171229Abstract: The present invention is related with a computer-implemented method for generating a pseudo-random bit generator including the steps: a. Defining a multi-modal map by the equation: ƒ?=?(dr+1?x)(x?dr), x??r; b. Set the value of k?+, and obtaining the values of ?j, for j=from at least 1, to the final value k by the following equations: ?1=4k; ?j=(j)(?1); for 2?j?k; and taking the values of ?j and split the space into 2j regions ?1j, to ?2jj which are determined by values ?1j to k(2j)?1j.Type: GrantFiled: June 23, 2016Date of Patent: January 1, 2019Assignee: Instituto Potosino de Investigacion Cientifica y Tecnologica ACInventors: Eric Campos Canton, Moises Garcia Martinez
-
Patent number: 10050964Abstract: According to a first aspect of the present disclosure, a method is conceived for securing data communicated in a network, the method comprising: receiving, by a destination node in the network, at least one message transmitted by a source node in the network; generating, by said destination node, a session key by executing a one-way function that takes at least a part of a last received message and an initial key as input parameters; using, by said destination node, the session key for encrypting or decrypting said data. Furthermore, according to a second aspect of the present disclosure, a corresponding computer program product is conceived. Furthermore, according to a third aspect of the present disclosure, a corresponding system is conceived.Type: GrantFiled: April 8, 2016Date of Patent: August 14, 2018Assignee: NXP B.V.Inventors: Ghiath Al-Kadi, Jurgen Geerlings, Piotr Polak, Jan-Willem Vogel
-
Patent number: 10038560Abstract: An electronic device is proposed, which is configured to receive at least one cryptographic parameter and validate the at least one cryptographic parameter. The electronic device is is configured to validating the parameter by determining an imprint from a one-way function and from at least the cryptographic parameter; detecting at least one part of the imprint in a dedicated memory zone of the electronic device, and delivering a piece of information on validation should there be effective detection.Type: GrantFiled: April 30, 2014Date of Patent: July 31, 2018Assignee: IDEMIA FRANCEInventors: Emmanuelle Dottax, Franck Rondepierre
-
Patent number: 10027479Abstract: According to an embodiment, a generating device includes a first key generator, a second key generator, and an output unit. The first key generator is configured to generate a first key according to a first key rule in which the first key is generated from a random number, the first key being a bit sequence. The second key generator is configured to generate a plurality of second keys according to a second key rule in which the second keys are generated from the first key, the second keys being bit sequences partly correlated to one another. The output unit is configured to output the first key and at least one of the second keys.Type: GrantFiled: January 24, 2014Date of Patent: July 17, 2018Assignee: Kabushiki Kaisha ToshibaInventors: Tsukasa Endo, Yuichi Komano, Kazuo Ohta, Mitsugu Iwamoto
-
Patent number: 10013363Abstract: A system may encrypt the contents of a memory using an encryption key that is generated based on an entropy-based key derivation function. The system may generate a random value as a key split associated with an instance of writing data to memory. The system may generate an encryption key for encrypting the data using an entropy-based key derivation function based at least in part on the key split. The system may encrypt the data using the encryption key. The system may store the encrypted data and the key split to the memory.Type: GrantFiled: February 9, 2015Date of Patent: July 3, 2018Assignee: Honeywell International Inc.Inventors: James L. Tucker, Thomas Cordella, John D. Profumo
-
Patent number: 9904789Abstract: A hardware module has a plug to interface with an audio channel of a speech communication device. A scrambler connected to the plug is configured to receive a local audio input signal and form an encrypted audio output signal in a human audible range that is applied to the audio channel of the speech communication device. The scrambler also receives a remote encrypted audio input signal in a human audible range and forms a remote audio output signal corresponding to the remote encrypted audio input signal.Type: GrantFiled: March 14, 2016Date of Patent: February 27, 2018Assignee: Stealth Software Technologies, Inc.Inventors: Brett Falk, Quinn Grier, Steve Naichia Lu, Rafail Ostrovsky, William E. Skeith, III
-
Patent number: 9852376Abstract: A method and apparatus for certification of facts introduces a certifier and a fact certificate into the fact-exchange cycle that enables parties to exchange trustworthy facts. Certification is provided to a fact presenter during the first part of the fact-exchange cycle, and verification is provided to the fact receiver during the last part of the cycle. To request a certification, a fact presenter presents the Certifier with a fact. In return, the certifier issues a fact certificate, after which the fact presenter presents the fact certificate to the fact receiver instead of presenting the fact itself. The receiver inspects the received certificate in order to evaluate the fact's validity and trustworthiness. For some facts and notions of verification, the certificate is sufficient and its inspection does not require any communication. For others, the receiver requests a verification service from the Certifier in order to complete the verification.Type: GrantFiled: June 22, 2015Date of Patent: December 26, 2017Assignee: Factify, a Delaware CorporationInventors: David Leigh Donoho, Matan Gavish
-
Patent number: 9846187Abstract: An electronic circuit with protection against eavesdropping, including a first circuit element embedded in the electronic circuit, a second circuit element embedded in the electronic circuit, one or more connection lines between the first circuit element and the second circuit element, a first monitoring unit in the first circuit element for measuring capacitance of at least one of the connection lines between the first circuit element and the second circuit element, wherein the first monitoring unit is configured to identify changes in capacitance of the connection lines and to initiate actions to prevent eavesdropping in response to identifying changes.Type: GrantFiled: May 11, 2015Date of Patent: December 19, 2017Assignee: WINBOND ELECTRONICS CORPORATIONInventor: Valery Teper
-
Patent number: 9819484Abstract: A method for execution by a computing device of a dispersed storage network (DSN). The method begins by encrypting a data segment of a data object using a security key to produce an encrypted data segment. The method continues by dispersed storage error encoding the encrypted data segment to produce a set of encoded data slices and sending the set of encoded data slices to storage units of the DSN for storage. The method continues by encrypting the security key using an encryption key to produce an encrypted security key and dispersed storage error encoding the encrypted security key to produce a set of encoded key slices, wherein a decode threshold number of encoded key slices is needed to recover the encrypted security key. The method continues by sending the set of encoded key slices to a set of storage units of the DSN for storage therein.Type: GrantFiled: August 5, 2016Date of Patent: November 14, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Jason K. Resch