Key Distribution Center Patents (Class 380/279)
-
Patent number: 11386230Abstract: Systems and methods are described for modifying input and output (I/O) to an object storage service by implementing one or more owner-specified functions to I/O requests. A function can implement a data manipulation, such as filtering out sensitive data before reading or writing the data. The functions can be applied prior to implementing a request method (e.g., GET or PUT) specified within the I/O request, such that the data to which the method is applied my not match the object specified within the request. For example, a user may request to obtain (e.g., GET) a data set. The data set may be passed to a function that filters sensitive data to the data set, and the GET request method may then be applied to the output of the function. In this manner, owners of objects on an object storage service are provided with greater control of objects stored or retrieved from the service.Type: GrantFiled: September 27, 2019Date of Patent: July 12, 2022Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Ramyanshu Datta, Timothy Lawrence Harris, Kevin C. Miller
-
Patent number: 11366904Abstract: A machine-implemented method for controlling a configuration data item in a storage-equipped device having at least two security domains, comprising receiving, by one of the security domains, a configuration data item; storing the configuration data item; providing a security indication for the configuration data item; and when an event indicates untrustworthiness of the data item, invalidating a configuration effect of the stored configuration data item. Further provided is a machine-implemented method for controlling a storage-equipped device as a node in a network of devices, comprising receiving information that a data source or type of a configuration data item is untrusted; analysing metadata for the data source and the configuration data item; populating a knowledge base with analysed metadata; and responsive to the analysed metadata, transmitting security information to the network of devices. A corresponding device and computer program product are also described.Type: GrantFiled: August 1, 2016Date of Patent: June 21, 2022Assignee: ARM IP LIMITEDInventors: Geraint Luff, Thomas Grocutt, Milosch Meriac, Jonathan Austin
-
Patent number: 11368315Abstract: A processor of a device may provision a component of the device with a digital signature algorithm and an authentication key algorithm and/or server-provisioned private and/or public keys. The processor may generate one or more private keys and public keys and/or store them in a secure memory of the device. The processor may transmit the generated public keys to an owner server and receive a pedigree document in response, which may be signed with the private key. The owner server may determine a change in an ownership of the device and append the pedigree document in an immutable fashion in response to the determining to reflect the change in the ownership and/or sign the appended pedigree document with a private key. A chain of ownership of the device is verifiable using only information contained within the appended pedigree document and rooted in the processor itself.Type: GrantFiled: July 16, 2020Date of Patent: June 21, 2022Assignee: VERIDIFY SECURITY INC.Inventors: Derek A. Atkins, Brian A. Marks, Louis M. Parks, Richard D. Smith
-
Patent number: 11366766Abstract: Disclosed are an electronic device and a control method thereof. The electronic device according to the present disclosure includes a memory, a cache memory, a CPU, and includes a processor which controls the electronic device by using a program stored in the memory, wherein the CPU monitors an input address through which an input value is accessed in the cache memory, and changes the input address when the input address through which the input value is accessed in the cache memory is changed to a preset pattern.Type: GrantFiled: September 12, 2018Date of Patent: June 21, 2022Assignee: Samsung Electronics Co., Ltd.Inventors: Dong-uk Kim, Jin-bum Park
-
Patent number: 11362818Abstract: A method for issuing a quantum key chip, a method for applying a quantum key chip, an issuing platform and a system. The method comprises: feeding, by a a quantum key issuing platform, a quantum key into a quantum key chip and binding an ID of the quantum key chip in a one-to-one correspondence to an ID of a user using the quantum key chip, where the ID of the quantum key chip and/or the ID of the user serve as identification information of the quantum key in the quantum key chip, and the quantum key is obtained by pre-negotiation between the quantum key issuing platform and a key distribution center (KDC); and sending, by the quantum key issuing platform, the identification information of the quantum key to the KDC, so that the KDC binds the identification information to the quantum key corresponding to the identification information.Type: GrantFiled: November 22, 2017Date of Patent: June 14, 2022Assignee: QUANTUMCTEK (GUANGDONG) CO., LTD.Inventors: Qing Chen, Xiang Xiao, Jiayi Lin, Songyan Ding, Jierong Chen
-
Patent number: 11363461Abstract: A security key management method performed in a PDCP layer of a terminal dual-connected to a first cell and a second cell may comprise receiving a PDCP PDU on which ciphering or integrity protection to which a first security key of the first cell or a second security key of the second cell is applied is performed; performing at least one of integrity verification and header decompression for the PDCP PDU based on the first security key; performing at least one of integrity verification and header decompression for the PDCP PDU based on the second security key; and determining a security key applied to the PDCP PDU, based on result of the at least one of integrity verification and header decompression based on the first security key and result of the at least one of integrity verification and header decompression based on the second security key.Type: GrantFiled: August 6, 2020Date of Patent: June 14, 2022Assignee: Electronics and Telecommunications Research InstituteInventors: Jae Su Song, Seung Kwon Baek
