Transmitting A Seed, Sequence, Or Initial Value Patents (Class 380/262)
  • Patent number: 10979875
    Abstract: A method in one embodiment includes intercepting a message in an on-board unit (OBU) of a vehicular network environment between a source and a receiver in the vehicular network environment, verifying the message is sent from the source, verifying the message is not altered, evaluating a set of source flow control policies associated with the source, and blocking the message if the set of source flow control policies indicate the message is not permitted. In specific embodiments, the message is not permitted if a level of access assigned to the source in the set of source flow control policies does not match a level of access tagged on the message. In further embodiments, the method includes evaluating a set of receiver flow control policies associated with the receiver, and blocking the message if the set of receiver flow control policies indicates the message is not permitted.
    Type: Grant
    Filed: September 11, 2018
    Date of Patent: April 13, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Lillian Lei Dai, Sateesh K. Addepalli, Xiaoqing Zhu, Preethi Natarajan, Rong Pan, Fabio R. Maino, Flavio Bonomi, Alexander Loukissas, Vina Ermagan, Pere Monclus
  • Patent number: 10979898
    Abstract: In one embodiment, a method by a stage device includes receiving from a client device a first randomized client address to be used during a pairing session; sending to the client device a first randomized stage address to be used during the pairing session; communicating with the client device using the first randomized client address and the first randomized stage address to establish at least one common randomization parameter; periodically generating, based on the at least one common randomization parameter, a second randomized client address and a second randomized stage address; and communicating with the client device in a paired communication session using the second randomized client address and the second randomized stage address.
    Type: Grant
    Filed: January 15, 2020
    Date of Patent: April 13, 2021
    Assignee: Facebook Technologies, LLC
    Inventor: Marc Ihaab Salem
  • Patent number: 10972270
    Abstract: A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In some examples, the plaintext and cryptographic key are input into an effectively one-way function, such as a cryptographic hash function, the output of which is usable as an initialization vector. Cryptographic keys may be rotated probabilistically based at least in part on probabilities of output collisions of the effectively one-way function to ensure a low probability of two different plaintexts resulting in calculation of the same initialization vector for use with the same cryptographic key.
    Type: Grant
    Filed: February 17, 2018
    Date of Patent: April 6, 2021
    Assignee: Amazon Technologies, Inc.
    Inventor: Matthew John Campagna
  • Patent number: 10951411
    Abstract: Various embodiments of the present technology may comprise methods and apparatus for a password-protected integrated circuit. According to various aspects of the present invention, the password-protected integrated circuit may comprise a cryptosystem that is encoded with a password seed and used to authenticate control data prior to being transmitted to a sensor and/or a sensor control circuit, wherein the sensor and/or sensor control circuit responds to authenticated control data.
    Type: Grant
    Filed: August 23, 2017
    Date of Patent: March 16, 2021
    Assignee: SEMICONDUCTOR COMPONENTS INDUSTRIES, LLC
    Inventor: Charles Frederic McCord
  • Patent number: 10924266
    Abstract: A communication apparatus includes a storage device to store information indicating connection records of one or a plurality of terminals, and a processor. The processor performs a process including selecting one of a plurality of methods of exchanging a cipher key for communication with a target terminal that is to be connected to the communication apparatus, according to a combination of an input and output capability of the communication apparatus and an input and output capability of the target terminal, and outputting the input and output capability of the communication apparatus that causes the combination to select a method that exchanges the cipher key with the target terminal when the information indicating the connection records of the target terminal is stored in the storage device.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: February 16, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Takeshi Ohtani, Itaru Nakagawa
  • Patent number: 10915706
    Abstract: A computer-implemented method includes: receiving, by a computing device, a text report request from a user device associated with a user; obtaining a behavior history and personal information of the user; inputting the behavior history and the personal information of the user into a model, to obtain a plurality of personalized evaluation results, each personalized evaluation result corresponding to a respective text report category of a plurality of text report categories, in which each personalized evaluation result indicates a predicted relevance of the corresponding text report category to a problem faced by the user, and in which the model includes a classification model trained using one or more supervised learning techniques on a plurality of user behavior history samples and a plurality of personal information samples; and determining an order in which the plurality of text report categories are to be presented to the user.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: February 9, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Hong Jin, Weiqiang Wang
