Particular Algorithmic Function Encoding Patents (Class 380/28)
  • Patent number: 9892275
    Abstract: Various embodiments of systems, computer program products, and methods for encrypting data in a multi-tenant cloud environment are described herein. In an aspect, an encryption time frame to encrypt data associated with a user in a multi-tenant cloud environment may be retrieved. Based on the encryption time frame, a list of object types to be encrypted may be identified. A batch encryption period may be determined for encrypting data corresponding to the list of object types. Further, batches are sequentially selected based on the batch encryption period, for a selected batch: one or more data records may be retrieved based on the batch encryption period and the one or more data records may be encrypted in groups based on at least one throttling value.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: February 13, 2018
    Assignee: SAP SE
    Inventors: Vipul Gupta, Balaji Raghunathan, Darpan Dinker
  • Patent number: 9887996
    Abstract: Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user receiving a communication from an entity. In response to receiving the communication from the entity, the method further includes generating a token. The token may be a one-time passcode, personal identification number (PIN), alphanumeric value, code word, pass phrase, or security question. The token is received by a device of the user. Additionally, the token is transmitted to the entity. The user may then receive evidence of the token from the entity.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: February 6, 2018
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Christopher Phillip Clausen, Lisa Michelle Lepage, Darrell Lee Suen, Jeffrey A. Cornman
  • Patent number: 9886597
    Abstract: The invention relates to a data-processing method that includes encoding a plurality of data of n bits into code words having a predefined constant Hamming weight, characterized in that said method also includes using (4000) encryption operations or arithmetic operations on the resulting code word(s) and also in that encoding each datum includes: decomposing (100) the datum into a plurality of m bit sequences to be encoded, m strictly being less than n; encoding (300) each bit sequence into a partial code word, each having a predefined Hamming weight, such that the sum of the Hamming weights of the partial code words are equal to the Hamming weights of the code word; and concatenating (300) the partial code words such as to produce the code word corresponding to the datum. The invention also relates to a data transmission method and to an electronic circuit configured to implement said methods.
    Type: Grant
    Filed: January 17, 2014
    Date of Patent: February 6, 2018
    Assignee: MORPHO
    Inventors: Julien Bringer, Victor Servant
  • Patent number: 9880960
    Abstract: A configurable sponge function engine. The configurable engine includes a state register having bitrate and capacity sections, each having a variable size, where a sum of the bitrate and capacity sizes is fixed. A controller generates a bitrate size indication. A configurable message processor receives an input message from an input bus, receives the size indication, fragments the input message into fragmented blocks of a size specified by the size indication, and converts the blocks to a bus width of the bitrate and capacity sizes. An iterative calculator receives the blocks, performs iterative processing operations on the blocks, and stores a result of each operation in the state register overwriting a previous register value. An output adaptor receives a value stored in the state register after the block corresponding to the end of the input message is processed and outputs the register value converted to have an output bus width.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: January 30, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Ron Diamant, Ori Weber, Omer Shaked
  • Patent number: 9882712
    Abstract: An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data is divided by segmenting unit and that is registered with a storage device and a second encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data to be matched is divided by segmenting unit, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that takes a difference between the first and second encrypted text, and determines whether a Hamming distance between plaintexts that corresponds to the difference between the first and second encrypted text is equal to or less than a predetermined certain value.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: January 30, 2018
    Assignee: NEC CORPORATION
    Inventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
  • Patent number: 9875193
    Abstract: A method (and structure) protects confidentiality and integrity of information in a secure object from other software on the system. An object-id value that identifies software currently executing on a CPU (Central Processing Unit) is stored, the value having a predetermined standard value when software that is not a secure object is executing. Each block of information in the cache is associated with an ownership value that is used to store an identification of the software that owns the information in the block. When software attempts to access information in one of the blocks, the object-id of the currently executing software is compared with the ownership value associated with the block being accessed. Access to the block is allowed if the object-id of the currently executing software matches the ownership value of the block.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: January 23, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Richard Harold Boivie