-
Patent number: 11356442Abstract: A wearable device-based identity authentication method and system, comprising: a user terminal initiates an authentication request to a target server and provides device information of the user terminal, the target server generates a temporary session, and sends a temporary session ID and the device information to a quantum key distribution network; the quantum key distribution network generates identification information, searches a wearable device bound to the user terminal, and sends the identification information to the wearable device; the wearable device receives and provides the identification information to the user terminal, the user terminal acquires the identification information, and sends verification information to the wearable device and then to the quantum key distribution network; the quantum key distribution network generates an authentication result and sends to the target server; and the target server generates an identification authentication result and sends to the user terminal.Type: GrantFiled: February 28, 2019Date of Patent: June 7, 2022Assignees: QUANTUMCTEK CO., LTD., SHANDONG INSTITUTE OF QUANTUM SCIENCE AND TECHNOLOGY CO., LTD.Inventors: Yong Zhao, Chunhua Liu
-
Patent number: 11356280Abstract: A method of encrypting data at an electronic device where the electronic device is associated with a key device. Each device is associated with an asymmetric cryptography pair, each pair including a first private key and a first public key. Respective second private and public keys may be determined based on the first private key, first public key and a deterministic key. A secret may be determined based on the second private and public keys. The data at the electronic device may be encrypted using the determined secret or an encryption key that is based on the secret. Information indicative of the deterministic key may be sent to the key device where the information may be stored.Type: GrantFiled: July 10, 2020Date of Patent: June 7, 2022Assignee: nChain Holdings LtdInventors: Craig Steven Wright, Stephane Savanah
-
Patent number: 11343087Abstract: Systems, apparatuses, methods, and computer program products are disclosed for session authentication. An example system includes encoding circuitry configured to generate, based on a first set of quantum bases, a set of qbits, and transmit the set of qbits over a quantum line, wherein the encoding circuitry is further configured not to transmit the first set of quantum bases. The example system further includes decoding circuitry in communication with the encoding circuitry over the quantum line, the decoding circuitry configured to receive, over a quantum line, the set of qbits, and decode, based on a second set of quantum bases, the set of qbits to generate a decoded set of bits. The example system further includes session authentication circuitry configured to generate a session key based on the decoded set of bits.Type: GrantFiled: March 9, 2018Date of Patent: May 24, 2022Assignee: Wells Fargo Bank, N.A.Inventor: Masoud Vakili
-
Patent number: 11329817Abstract: The present disclosure, in some embodiments, relates to a data protection method comprising: determining a file comprising content data on a computing system; generating index information for the file; transmitting the index information to a cloud system; executing a corruption operation on the file comprising: dividing the content data of the file into a plurality of data chunks; executing a first encryption operation based on an encryption protocol, on the first data chunk; executing a second encryption operation based on the encryption protocol, on the second data chunk; generating or assigning a first name for the first data and a second name for the second data chunk; and generating a key associated with an order of the first data chunk and the second data chunk.Type: GrantFiled: October 1, 2021Date of Patent: May 10, 2022Inventor: Devi Selva Kumar Vijayanarayanan
-
Patent number: 11317466Abstract: The technology provides a convenient and efficient way for business entities and other organizations to gather and transmit data from remotely located facilities without having to rely on satellite communication or specialized communication equipment. A geographically isolated facility may be used for manufacturing, warehousing, power generation, environmental monitoring, as well as other services. Information about the facility, its equipment and operation are transmitted to a back end system using high altitude platforms (HAPs). This provides opportunistic communication between remote facilities and the back-end system on an as-needed basis, for example based on bandwidth usage, peak/off-peak usage, etc. The HAPs may act as a store and forward service, or process received data before transmitting it to a ground station or the back end system. This approach allows an organization to periodically monitor its facilities, to determine equipment failure, resupply needs, and to assess the status of each facility.Type: GrantFiled: January 8, 2021Date of Patent: April 26, 2022Assignee: SoftBank Corp.Inventor: James Smith
-