  • Patent number: 10902144
    Abstract: In the present invention, by providing an apparatus for securing data comprising a memory for storing information for data processing, a processor configured to partition original data into a plurality of partial data and generate a plurality of divided data by randomly determining positions of each of the plurality of partial data within the original data, and a communication interface configured to transmit each of the plurality of divided data to each of a plurality of servers, respectively, if an attacker obtains a portion of the divided data, it prevents the entire original data from being restored, and the legitimate user can restore the original data accurately even if some divided data is corrupted, and provides an efficient data polymorphic dividing technique that can minimize the amount of calculation required to secure data.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: January 26, 2021
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Nam-Su Jho, Taek-Young Youn, Dae Sung Moon, Ik Kyun Kim, Seung Hun Jin
  • Patent number: 10880277
    Abstract: Systems and methods for creating fingerprints for devices are described herein. In various embodiments, the system includes a device management system operatively coupled to a merchant system. According to particular embodiments, the device management system: 1) receives a first payload correspond to a device from the merchant system, the first payload including data in a particular format; 2) creates a fingerprint for the device by parsing the first payload and creating a record of a section format for each of one or more distinct sections of the particular format; and 3) comparing a format of each subsequent payload that corresponds to the device to the fingerprint for the device to determine whether the device has been compromised.
    Type: Grant
    Filed: August 8, 2019
    Date of Patent: December 29, 2020
    Assignee: BLUEFIN PAYMENT SYSTEMS LLC
    Inventors: Timothy William Barnett, Alexander I. Kasatkin, Christopher Hozumi Miyata
  • Patent number: 10862684
    Abstract: The present disclosure relates to technologies for sensor networks, machine to machine (M2M) communication, machine type communication (MTC), and Internet of Things (IoT). The present disclosure may be utilized for intelligent services based on the above technologies (smart homes, smart buildings, smart cities, smart or connected cars, health care, digital education, retail businesses, security and safety-related services). The present invention relates to a method and apparatus that, when a user equipment notifies its identification information using an unsecured connection, enable the user equipment to notify the identification information in a secure manner using a one-time password (OTP) algorithm and proximity authentication and to receive services customized to user needs.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: December 8, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Dohy Hong, Hyeonjin Kang, Ilju Na, Kitaek Bae
  • Patent number: 10805092
    Abstract: A processing module for a first lock device of a range determination system, the range determination system comprising a lock group comprising a plurality of lock devices of which the first lock device forms part, the plurality of lock devices physically spaced over a lockable element and configured to communicate with a key group comprising a plurality of key devices, a shortest distance between any one of the key devices of the key group and any one of the lock devices of the lock group providing for access to the lockable element relative to a threshold distance.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: October 13, 2020
    Assignee: NXP B.V.
    Inventors: Jan Dutz, Wolfgang Küchler, Frank Leong, Thomas Baier, Arie Geert Cornelis Koppelaar
  • Patent number: 10747328
    Abstract: A motion recognition apparatus and a control method thereof, capable of controlling and operating a controlled device by determining a gesture variation of a user to replace conventional finger touch for a user interface. The motion recognition apparatus includes a first device, a second device and a controlled device wirelessly connected to the first device and the second device. The first device detects a gesture variation of a user. The second device calculates the number of gesture variations and outputs a corresponding control signal. The second device includes a motion recognition unit and a fast communication unit, enabling the controlled device to receive the control signal and operate according to the gesture variation of the user. Accordingly, the user interface becomes more user-friendly and makes the controlled device more controllable and the Internet of Things (IoT) more applicable.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: August 18, 2020
    Assignee: PVD PLUS CO., LTD.