  • Patent number: 9875370
    Abstract: Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA). A parameterized query is received by the DS from the DA based on a user query received from a requestor. The DS analyzes the parameterized query to attempt to determine an encryption configuration for a transformed version of the user query capable of being evaluated by the DS on encrypted data values. The DS responds to the DA with either a failure to determine the encryption configuration, or by providing the determined encryption configuration to the DA. The DA generates the transformed version of the user query, and provides the transformed version to the DS. The DS evaluates the transformed version of the user query, and provides results to the DA. The DA decrypts the results, and provides the decrypted results to the requestor.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: January 23, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Panagiotis Antonopoulos, Ajay S. Manchepalli, Kapil Vaswani, Haohai Yu, Michael James Zwilling
  • Patent number: 9875375
    Abstract: A similar-information search method includes receiving, with a data computation device, an encrypted feature quantity and an encrypted similarity value from a user terminal device; calculating, with the data computation device, an encrypted distance between an encrypted reference feature quantity and the encrypted feature quantity; determining, with the data computation device, whether the encrypted distance matches the encrypted similarity value; generating, with the data computation device, encrypted reference data that is information obtained by encrypting reference data if it is determined that the encrypted distance matches the encrypted similarity value; and transmitting, with the data computation device, the generated encrypted reference data to the user terminal device.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: January 23, 2018
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Natsume Matsuzaki, Yuji Unagami
  • Patent number: 9871652
    Abstract: A computer generates a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial by a second encrypted polynomial, and outputs cryptographic information that represents the third encrypted polynomial. The first encrypted polynomial is a polynomial obtained by encrypting a first polynomial that corresponds to a first vector, and the second encrypted polynomial is a polynomial obtained by encrypting a second polynomial that corresponds to a second vector. The third polynomial includes a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, in which a coefficient of the second term is masked.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: January 16, 2018
    Assignee: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Masaya Yasuda
  • Patent number: 9866371
    Abstract: A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: ?f(X1(t))·f(X2(t))=U(t)2 in the finite body Fq, irrespective of the parameter t, q=3 mod 4. A value of the parameter t is obtained and the point P is determined by: (i) calculating X1=X1 (t), X2=X2(t) and U=U(t); (ii) testing whether the term f(X?1) is a squared term in the finite body Fq and, if so, calculating the square root of the term f(X1), the point P having X1 as abscissa and Y1, the square root of the term f(X1), as ordinate; (iii) otherwise, calculating the square root of the term f(X2), the point P having X2, as abscissa and Y2, the square root of the term f(X2), as ordinate. The point P is useful in encryption, scrambling, signature, authentication or identification cryptographic applications.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: January 9, 2018
    Assignee: MORPHO
    Inventor: Thomas Icart
  • Patent number: 9860058
    Abstract: Each of at least three arithmetic units includes: a random number generator determining shared value [r] obtained by performing secret sharing of random number r; a randomizator using shared value [a0], . . . , [aM?1] obtained by performing secret sharing of value a0, . . . , aM?1 and shared value [r] to generate randomized shared value <a0>, . . . , <aM?1> with shared values [a0], . . . , [aM?1] and [a0r], . . . , [aM?1r] as a pair; a secret computator determining concealed function value [F([a0], . . . , [aM?1])] by executing function F including at least one secret operation while including randomized shared value <fi> of an operation target and an operation result depending on contents of secret operation into checksum C:=<f0>, . . . , <f??1>; and a correctness prover verifying correctness of function value [F([a0], . . .
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: January 2, 2018
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
  • Patent number: 9860055
    Abstract: A method of implementing large number multiplication and exponentiation is provided upon a general purpose microprocessor. These large number multiplication and exponentiation processes being common to cryptography standards such as RSA and AES that typically employ numbers with 512-bits, 1024-bits, and 2048-bits. According to the invention the method establishes the size of the large number processes according to value stored within a control register, this control register and other registers storing data are configured according to this value and accessed as N-bit registers (i.e. as 1024-bit registers for 1024-bit encryption. Additionally, the multiplication and exponentiation processes are handled according to the size of an arithmetic primitive, which is established according to the hardware configuration upon which the process is operating.