Patent number: 11301583Abstract: A method for facilitating communications while protecting customer privacy through cryptography and withholding of personally identifiable information includes: storing, in a memory of a processing server, contact data and a reference value associated with a first external computing device; receiving, by a receiver of the processing server, a communication request from a second external computing device, the communication request including at least the reference value and a digital signature; validating, by a processor of the processing server, the digital signature using a communicator public key of a cryptographic key pair; receiving, by the receiver of the processing server, a communication message from the second external computing device; and forwarding, by a transmitter of the processing server, the communication message to the first external computing device using the stored contact data following successful validation of the digital signature.Type: GrantFiled: October 9, 2019Date of Patent: April 12, 2022Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventors: Rahul Lamba, Aastha Dhiman, Tushar Rungta, Aditya Koduri
-
Patent number: 11291059Abstract: Methods, a user equipment (UE) and a base station are disclosed for sidelink identification. According to an embodiment, a first UE participates in an identity (ID) determination procedure such that a sidelink ID is determined for a sidelink between the first UE and a second UE. The sidelink ID comprises a full ID for identifying one of the first and second UEs and a short ID for identifying the other of the first and second UEs.Type: GrantFiled: August 3, 2018Date of Patent: March 29, 2022Assignee: Telefonaktiebolaget LM Ericsson (Publ) Stockholm, SwedenInventors: Zhang Zhang, Ricardo Blasco Serrano, Shehzad Ali Ashraf, Marco Belleschi
-
Patent number: 11288256Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. The analysis appliance, in some embodiments, receives definitions of keys and provides them to the host computers. In some embodiments, existing keys are modified based on the analysis. Additionally, or alternatively, new keys are provided based on the analysis. In some embodiments, the analysis appliance receives the flow group records (e.g., sets of attributes) based on the keys and the configuration data from each host computer.Type: GrantFiled: July 23, 2019Date of Patent: March 29, 2022Assignee: VMWARE, INC.Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Arnold Poon
-
Patent number: 11281482Abstract: A host machine includes a guest machine, a device emulator, and a hypervisor communicably coupled to the guest machine and the device emulator. The guest machine executes a non-real time thread that causes a non-real time I/O emulation by the device emulator. Responsive to receipt of a real time thread by the guest machine, the hypervisor determines whether the non-real time I/O emulation is abortable or non-abortable. If abortable, the hypervisor aborts the non-real time thread and causes the guest machine to execute the real time thread. Upon completing the execution of the real time thread, the hypervisor causes the guest machine to revert to a non-real time context based on a previous system snapshot. Upon establishing the non-real time context, the hypervisor causes the guest machine to execute the previously aborted non-real time thread.Type: GrantFiled: December 14, 2016Date of Patent: March 22, 2022Assignee: Intel CorporationInventors: Yunhong Jiang, Chao Peng, Yao Zu Dong
-
Patent number: 11263310Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for verifying device capabilities. An example method may include: accessing instructions, a wrapped key, and a cryptographic attribute for the wrapped key from an encrypted memory region, wherein the wrapped key encodes a cryptographic key; executing, by a processing device, the instructions to derive the cryptographic key in view of the wrapped key and the cryptographic attribute, wherein the executing consumes computing resources for a duration of time; using the cryptographic key to access program data; executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time; and transmitting a message comprising an indication of the evaluated condition.Type: GrantFiled: November 26, 2019Date of Patent: March 1, 2022Assignee: Red Hat, Inc.Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
-
Patent number: 11258590Abstract: Described herein are methods, systems, and computer-readable storage media for managing cryptographic keys needed for peripheral devices to securely communicate with host computing devices. Techniques include receiving, at a centralized identity management resource, a first key that is part of a cryptographic key pair comprising the first key and a second key, wherein the second key is stored at a peripheral device for use by the peripheral device in encrypting data. Techniques further include identifying a first host computing device that is permitted to engage in secure communications with the peripheral device. Further, making available the first key from the centralized identity management resource to the first host computing device to enable the first host computing device to decrypt the encrypted data.Type: GrantFiled: March 31, 2021Date of Patent: February 22, 2022Assignee: CyberArk Software Lid.Inventors: Omar Tsarfati, Asaf Hecht, Hadas Elkabir
-
Patent number: 11240395Abstract: In an information-processing device, a memory is configured to store setting information including an operation setting for the information-processing device. A controller is configured to perform: acquiring; determining; allowing; importing; and encrypting. The acquiring acquires import authentication information including a device password for the information-processing device while a removable storage medium storing import setting information is connected to an input-output interface. The determining determines whether the device password matches a preset device password of the information-processing device. The allowing allows, in response to determining that the device password matches the preset device password, the import setting information to be imported. The importing imports the import setting information from the removable storage medium into the memory as the setting information.Type: GrantFiled: March 10, 2020Date of Patent: February 1, 2022Assignee: Brother Kogyo Kabushiki KaishaInventor: Takatsugu Yamada
-