    Inventors: Chih-Fan Chao, Yu-Chun Hsu, Zheng-Chang Huang
  • Patent number: 10735392
    Abstract: The disclosure relates to a method (20) for a serving device (3) of establishing a computational puzzle for use in communication between a client device (2) and the serving device (3). The method (20) comprises establishing (21), in the serving device (3), the computational puzzle (p) based on a key shared by the client device (2) and the serving device (3) and on a solution (s?, s?) to the computational puzzle (p). Further method (30) in a serving device is provided, methods (60, 70) for client devices (2), serving devices (3), client devices (2), computer programs and computer program products.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: August 4, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Göran Selander, Elena Dubrova, Fredrik Lindqvist, Mats Näslund
  • Patent number: 10733586
    Abstract: Embodiments of the present invention are drawn to systems and methods for securing information using cryptographically keyed units. Specifically, in one embodiment of the present invention, a system is provided for securing information that uses two cryptographically keyed units to encrypt information flowing between a fuel pump device and a remote device. Thus, even if the information is intercepted, it could not be used to perpetrate fraud.
    Type: Grant
    Filed: May 26, 2011
    Date of Patent: August 4, 2020
    Assignee: NCR Corporation
    Inventors: Michael C. Finley, James Fortuna, James Hervey
  • Patent number: 10708246
    Abstract: An apparatus and a corresponding method. The apparatus includes an injection module operable to maintain packet sequence numbers for a group of network devices, receive a first packet and a second packet that is sent from the apparatus after the first packet and destined for a different device in the group than the first packet, and update the packets with different packet sequence numbers. The packet sequence number for the second packet is generated using the packet sequence number for the first packet. The apparatus further includes an encryption module operable to determine an initialization vector for each packet sequence number and apply an encryption algorithm to each packet. Each packet is encrypted using a corresponding initialization vector and an encryption key as inputs to the encryption algorithm.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: July 7, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Ron Diamant, Noa Yehezkel, Ahmad Erew, Jonathan Cohen, Michael Baranchik
  • Patent number: 10700868
    Abstract: Systems and methods product security include: generating a unique activation code, product identification code, and product scan code for electronic products to be protected and assigning these security codes to their corresponding products; generating an unlock code for each product; embedding the unlock code into the electronic product, and locking the electronic product to be protected to create a locked electronic product; and affixing the unique product scan codes to their corresponding products. At the point of purchase the unique product scan code is scanned to identify the unique activation code for the purchased product. The purchaser receives the activation code assigned to the locked product and enters it. A hash string generated from the activation code is compared to the unlock code to determine whether they are a match.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: June 30, 2020
    Inventor: Chng Weng Wah
  • Patent number: 10691620
    Abstract: The present disclosure is related to encryption of executables in computational memory. Computational memory can traverse an operating system page table in the computational memory for a page marked as executable. In response to finding a page marked as executable, the computational memory can determine whether the page marked as executable has been encrypted. In response to determining that the page marked as executable is not encrypted, the computational memory can generate a key for the page marked as executable. The computational memory can encrypt the page marked as executable using the key.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: June 23, 2020
    Assignee: Micron Technology, Inc.
    Inventor: Perry V. Lea
  • Patent number: 10652743
    Abstract: Electronic systems are provided for secure actuation of a remote device such as a moveable barrier operator. The systems address the “man in the middle” problem of persons intercepting and duplicating radio frequency signals from a control device by introducing timing parameters into a bidirectional communication sequence between at least two devices.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: May 12, 2020
    Assignee: The Chamberlain Group, Inc.
    Inventor: James J. Fitzgibbon
  • Patent number: 10649917
    Abstract: Examples relate to efficient storage of initialization vectors in a system. One example facilitates determining an initialization vector for use in encrypting a first cache line of a first page of memory, wherein determining the initialization vector comprises concatenating a page-level counter with a first set of hierarchical counters. The first set of hierarchical counters includes a first counter associated with the first cache line; a first group counter associated with a first group of cache lines, the first group of cache lines comprising the first cache line; and a first cluster counter associated with a first cluster of cache line groups, the first cluster comprising the first group of cache lines.