    Type: Grant
    Filed: March 22, 2007
    Date of Patent: January 2, 2018
    Assignee: Synopsys, Inc.
    Inventors: Neil F. Hamilton, Arthur J. Low
  • Patent number: 9852419
    Abstract: Methods and systems are disclosed for providing Near Field Communications. In certain embodiments, an Android mobile operating system based mobile device is configured with software that, when executed by one or more processors, determines whether the mobile device is to perform an NFC communication with a contactless payment terminal (CPT) using a secure element associated with an NFC controller included in the mobile device. Based on the determination, the mobile device is configured to execute software that performs communications with the CPT using the NFC controller.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: December 26, 2017
    Assignee: Capital One Financial Corporation
    Inventor: Panayiotis Varvarezis
  • Patent number: 9851948
    Abstract: Disclosed is a method for implementing precomputation of a large number in an embedded system. A modulo module, a modulo adding module, and a Montgomery modular multiplier are invoked according to a data format of a modulus length and a value of each data bit of a binary number corresponding to the modulus length, to perform an iterative operation, so that a precomputation result of a large number can be obtained when the modulus length is an arbitrary value, thereby improving the data processing speed.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: December 26, 2017
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 9847877
    Abstract: Methods and apparatus are provided for generating a secret cryptographic key of a user computer connectable to a server via a network. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. The user computer encodes the secret user value and an input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first and the check values to check whether the input password equals the user password. If so, the server encodes the first and the secret server values to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: December 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jan Camenisch, Robert Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Patent number: 9846785
    Abstract: A querying node generates public keys, secret keys, and switch key matrices. A public key associated with a first level and the switch key matrices are sent to a receiving node. The receiving node generates a key-value table, mapping values to keys, and encodes the keys and values using a polynomial ring of a predetermined type. The querying node encodes using a polynomial ring of the same predetermined type, then encrypts a query, using a public key, and sends the query to the receiving node. The receiving node performs a homomorphic comparison of the encrypted, encoded query with each encoded key entry in the encoded key-value store to determine a comparison result. The receiving node sums the results for each of the value entries and returns the summed result to the querying node. The querying node decrypts and decodes the received result using the corresponding secret key.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: December 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David F. Bacon, Graham A. Bent, Flavio A. Bergamaschi, Wei Zhang
  • Patent number: 9843441
    Abstract: Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and an accumulator. The substitution box is to perform a substitution operation on one byte per clock cycle. The accumulator is to accumulate four bytes and perform a mix-column operation in four clock cycles. The encryption unit is implemented using optimum Galois Field polynomial arithmetic for minimum area.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: December 12, 2017
    Assignee: Intel Corporation
    Inventors: Sanu Mathew, Vikram Suresh, Sudhir Satpathy, Mark Anders, Himanshu Kaul, Ram Krishnamurthy
  • Patent number: 9838198
    Abstract: A method of performing a keyed cryptographic operation mapping an input message to an output message, wherein the input message comprises m input data and the output message comprises m output data and wherein the cryptographic operation includes at least one round and the cryptographic operation specifies a substitution box for mapping input data into output data, including: transforming each of the m input data into n output data using n split substitution boxes, wherein the n split substitution boxes sum to the specified substitution box; and mixing and combining the m×n output data.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: December 5, 2017
    Assignee: NXP B.V.