Patent number: 11227057Abstract: An example operation may include one or more of identifying a new member (M1) to a permissioned database, creating a new group including the new member and one or more previously identified members (MP), modifying a world state of the permissioned database to identify a set of members in the new group with access to the permissioned database, and responsive to the new member (M1) being identified, creating a new entry (TX1) to the permissioned database using an encryption key (K1) associated with the new member (M1).Type: GrantFiled: November 8, 2018Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Andres Garagiola, Diego A. Masini
-
Patent number: 11195167Abstract: The present application provides techniques for offline payments. The method includes: receiving an offline payment request for an offline payment through a target payment application, the offline payment being made by a user registered with the target payment application; receiving an identity authentication identifier (ID) of the user; determining that the identity authentication ID of the user matches a stored identity authentication ID previously stored for the user on the computing device; in response to determining that the identity authentication ID matches the stored identity authentication ID, receiving an offline payment certificate issued by the target payment application to the user and stored on the computing device; and providing the offline payment certificate to an offline payment service party of the target payment application, the offline payment service party configured to authorize the offline payment based on the offline payment certificate.Type: GrantFiled: December 23, 2019Date of Patent: December 7, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Yuanbo Sun
-
Patent number: 11184170Abstract: Methods, systems, and devices for public key protection techniques are described. An embedded multimedia card (eMMC) may be formatted to include a permanent write protect group that is configured to prevent disabling of write protection for data stored in the permanent write protect group. The eMMC may store a public key associated with a first host device in the permanent write protect group of the eMMC. A data package may be received from the host device and authenticated by using the public key stored in the permanent write protect group. The embedded memory controller may be configured to prevent modifying or writing data to a permanent write protect group.Type: GrantFiled: June 28, 2019Date of Patent: November 23, 2021Assignee: Micron Technology, Inc.Inventor: Zhan Liu
-
Patent number: 11171944Abstract: A method for automatically attaching a purpose-built electronic device to a provider network includes steps of discovering, by a Wi-Fi module of the purpose-built electronic device, a wireless data network in operable communication with the provider network selecting, by the Wi-Fi module, the wireless data network, transmitting a primary authentication certificate from the Wi-Fi module to an authentication, authorization, and accounting server of the provider network, receiving, by an application server of the provider network, a secondary authentication certificate from a functionality module of the purpose-built electronic device authenticating, by the provider network, the primary and secondary authentication certificates, and attaching the purpose-built device to the provider network.Type: GrantFiled: June 4, 2019Date of Patent: November 9, 2021Assignee: Cable Television Laboratories, Inc.Inventors: Ralph William Brown, Bernard McKibben, Stuart Hoggan, Brian A. Scriber
-
Patent number: 11159512Abstract: Systems and methods for providing a single sign-on for authenticating a user via multiple client devices is provided. For example, the system includes a processor configured to receive a first connection request from a first client device. The processor processes the first connection request and transmits an access token to the first client. The processor can further receive a second connection request from a second client device and process the second connection request. The processor can transmit a single sign-on response to the second client device in reply to the second connection request. The second client device can be configured to communicated with and transmit the single-sign on response to the first client device for processing. The processor can receive a single sign-on verification from the first client device, process the single sign-on verification, and transmit a copy of the access token to the second client device.Type: GrantFiled: July 22, 2020Date of Patent: October 26, 2021Assignee: Citrix Systems, Ine.Inventors: Liangang Shi, Rulei Lin, Zhenxing Liu
-
Patent number: 11146392Abstract: A system includes processor(s) and memory(s). When encryption key(s) need to be generated to encrypt a key, processor(s): securely generate encryption key(s); encrypt key using encryption key(s) to generate encrypted key; split encrypted key and encryption key(s) into set(s) of key components, wherein subset of key components can be used to reconstruct encrypted key and encryption key(s); and securely erase key from memory(s). When encryption key(s) need to be used, processor(s): receive set(s) of key components from subset(s) of users that can be used to reconstruct encrypted key and encryption key(s) used to securely decrypt key from encrypted key; when set(s) of key components is received from subset(s) of users that can be used to reconstruct encrypted key and encrypted key(s), securely reconstruct encrypted key and encryption key(s); and when the encrypted key and the encryption key(s) have both been reconstructed, securely decrypt encrypted key into key using encryption key(s).Type: GrantFiled: March 15, 2019Date of Patent: October 12, 2021Assignee: tZERO IP, LLCInventors: Tron Black, Denny Becker, Tyler Perkins, Joel Weight, Jesse Empey
-