    Type: Grant
    Filed: September 17, 2015
    Date of Patent: May 12, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: William G. Horne, Amro J. Awad, Pratyusa K. Manadhata
  • Patent number: 10637649
    Abstract: Methods for a server include defining a starting element and an element step size. A pad mapping is applied to a data Random Cipher Pad (RCP) to obtain a Key RCP using each element of the Data RCP once in a predetermined non-sequential order. The starting element and the element step size are combined with the Data RCP. The Data RCP is encrypted using the Key RCP to produce a subsequent Data RCP. The subsequent Data RCP is transmitted to another computer. Methods for clients include applying a pad mapping to a Data RCP to obtain a Key RCP using each element of the Data RCP once in a predetermined non-sequential order to develop the Key RCP. The Key RCP is encrypted using the Data RCP to produce a subsequent Key RCP. A data structure is encrypted using the Data RCP to produce an encrypted data structure.
    Type: Grant
    Filed: June 18, 2018
    Date of Patent: April 28, 2020
    Assignee: 7Tunnels, Inc.
    Inventors: Michael L. Hammon, Kevin R. McCarthy
  • Patent number: 10616184
    Abstract: A system and method of wireless display, including a transmitter processing a first encrypted content into a second encrypted content without decoding, and transferring the second encrypted content over a wireless display connection to a receiver.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: April 7, 2020
    Assignee: Intel Corporation
    Inventor: Changliang Wang
  • Patent number: 10616190
    Abstract: Space-efficient methods of defining a key allocation scheme within a broadcast encryption system are provided. In some embodiments, a descriptor is received. The descriptor includes a plurality of subset definitions and a plurality of pointers. A data segment is resolved from each of the plurality of pointers. The resulting data segments are assembled into a plurality of variant definitions. A media key block is generated from the plurality of subset definitions and the plurality of variant definitions.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: John B. Geagan
  • Patent number: 10608814
    Abstract: Equivoe-T complements its erosive cryptographic intractability with durable cryptographic equivocation. The captured ciphertext C generated through plaintext P using key K, may also be generated via a ‘fake plaintext’ P??P using a different key, K??K, presenting the cryptanalyst with a conclusive doubt as to the identity of the true plaintext. Prospectively there will be numerous plausible non-overlapping plaintext candidates, all guarding the identity of the true plaintext.
    Type: Grant
    Filed: May 17, 2015
    Date of Patent: March 31, 2020
    Inventor: Gideon Samid
  • Patent number: 10608813
    Abstract: Techniques for encrypting long-term data using layered encryption based on difficult to obtain secrets are described herein. The set of data to encrypt is designated as the source data for the first iteration. Then, for each iteration, a derived set of data is generated from a set of random data and the source data is combined with the derived set of data to produce a set of encrypted data. The set of encrypted data is then designated as the source data for the next iteration.
    Type: Grant
    Filed: January 9, 2017
    Date of Patent: March 31, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Colin Laird Lazier, Bryan James Donlan
  • Patent number: 10567165
    Abstract: A method for securely receiving a cipher key from a key provider to a key requester is provided. The method includes generating a session key shared between the key requester and the key provider, determining at least one key in accordance with the session key. The method also includes transmitting a request from the key requester to the key provider, and receiving a response from the key provider, where the response comprises an encrypted payload and an authentication tag. The method also includes authenticating the response and decrypting the encrypted payload using the at least one key to obtain the cipher key.
    Type: Grant
    Filed: September 21, 2017
    Date of Patent: February 18, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Teng Wu, Yin Tan, Lionel Lianhong Zhang
  • Patent number: 10567434
    Abstract: A secure channel is generated using a third party to the channel. A first secure channel between two computer systems is established. The first secure channel is used to relay information about a third party. The third party provides security parameters for a second secure channel to enable the two computer systems to communicate over a second secure channel.