    Inventors: Wil Michiels, Jan Hoogerbrugge
  • Patent number: 9838281
    Abstract: Methods, apparatus and articles of manufacture to monitor streaming media are disclosed. Example methods disclosed herein include combining first metering data extracted from first media included in a transport stream being sent to a media device with second metering data obtained independently of the first media to form combined metering data, the combined metering data not being decodable by a meter associated with the media device. Disclosed example methods also include transcoding the combined metering data to form transcoded metering data having a format decodable by the meter associated with the media device. Disclosed example methods further include encoding the transcoded metering data as metadata associated with the transport stream.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: December 5, 2017
    Assignee: The Nielsen Company (US), LLC
    Inventors: Jan Besehanic, Arun Ramaswamy
  • Patent number: 9826395
    Abstract: A method implemented in a first user equipment (UE) includes generating a first intermediate address. The method further includes transmitting a data packet using the first intermediate address by (i) applying a first address mechanism to a first part of the first intermediate address, and (ii) applying a second address mechanism to a second part of the first intermediate address.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: November 21, 2017
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Pontus Wallentin, Fredrik Gunnarsson
  • Patent number: 9825946
    Abstract: A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of formatting templates, each template being associated with an account number length; receiving a selection indicating a specific primary account number; identifying a specific formatting template where the associated account number length corresponds to a length of the specific primary account number; receiving an unpredictable number from a point of sale device; generating a cryptogram based on at least the unpredictable number and one or more algorithms; generating a data string, wherein the data string includes at least the generated cryptogram, the specific primary account number, and the unpredictable number, and wherein the data string is formatted based on the identified specific formatting template; and electronically transmitting the generated data string to the point of sale device.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: November 21, 2017
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Mehdi Collinge, Michael Christopher Ward, Sandra Jansen
  • Patent number: 9813725
    Abstract: The present disclosure describes a system, method, and computer program for encoding and decoding a unique signature for a user in a video file, wherein the video file was created using a video format that does not specifically support embedding a unique signature in the video file. A unique signature, comprising a plurality of data bits, is associated with a user and divided into groups. For each group, a different sine wave is created for each bit in the group. The frequencies of the sine waves correspond to the types of bits, and the amplitudes of the sine waves indicate the values of the bits. Group signals are overdubbed on the infrasound range of the audio track of the video file. The unique signature is decoded from the video file by analyzing the frequencies and amplitudes of sine waves in the infrasound range of the audio track.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: November 7, 2017
    Assignee: GoAnimate, Inc.
    Inventors: Tang Fei Yu, Omar Rabbolini
  • Patent number: 9813384
    Abstract: A method and apparatus for transmitting secure data packets through a node network. Unsecure data packets are received at a set of unsecure inputs and secure data packets are received at a number of secure inputs in a node in the node network. The secure data packets are authorized to be sent to a number of secure destination devices. The unsecure data packets are not authorized to be sent to the number of secure destination devices. The secure data packets and the unsecure data packets are integrated to form a number of output data streams based on a predetermined schedule. The number of output data streams is sent to a number of next nodes in the node network.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: November 7, 2017
    Assignee: THE BOEING COMPANY
    Inventors: Wayne R. Howe, Jeffrey H. Hunt, Angela Wai-an Li
  • Patent number: 9800406