Patent number: 11080077Abstract: Life cycle management techniques are provided for cloud-based application executors with key-based access to other devices. An exemplary method comprises determining that a retention time for a first cloud-based application executor (e.g., a virtual machine or a container) has elapsed, wherein the first cloud-based application executor has key-based access to at least one other device using a first key; in response to the determining, performing the following steps: creating a second cloud-based application executor; and determining a second key for the second cloud-based application executor that is different than the first key, wherein the second cloud-based application executor uses the first key to add the second key to one or more trusted keys of the at least one other device and deactivates the first key from the one or more trusted keys.Type: GrantFiled: October 25, 2018Date of Patent: August 3, 2021Assignee: EMC IP Holding Company LLCInventors: Amihai Savir, Oron Golan, Aviram Fireberger, Or Herman Saffar, Roie Ben Eliyahu
-
Patent number: 11074363Abstract: Techniques are provided for selectively or completely redacting the text of database commands submitted to a database system. The database server receives the clear text version of the commands, parses the commands, and generates an execution plan, as normal. However, prior to providing the text of the commands to any location that is externally visible, the database server determines whether the command qualifies as “sensitive”. If the command qualifies as sensitive, then a redacted version of the command is generated. In the case of selective redaction, portions of the redacted version remain in clear text, while selected portions are replaced with encrypted text. In the case of total redaction, the entire command is replaced with encrypted text.Type: GrantFiled: December 5, 2018Date of Patent: July 27, 2021Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Patrick F. Sack, William Maroulis, Scott Gaetjen, Mark Tatum, Mark E. Schultz, Kenneth Westbrook, Ryan Feipel
-
Patent number: 11044083Abstract: A first server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different, second, server. The first server transmits messages between the client device and the second server where the second server has access to a private key that is not available on the first server. The first server receives from the second server a set of session key(s) used in the secure session for encrypting/decrypting communication between the client device and the first server. The session key(s) are generated using a master secret that is generated using a premaster secret generated using Diffie-Hellman public values selected by the client device and the second server. The first server uses the session key(s) to encrypt/decrypt communication with the client device.Type: GrantFiled: July 24, 2018Date of Patent: June 22, 2021Assignee: CLOUDFLARE, INC.Inventors: Sébastien Andreas Henry Pahl, Matthieu Philippe François Tourne, Piotr Sikora, Ray Raymond Bejjani, Dane Orion Knecht, Matthew Browning Prince, John Graham-Cumming, Lee Hahn Holloway, Nicholas Thomas Sullivan, Albertus Strasheim
-
Patent number: 11038698Abstract: A path is secured from one node to another node of the computing environment. The one node obtains a first encryption key and one or more first parameters for transmission of data, and a second encryption key and one or more second parameters for reception of data. A shared key is obtained by the one node from a key server, and the shared key is used to encrypt a message. The encrypted message includes the first encryption key, the one or more first parameters, the second encryption key and the one or more second parameters. The encrypted message and an identifier of the shared key is sent from the one node to the other node, and a response message is received by the one node. The response message at least provides an indication that the other node received the encrypted message and obtained the shared key.Type: GrantFiled: September 4, 2018Date of Patent: June 15, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Patricia G. Driever, Roger G. Hathorn, Christopher Colonna, John Flanagan, George P. Kuch, Richard M. Sczepczenski, Glen Jaquette
-
Patent number: 11019489Abstract: Technology described in this document can be embodied in a method for facilitating automatic connection to a network. The method includes receiving, at a first device that is authenticated to the network, an identifier of a second device, and retrieving, by the first device based on the identifier, a public key for the second device. The data encrypted using the public key is decryptable using a private key of the second device. The method also includes encrypting, using the public key for the second device, credential information usable by the second device for authenticating to the network, and transmitting, to the second device, the encrypted credential information.Type: GrantFiled: March 26, 2018Date of Patent: May 25, 2021Assignee: Bose CorporationInventors: Pankaj Aggarwal, Kapil Hali, Sheshadri Mantha, Scott Stinson
-
Patent number: 11012243Abstract: A method and system configured to produce a cryptographic signature on a message, under a key, at a user computer wherein the key is shared between the user computer, which stores a first key-share, and an authentication computer, which stores a second key-share and a first authentication value. The user computer encodes the message to produce a blinded message, produces the first authentication value from a user password and a secret value, and produces a second authentication value by encoding the first authentication value and a nonce. The authentication computer uses the nonce to determine if the first authentication value is correct and, if so, encodes the blinded message using the second key-share to produce a partial signature. The user computer produces a signature on the message under the key by encoding the partial signature and the message using the first key-share and an unblinding function.Type: GrantFiled: April 3, 2019Date of Patent: May 18, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan L. Camenisch, Anja Lehmann, Gregory Neven