    Type: Grant
    Filed: September 10, 2014
    Date of Patent: February 18, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Nima Sharifi Mehr
  • Patent number: 10560352
    Abstract: Techniques are described for performing subscriber aware two-way active measurement protocol (TWAMP) data session provisioning between two endpoints in a computer network. For example, the disclosed techniques include extending TWAMP control messaging to include a communication mode for negotiating subscriber-aware TWAMP data monitoring. If the communication mode is supported by both endpoints, a subscriber identifier is specified when a TWAMP data session is provisioned (negotiated) over the control session. The disclosed techniques further include extending TWAMP data messaging to include the subscriber identifier in each test packet for the data session. In this way, each of the endpoints may identify a subscriber corresponding to one or more received TWAMP test packets based on the subscriber identifier included in the received TWAMP test packets.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: February 11, 2020
    Assignee: Juniper Networks, Inc.
    Inventors: Peyush Gupta, Srivathsa Sarangapani, Sanjay Kumar Gupta
  • Patent number: 10553040
    Abstract: A system includes a processor configured to wirelessly receive a vehicle system command from a remote source over a first communication channel. The processor is also configured to open a second communication channel with an apparent command-originating source, responsive to receiving the command. The processor is further configured to request, over the second communication channel, verification that the command originated from the apparent command-originating source and execute the command responsive to command-origin verification.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: February 4, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: Oliver Lei, Allen R. Murray
  • Patent number: 10530576
    Abstract: A firmware-based technique for using one or more symmetric keys generated from one or more user credentials to decrypt user profile information and authenticate the user before allowing access to firmware-provided services is discussed. Exemplary credential types include user passwords, smart card data, fingerprint sensor data and retinal scan data. The credentials may be verified in a resource-constrained pre-operating system (OS) environment, upon control of the computing device being returned to the firmware by the OS, and/or may enable recovery scenarios executed by the firmware, such as in the case where a password is lost.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: January 7, 2020
    Assignee: Insyde Software Corp.
    Inventor: Timothy A. Lewis
  • Patent number: 10432606
    Abstract: A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: October 1, 2019
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Mats Naslund, Maurizio Iovieno, Karl Norrman
  • Patent number: 10402566
    Abstract: A High Assurance Configuration Security Processor (HACSP) for a computing device may perform real-time integrity measurements of an actual bitstream run-time performance against what is expected. The HACSP may be self-contained and have a relatively small footprint. The HACSP may be vendor-agnostic, and may be a trusted system application for the computing device. The HACSP may ensure the security of user application bitstream load and update during device configuration, and may implement security mechanisms for independent secure trusted attestation and integrity measurement mechanisms to report and provide reliable evidence about the “trustworthiness” of the system during user bitstream execution.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: September 3, 2019
    Assignee: The Aerospace Corporation
    Inventors: Thomas Kibalo, Ronald Scrofano, Andrew Deeds
  • Patent number: 10402172
    Abstract: A software and hardware infrastructure is provided that can generate traceable and verifiably random number sequences provided from multiple random number sources, including quantum entropy sources, potentially located at multiple points of origin, and distribute the verifiable number sequences across multiple channels and protocols to multiple ultimate destinations in a distributed computing environment. Random number sequences obtained from unique entropy sources can be tagged with information on the provenance and/or other details of the creation of each number sequence. Tags can be used to verify the reliability of each tagged number sequence and/or its associated source. Tags can also include a use indicator to avoid reuse of a tagged number sequence.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: September 3, 2019
    Assignee: QRYPT, INC.