    Abstract: Generally, the present disclosure provides technology modifying a first cryptographic cipher with one or more operations of a second cryptographic cipher. In some embodiments the technology leverages a mathematical relationship between representations of data used in the first and second ciphers to enable the substitution of one or more operations of the first cipher with one or more operations of the second cipher. The resulting modified cipher may in some instances exhibit improved performance and or security, relative to the unmodified first cipher. Methods, computer readable media, and apparatus including or utilizing the technologies are also described.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: October 24, 2017
    Assignee: INTEL CORPORATION
    Inventor: Shay Gueron
  • Patent number: 9799229
    Abstract: A method and apparatus for managing data in a platform. A first permission level is identified for first data in the data generated by a source in the platform. A second permission level is identified for an intended recipient of the first data. The first data is modified to form second data in the data in which the second data has the second permission level. The second data is distributed to the intended recipient.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: October 24, 2017
    Assignee: THE BOEING COMPANY
    Inventors: John Wokurka, Kenn R. Luecke, David K. Liefer
  • Patent number: 9794068
    Abstract: A memory stores therein a first vector. A processor generates a first encrypted polynomial by encrypting a first polynomial that corresponds to a first binary vector obtained by performing a binary transformation on elements of the first vector. A transmitter transmits to a cryptographic operation device cryptographic information that represents the first encrypted polynomial. The cryptographic operation device multiplies the first encrypted polynomial by a second encrypted polynomial that is generated by encrypting a second polynomial that corresponds to a second binary vector obtained by performing a binary transformation on elements of a second vector, so as to generate a third encrypted polynomial. When assigning 2 to a variable in a prescribed portion of a third polynomial obtained by decrypting the third encrypted polynomial, a result of an operation of the first vector and the second vector is obtained.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: October 17, 2017
    Assignee: FUJITSU LIMITED
    Inventor: Masaya Yasuda
  • Patent number: 9785369
    Abstract: A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held by a trusted party. The blockchains may include a series of blocks secured by multiple integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret. In some cases, the key may allow valid but tamper-evident rewrites of the blockchain by trusted entities. Further, in some implementations, tamper-evident rewrites may be converted to non-tamper-evident rewrites through multiple-party ratification.
    Type: Grant
    Filed: May 16, 2017
    Date of Patent: October 10, 2017
    Assignees: Accenture Global Solutions Limited, GSC Secrypt, LLC
    Inventors: Giuseppe Ateniese, Michael T. Chiaramonte, David Treat, Bernardo Magri, Daniele Venturi
  • Patent number: 9787471
    Abstract: Embodiments of a data encryption and/or decryption technique are disclosed. Briefly, for example, in accordance with one example embodiment a method is provided. A message based at least in part on a hierarchical symbol assignment system is encrypted. The hierarchical symbol assignment system is represented as a numerical value.
    Type: Grant
    Filed: June 1, 2006
    Date of Patent: October 10, 2017
    Assignee: Robert T. Jenkins and Virginia T. Jenkins
    Inventors: Mark Gesley, Richard Crandall, Edlyn Teske, Tim Williams
  • Patent number: 9788049
    Abstract: A multimedia signal processing system utilizes an easily manipulated, low-cost storage and display system that allows the user to view a television program and instantly review previous scenes within the program. The invention also allows the user to store selected programs while simultaneously watching or reviewing another. A versatile system architecture enables providing the invention in multiple configurations, each adapted to receive input signals from a different source. At the highest level, the system includes an input section and an output section. Across all configurations, the output section remains substantially the same, while the input section varies according to the signal type and the source. Thus, several configurations are provided, each one requiring only minor system board modifications. The system architecture thus simplifies the design and manufacturing challenge presented by producing units to serve different markets, such as digital satellite, digital cable and analog cable.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: October 10, 2017
    Assignee: TiVo Solutions Inc.