-
Patent number: 11012244Abstract: A method for network node encryption is provided. Signals that carry a node encryption request from a client for a network node is received by an apparatus. Subsequently, node data information of the network node according to the node encryption request is acquired by the apparatus. The node data information includes a preset link. Next, an application to a trusted third party for an encryption certificate is transmitted via the apparatus and the application includes the node data information. The trusted third party sends a certificate verification request including a verification file once the application is received to verify an authority to the preset link. The certificate verification request is received and the verification file is stored subsequently. The trusted third party verifies the storing of the verification file and sends an encryption certificate. The encryption certificate is received and deployed on the network node via the apparatus.Type: GrantFiled: May 8, 2018Date of Patent: May 18, 2021Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Wei Wei
-
Patent number: 10979219Abstract: According to an example embodiment of the present invention, there is provided an apparatus comprising at least one processing core configured to determine a pairing opportunity with a second apparatus and to cause a message to be transmitted to a server, the message comprising a generated number, a receiver configured to receive from the server an indication, and the at least one processing core being further configured to, at least in part based on the indication, cause the apparatus to participate in pairing with the second apparatus.Type: GrantFiled: March 12, 2014Date of Patent: April 13, 2021Assignee: Nokia Technologies OyInventors: Arto Palin, Jukka Reunamäki
-
Patent number: 10951401Abstract: A system is disclosed for facilitating the secure transfer of digital assets that include making a first key and index scheme accessible for seamlessly and continuously executing digital asset transactions. The first key is capable of generating second keys and is made accessible to a sender of digital assets. The index scheme is customizable to meet the needs of the parties of the transaction and is capable of being used to generate a key derivation index. The first key and index scheme are secure, and for each digital asset transaction, the second key may be derived from the index scheme and first key, and the new key may be used to generate a new address.Type: GrantFiled: March 30, 2018Date of Patent: March 16, 2021Assignee: BITNOMIAL, INC.Inventors: Luke Hoersten, Michael Scott Dunn, Matthew Wraith
-
Patent number: 10949556Abstract: The invention concerns a method for decrypting data sent by a first user having at least a first role in a first entity, the first entity comprising at least the first user and a first instance, to a second user having at least a second role in a second entity, the second entity comprising at least the second user and a second instance, the data being encrypted using a symmetric encryption key, the symmetric encryption key being encrypted using a public key of an asymmetric key pair comprising a private key and a public key, wherein the asymmetric key pair is associated with the second role of the second user, and the encrypted data is associated with a transmission ID, the method furthermore involving the use of an element for electronic or digital identification and authentication identifying the second user in his second role and being unique to the second role. The invention also concerns a corresponding method for encrypting data.Type: GrantFiled: December 22, 2016Date of Patent: March 16, 2021Assignee: OSMERUS INVESTMENTS LTDInventor: Alexander Signäs
-
Patent number: 10938781Abstract: An enterprise security system is improved by instrumenting endpoints to explicitly label network flows with cryptographically secure labels that identify an application or other source of each network flow. Cryptographic techniques may be used, for example, to protect the encoded information in the label from interception by third parties or to support cryptographic authentication of a source of each label. A label may provide health, status, or other heartbeat information for the endpoint, and may be used to identify compromised endpoints, to make routing decisions for network traffic (e.g., allowing, blocking, rerouting, etc.), to more generally evaluate the health of an endpoint that is sourcing network traffic, or for any other useful purpose.Type: GrantFiled: April 22, 2016Date of Patent: March 2, 2021Assignee: Sophos LimitedInventors: Daniel Salvatore Schiappa, Andrew J. Thomas, Kenneth D. Ray, Joseph H. Levy
-
Patent number: 10938570Abstract: Technologies for remote attestation include a group member device to generate a signature of a message using a cryptographic key assigned to the group member device by a group manager and determine an authentication path that indicates a plurality of cryptographic hashes necessary to compute a group public key of a group associated with a plurality of group member devices. The cryptographic key is assigned to the group member device based on a permutation of a set of cryptographic keys generated by the plurality of group member devices. The group member device transmits the signature and the authentication path to a verifier device for verification of the signature.Type: GrantFiled: March 29, 2016Date of Patent: March 2, 2021Assignee: INTEL CORPORATIONInventors: Rafael Misoczki, Rachid El Bansarkhani
-