    Inventors: Denis Mandich, Christopher Knapp
  • Patent number: 10382405
    Abstract: Systems and methods for creating fingerprints for encryption devices are described herein. In various embodiments, the system includes an encryption device operatively connected to a device management system. According to particular embodiments, the device management system: 1) receives a first payload from the encryption device, the first payload including data in a particular format; 2) creates a fingerprint for the encryption device, the fingerprint including a section format for each of one or more distinct sections of the particular format; 3) storing a record of the fingerprint for the encryption device and the unique identifier at the at least one database; and 4) comparing a format of each subsequent payload received from the encryption device to the fingerprint for the device to determine whether the device has been compromised.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: August 13, 2019
    Assignee: BLUEFIN PAYMENT SYSTEMS LLC
    Inventors: Timothy William Barnett, Alexander I. Kasatkin, Christopher Hozumi Miyata
  • Patent number: 10315623
    Abstract: A portable electronic key device starts up only when movement of the portable electronic key device is present on the basis of detection signal Sac of a motion detector. A communication monitoring unit monitors whether or not radio waves Swk periodically transmitted from a vehicle are received. When there is no movement of the portable electronic key device but the portable electronic key device has received or is receiving radio waves from the vehicle, an operation controller maintains the start-up state of the portable electronic key device.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: June 11, 2019
    Assignee: KABUSHIKI KAISHA TOKAI RIKA DENKI SEISAKUSHO
    Inventor: Hiroaki Iwashita
  • Patent number: 10298403
    Abstract: Authentication systems and methods for a population of devices each associated with an RFID tag are described. For each device, a secret key is combined cryptographically with a publicly-readable unique identifier (UID) of an RFID tag to obtain a unique authorization signature. The RFID tag is prepared utilizing the unique authorization signature as memory-access and/or tag-operation password(s). The systems and methods may safeguard against attacks whereby compromise of a single tag will not compromise the entire population of devices and may reduce or eliminate the use of inappropriate surgical devices during a surgical procedure.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: May 21, 2019
    Assignee: COVIDIEN LP
    Inventors: Peter F. Klammer, William G. Paterson
  • Patent number: 10291590
    Abstract: According to an embodiment, a communication system includes a plurality of communication apparatuses. Each of the communication apparatuses includes a key generator and a synchronization processor. The key generator generates shared keys shared with another communication apparatus. The synchronization processor synchronizes at least one of order of using the generated shared keys and roles played when the generated shared keys are used, with another communication apparatus based on a rule determined in advance.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: May 14, 2019
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshimichi Tanizawa, Hideaki Sato
  • Patent number: 10289505
    Abstract: A method begins with a dispersed storage network (DSN) processing module receiving content retrieval message from one or more requesters. The method continues by determining DRM policies and read operational parameters. The method continues by retrieving a set of encoded data slices from DSN memory, the set of encoded data slices including unique subsets of the set of encoded data slices with each of the unique subsets assigned to one or more of the requesters based at least in part on the determined read operational parameters. The method continues by sending the set of encoded data slices to the requesters. The requestors select their assigned subset of the received set of encoded data slices and decode to produce the content.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: May 14, 2019
    Assignee: International Business Machines Corporation
    Inventor: S. Christopher Gladwin
  • Patent number: 10285049
    Abstract: Communication devices and a method of providing secure electronic content are general described. Content is encrypted using a time-invariant encryption algorithm on the binary bits and a time-varying baseband key encryption waveform with a time-varying phase or amplitude. The content is recovered using a waveform with a reference phase mixed with a reference LO signal or combining the waveform and content using an XOR to measure a change of the phase/amplitude of the received signal relative to the LO signal. The key for the time-invariant binary bit level encryption may be communicated on a different channel than the content prior to communication of the content or concurrently with the content. The phase/amplitude of the baseband key may vary after baseband waveform encryption of a predetermined number of symbols, independent of the time, or after a predetermined time independent of an amount of baseband signal encrypted.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: May 7, 2019
    Assignee: Raytheon Company
    Inventors: Andrew Kowalevicz, Gary M. Graceffo
  • Patent number: 10230714
    Abstract: Techniques are disclosed relating to tokenized account information with integrated authentication. In some embodiments, a shared secret key is used for tokenization and authentication. In some embodiments, a payment device stores an encrypted version of the secret key and decrypts the secret key based on a user-provided password. In some embodiments, the payment device uses the secret key and a moving factor to generate a limited-use password. In some embodiments, the payment device uses the limited-use password to modify a first identifier of an account of the user. In some embodiments, the authentication system retrieves a stored version of the secret key and a copy of the account number using a second identifier. In some embodiments, the authentication system generates the limited-use password based on the stored secret key and a moving factor, de-tokenizes the modified first identifier, and compares the result with the retrieved copy of the account number.
    Type: Grant
    Filed: July 25, 2016
    Date of Patent: March 12, 2019
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi, Mohammad Faiz Usmani, Ruqiya Nikhat Kaladgi, Junaid Ahmed Jameel
  • Patent number: 10147250
    Abstract: An electronic key executes keyless entry communication or RFID communication. A wireless controller mounted on a vehicle executes keyless entry communication within a range of a radius of several meters to several tens of meters. An RFID reader is assigned to each door and executes RFID communication within a range of a radius of approximately 1 meter. In regards to unlocking the door, the wireless controller issues a password by the keyless entry communication, and a wireless circuit temporarily stores the issued password. The RFID readers search for the password stored in the electronic key by the RFID communication, and the wireless controller unlocks a door corresponding to the RFID reader for which the password was detected.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: December 4, 2018
    Assignee: MURATA MANUFACTURING CO., LTD.
    Inventors: Ikuhei Kimura, Makoto Yasutake
  • Patent number: 10146509
    Abstract: A method for assigning a random number to a user in a set of users includes computing a random number assignment seed value based on an ASCII-value representation of the user's name, dividing the random number assignment seed value by a quantity of unassigned numbers available to be assigned to the user to produce a modified random number assignment seed value, rounding the modified random number assignment seed value down to an integer, computing a random number offset value by multiplying the quantity of unassigned numbers by the rounded modified random number assignment seed value, subtracting the random number assignment offset value from the random number assignment seed value to determine a random number assignment lookup number, determining the random number to be assigned to the user based on the random number assignment lookup number, and assigning the determined random number to the user.
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: December 4, 2018
    Assignee: MBDS, INC.
    Inventors: Antonino Todaro, Paolo Pedretti
  • Patent number: 10110613
    Abstract: Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each encrypted content sample includes multiple encrypted blocks. For a given encrypted content sample, different sets of encrypted blocks in that sample may form different encryption chains. The protected version of the content may further include decryption information for decrypting the encrypted content samples. The decryption information may include at least some initialization vectors generated dependent upon non-content information that is not included in the protected version of the content. The non-content information may be from a different protected version of the content. Embodiments may be configured to use the decryption information to decrypt one or more of the encrypted content samples.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: October 23, 2018
    Assignee: Adobe Systems Incorporated
    Inventor: Viswanathan Swaminathan
  • Patent number: 10097352
    Abstract: A method and an electronic device are disclosed herein. The electronic device includes a communication unit, a storage unit and at least one processor, which executes the method, including detecting a request for establishing a call session, generating a new security key from a preset security key, renewing the preset security key by setting the generated new security key as a current preset security key, and establishing the call session based on the generated new security key.
    Type: Grant
    Filed: March 14, 2016
    Date of Patent: October 9, 2018
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Kyunghee Lee, Tymur Korkishko, Jeongho Park, Ignat Korchagin
  • Patent number: 10084786
    Abstract: A historical repository of UE identifiers associated with sets of prior mean values and prior standard deviation values, is maintained. A browser request message is received from a web browser on a suspect UE and requests access to an electronic resource. An identification challenge message is sent toward the web browser and contains a hash script configured to be processed by the web browser to hash a challenge data set and to report a measurement of elapsed hashing time. A device identification report is received from the web browser and contains a terminal signature tuple of a reported UE identifier and the elapsed hashing time. A posterior probability value indicating a likelihood that the suspect UE corresponds to a genuine UE identified by the reported UE identifier, is generated. Whether the suspect UE is permitted to access the electronic resource is controlled based on the posterior probability value.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: September 25, 2018
    Assignee: CA, INC.
    Inventors: Himanshu Ashiya, Atmaram Shetye
  • Patent number: 10050983
    Abstract: According to an embodiment, a communication system includes a transmitting apparatus and a receiving apparatus. The transmitting apparatus generates a pseudorandom number based on an algorithm, synchronously with the receiving apparatus; generates a communication frame identifier including a frame identifier indicating a type of a communication frame and the pseudorandom number to generate the communication frame; and transmits the communication frame.