Patent number: 10911225Abstract: An approach for full-path data encryption, where user virtualized computers (e.g., user VMs) are configured to communicate with other virtualized computers or VMs using IPsec protocol encryption standards. The user VMs may send a first encryption or authorization key to the other VMs, which the other VMs may use to authenticate the user VMs and encrypt and decrypt data stored to storage devices using a second encryption key. In some approaches, the other VMs may interpret or decrypt the data sent via IPsec and then perform data optimizations (e.g., compression, deduplication) on the data before decrypting/encrypting with the second key.Type: GrantFiled: June 3, 2016Date of Patent: February 2, 2021Assignee: Nutanix, Inc.Inventors: Alexander Michael Bunch, Miao Cui, Ajay Prakash Kulkarni, Peter Alan Turshmid
-
Patent number: 10903997Abstract: The present invention is a platform and/or agnostic method and system operable to protect data, documents, devices, communications, and transactions. Embodiments of the present invention may be operable to authenticate users and may be operable with any client system. The method and system are operable to disburse unique portions of anonymous related information amongst multiple devices. These devices disburse unique portions of anonymous information and are utilized by the solution to protect sensitive data transmissions, and to authenticate users, data, documents, device and transactions. When used for authentication, login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.Type: GrantFiled: May 11, 2020Date of Patent: January 26, 2021Assignee: Autnhive CorporationInventor: Devi Selva Kumar Vijayanarayanan
-
Patent number: 10902110Abstract: Systems and methods which enable an authentication procedure to be used within the standard network security architecture to authenticate third party applications that are forbidden access to a particular secret key are disclosed. Third party smartphone applications that are unable to use SIM-based authentication due to being forbidden access to a SIM-based key are provided an alternate secret key for use in an EAP-AKA or EAP-SIM type procedure according to embodiments. An authentication server or other backend authentication infrastructure of embodiments requests authentication vectors from a backend system sharing the alternative secret key. Accordingly, the backend authentication platform of embodiments is adapted to know or detect that an application is using an alternative secret key (e.g., a secret key other than the SIM-based secret key) and to perform the appropriate procedure for the key type.Type: GrantFiled: September 12, 2019Date of Patent: January 26, 2021Assignee: Ribbon Communications Operating Company, Inc.Inventors: Keith A. Mumford, Satish Agrawal, Mark Wallis
-
Patent number: 10892956Abstract: A device management server that manages information regarding an application associated with a product key, and information regarding a panel application includes a first creation unit configured to create a first task for distributing to a network device the application associated with the product key, and a second creation unit configured to create a second task for distributing the panel application to the network device, and in a case where the second task is executed, acquires version information regarding the second application installed on the network device, and distributes a new version of the panel application.Type: GrantFiled: February 4, 2020Date of Patent: January 12, 2021Assignee: Canon Kabushiki KaishaInventor: Satoshi Nishikawa
-
Patent number: 10877806Abstract: In one embodiment, an apparatus comprises a first processor to generate a first cryptographic key in response to a request from a software application; receive a second cryptographic key generated by a second processor; encrypt the first cryptographic key using the second cryptographic key; and provide the encrypted first cryptographic key for use by the software application.Type: GrantFiled: June 14, 2017Date of Patent: December 29, 2020Assignee: INTEL CORPORATIONInventors: Daniel Nemiroff, Jason W. Brandt
-
Patent number: 10880269Abstract: An enterprise security system is improved by instrumenting endpoints to explicitly label network flows with cryptographically secure labels that identify an application or other source of each network flow. Cryptographic techniques may be used, for example, to protect the encoded information in the label from interception by third parties or to support cryptographic authentication of a source of each label. A label may provide health, status, or other heartbeat information for the endpoint, and may be used to identify compromised endpoints, to make routing decisions for network traffic (e.g., allowing, blocking, rerouting, etc.), to more generally evaluate the health of an endpoint that is sourcing network traffic, or for any other useful purpose.Type: GrantFiled: April 22, 2016Date of Patent: December 29, 2020Assignee: Sophos LimitedInventors: Daniel Salvatore Schiappa, Andrew J. Thomas, Kenneth D. Ray, Joseph H. Levy
-
Patent number: 10873452Abstract: This disclosure relates to secret sharing data exchange for generating a data processing model. In some aspects, first data party device determines respective values of first coefficients based on a first share of service data. The first coefficients are corresponding coefficients of respective target variables in different terms of a polynomial expression and the target variables are variables that are in the polynomial expression and associated with the first share of the service data. A second data party device determines respective values of second coefficients based on a second share of the service data. The second coefficients include coefficients other than the first coefficients in the different terms of the polynomial expression. The first data party device secretly shares respective values of the different terms in the polynomial expression in parallel based on the respective values of the first coefficients.Type: GrantFiled: February 14, 2020Date of Patent: December 22, 2020Assignee: Advanced New Technologies Co., Ltd.Inventors: Yashun Zhou, Lichun Li, Shan Yin, Huazhong Wang