    Type: Grant
    Filed: September 15, 2016
    Date of Patent: August 14, 2018
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Zhengfan Xia, Takeshi Kawabata
  • Patent number: 10020985
    Abstract: A session continuity server controller, the controller comprising: a memory; and a processor coupled to the memory storing processor executable instructions which when executed by the processor causes the processor to perform operations comprising: determining one or more defects in lawful interception content transmission associated with a user session, wherein the one or more defects comprise one or more degraded network conditions and degraded LI content; executing one or more corrective measures based on the one or more defects in lawful interception content transmission; and determining stability of the lawful interception content transmission post one or more corrective measures for effective and reliable lawful interception content transmission.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: July 10, 2018
    Assignee: Wipro Limited
    Inventors: Swaminathan Seetharaman, Venkata Subramanian Jayaraman
  • Patent number: 10003457
    Abstract: Methods for a server include defining a starting element and an element step size. A pad mapping is applied to a data Random Cipher Pad (RCP) to obtain a Key RCP using each element of the Data RCP once in a predetermined non-sequential order. The starting element and the element step size are combined with the Data RCP. The Data RCP is encrypted using the Key RCP to produce a subsequent Data RCP. The subsequent Data RCP is transmitted to another computer. Methods for clients include applying a pad mapping to a Data RCP to obtain a Key RCP using each element of the Data RCP once in a predetermined non-sequential order to develop the Key RCP. The Key RCP is encrypted using the Data RCP to produce a subsequent Key RCP. A data structure is encrypted using the Data RCP to produce an encrypted data structure.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: June 19, 2018
    Assignee: 7Tunnels, Inc.
    Inventors: Michael L. Hammon, Kevin R. McCarthy
  • Patent number: 9996479
    Abstract: The present disclosure is related to encryption of executables in computational memory. Computational memory can traverse an operating system page table in the computational memory for a page marked as executable. In response to finding a page marked as executable, the computational memory can determine whether the page marked as executable has been encrypted. In response to determining that the page marked as executable is not encrypted, the computational memory can generate a key for the page marked as executable. The computational memory can encrypt the page marked as executable using the key.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: June 12, 2018
    Assignee: Micron Technology, Inc.
    Inventor: Perry V. Lea
  • Patent number: 9960911
    Abstract: A system for securing wireless communication between a transmitter and a receiver through a physical layer control and a data channel is disclosed. The transmitter includes a pseudo random sequence generator module and an encryption module. The pseudo random sequence generator module receives a protocol input, and an additional input. The pseudo random sequence generator module initializes an initial state with the protocol input and the additional input to obtain a pseudo random sequence code. The encryption module receives a ciphering key and encrypts the pseudo random sequence code with the ciphering to obtain an encrypted secure scrambling code to secure the system through the physical layer control and the data channel.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: May 1, 2018
    Inventor: Kandasamy Shanmugam
  • Patent number: 9930190
    Abstract: A method for presenting services to a subscriber includes certain processes. The method includes collecting usage data associated with an account for the subscriber that is associated with a portable device. The method includes storing usage data in a repository. The method includes determining whether the usage data satisfies a condition. The method includes determining whether an actionable category of data exists. The method includes determining an action based on the actionable category of data and a set of rules. The method includes receiving a first message from the portable device indicating that a communication function of the portable device has terminated. The method includes sending a second message to the portable device that requests an input from the subscriber via the portable device and is based on the action. The method includes receiving a third message from the portable device that includes a response to the second message.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: March 27, 2018
    Assignee: GIESECKE+DEVRIENT MOBILE SECURITY AMERICA, INC.
    Inventor: Christoph Jahr
  • Patent number: 9900388
    Abstract: A method for transmitting data between controllers in a vehicle network includes transmitting a first data code including an identification number. A second data code is transmitted including a length value of data codes to be transmitted. Data codes are transmitted by using the length value of the data codes to be transmitted. A random number and a position information value of the data codes to be transmitted are included in last and previously transmitted data codes.
    Type: Grant
    Filed: December 2, 2014
    Date of Patent: February 20, 2018
    Assignee: HYUNDAI MOTOR COMPANY
    Inventor: Sung Joon Park