-
Patent number: 10871984Abstract: An execution environment has a deployed virtual machine image. The virtual machine image provides a service that is identified by a role. The execution environment generates a measurement of the virtual machine image and provides it to a key service to request role keys that enable operation of the virtual machine image in the execution environment. The key service determines whether the virtual machine image is mapped to the role and, if so, returns the role keys to the requesting execution environment.Type: GrantFiled: April 17, 2019Date of Patent: December 22, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Malcolm E. Pearson, Tolga Acar, Rahul Verma
-
Patent number: 10868806Abstract: Secure network communications are described. In one aspect, a secure network can include a passbuilder that provides policy information related to performance characteristics of the secure network. A sender can receive the policy information and transmit packets to a receiver if the policy information is complied with by the potential packet transmission.Type: GrantFiled: June 26, 2018Date of Patent: December 15, 2020Assignee: APPLIED INVENTION, LLCInventors: W. Daniel Hillis, Mathias L. Kolehmainen
-
Patent number: 10855451Abstract: Security of data storage devices and servers can be improved by the system and methods described herein. In some embodiments, a key management server may be locally or externally located. An encryption key may be used for locking a portion or the entirety of a storage device. The key management server may communicate with data storage devices regarding encryption keys using secure protocols. For example, the key management server may generate a communication key that may be used to securely encrypt messages between the server and a data storage device.Type: GrantFiled: August 2, 2017Date of Patent: December 1, 2020Assignee: SEAGATE TECHNOLOGY LLCInventor: Christopher Nicholas Allo
-
Patent number: 10846379Abstract: A method for providing an access key for a field device of automation technology, wherein the access key controls accessing of the field device, includes: producing an individual key; storing the individual key in a database together with an identification feature of the field device; storing the individual key in the field device which is to be unlocked based on an input access key; ascertaining at least the identification feature of the field device for which the access key is to be provided; and forming/producing/generating the access key, such that it includes at least one hash value, wherein the hash value is formed at least from the individual key read-out from the database with the assistance of the ascertained identification feature.Type: GrantFiled: November 15, 2016Date of Patent: November 24, 2020Assignee: Endress+Hauser Flowtec AGInventors: Nikolai Fink, Sushil Siddesh
-
Patent number: 10841784Abstract: A method for authentication and key agreement in a communication network is disclosed. In the method, a network node generates a common public key and a master secret key, assigns to a first user equipment a first set of one or more pseudonym identifications corresponding to a real identity of the first user equipment, the common public key and a first private key specific to the first user equipment, and assigns to a second user equipment a second set of one or more pseudonym identifications corresponding to a real identity of the second user equipment, the common public key and a second private key specific to the second user equipment.Type: GrantFiled: December 24, 2015Date of Patent: November 17, 2020Assignee: Nokia Technologies OyInventors: Mingjun Wang, Zheng Yan
-
Patent number: 10833857Abstract: One general aspect of encryption key management by a data storage controller which communicates with asynchronous key servers is directed to issue a prepare for enable command to request an encryption key from an encryption key server. State machine logic transitions from an unconfigured state to a prepare for enable state in which key server mirror management logic receives from a key server a requested encryption key and caches the received key. In an enabling state, enablement logic verifies successful mirroring of the encryption key by a key server to another key server and activates the encryption key if key mirroring by key servers is verified. In an enabled state, data is encrypted using the verified, activated encryption key. Other features and aspects may be realized, depending upon the particular application.Type: GrantFiled: January 29, 2018Date of Patent: November 10, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rashmi Chandra, Jacob L. Sheppard
-
Patent number: 10833850Abstract: A key management tool comprises a memory, an interface, a compatibility engine, a validation engine, a distribution engine, and a verification engine. The compatibility engine is configured to determine that the first device is compatible with the key management tool, the validation engine is configured to validate the first device, and the distribution engine is configured to communicate a first temporary key to the first device. The verification engine is configured to perform a first set of one or more checks on the first device after the first temporary key is communicated to the first device, the distribution engine is further configured to communicate a first permanent key to the first device if the first device passes the first set of one or more checks, and, subsequent to the communication of the first permanent key, the interface is configured to receive a request for a second permanent key.Type: GrantFiled: November 4, 2019Date of Patent: November 10, 2020Assignee: Bank of America CorporationInventors: Daniel Gapastione, Manish Nigam, Michael Stark