    Inventors: David Lockett, Kurtis G. Heaton, James M. Barton, Jean Swey Kao, Ching Tong Chow, Roderick James McInnis, Andrew Martin Goodman
  • Patent number: 9781100
    Abstract: A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to establish a secure channel with the constrained network entity. The constrained network entity may receive a certificate from the endpoint attempting to establish the secure channel and the constrained network entity may send the certificate asserted by the endpoint to a core network entity for validation. The core network entity may receive the certificate during a key exchange with the constrained network entity and the core network entity may indicate to the constrained network entity the validity of the certificate. The constrained network entity may determine whether to establish the secure channel with the endpoint based on the validity of the certificate.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: October 3, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Lawrence Case, Yogendra C Shah, Inhyok Cha
  • Patent number: 9780947
    Abstract: There is provided a computer program which, when executed by a processor of an information processing device, causes the processor to function as a secret splitting module and a control module. The secret splitting module is configured to recover secret data from at least two pieces of split data using secret splitting and the control module is configured to control reading out or writing each piece of the split data. Secret data is maintained within a virtual drive. The control module is further configured to read out first split meta-data from a first storage device, read out second split meta-data from a second storage device, cause the secret splitting module to recover virtual drive meta-data at least from the first and second split meta-data, and generate the virtual drive based on the recovered virtual drive meta-data. Corresponding method and system are also provided.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: October 3, 2017
    Assignee: ZenmuTech, Inc
    Inventor: Kiyoshi Tomomura
  • Patent number: 9773431
    Abstract: A secure microcontroller system comprising an integrated cache sub-system, crypto-engine, buffer sub-system and external memory is described according to various embodiments of the invention. The secure microcontroller incorporates block encryption methods to ensure that content communicated between the integrated microcontroller and external memory is protected and real-time performance of the system is maintained. Additionally, the microcontroller system provides a user-configurable memory write policy in which memory write protocols may be selected to balance data coherency and system performance.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: September 26, 2017
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Edward Tang Kwai Ma, Stephen N. Grider
  • Patent number: 9773432
    Abstract: One embodiment provides an apparatus. The apparatus includes a lightweight cryptographic engine (LCE), the LCE is optimized and has an associated throughput greater than or equal to a target throughput.
    Type: Grant
    Filed: June 27, 2015
    Date of Patent: September 26, 2017
    Assignee: Intel Corporation
    Inventors: Santosh Ghosh, Li Zhao, Manoj R. Sastry
  • Patent number: 9767281
    Abstract: A device for processing data, the device having an input interface for receiving input data and a processing module for processing data, characterized in that an encoding unit is provided, which is configured to encode data words received at the input interface as input data, in order to obtain encoded data words; measured values characterizing the encoded data words and/or their processing by the device being ascertainable for encoded data words as a function of at least one physical variable of the device; the encoding unit being configured to encode the data words in such a manner, that a specifiable proportion of all measured values, which may be at least approximately 50% of all measured values, exhibit a difference from the setpoint value, which is less than or equal to a specifiable threshold value; and the processing module is configured to process the encoded data words.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: September 19, 2017
    Assignee: ROBERT BOSCH GMBH
    Inventors: Matthew Lewis, Robert Szerwinski, Jamshid Shokrollahi, Paulius Duplys
  • Patent number: 9762578
    Abstract: A method of authenticating communications includes receiving, by a computer, a first set of credentials, verifying the first set of credentials by comparing the first set of credentials to a plurality of sets of credentials stored in a database, subsequent to verifying the first set of credentials, deriving a second set of credentials, and transmitting notification of the second set of credentials to a remote computer.
    Type: Grant
    Filed: October 25, 2010
    Date of Patent: September 12, 2017
    Assignee: SCHNEIDER ELECTRIC IT CORPORATION
    Inventors: Gregory M. Emerick, Paul J. Gifford
  • Patent number: 9761040
    Abstract: A new hardware architecture defines an indexing and encoding method for accelerating incoherent ray traversal. Accelerating multiple ray traversal may be accomplished by organizing the rays for minimal movement of data, hiding latency due to external memory access, and performing adaptive binning. Rays may be binned into coarse grain and fine grain spatial bins, independent of direction.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: September 12, 2017
    Assignee: Raycast Systems, Inc.
    Inventor: Alvin D. Zimmerman
  • Patent number: 9762849
    Abstract: In order to solve the problems described above, the present invention employs a PSF restoring means and an image restoring means, implemented in software or hardware, for executing a plurality of iterations of real-number-based computations based on Bayse probability theory by using, as input information, a PSF luminance distribution identified according to a degree of degradation of TV video, a luminance distribution of a degraded image constituted of Y (luminance) components of the TV video, and an estimated luminance distribution of restored-image initial values. With these means, an estimated luminance distribution of a restored image having a maximum likelihood for the luminance distribution of the degraded image is obtained, and the estimated luminance distribution is substituted for the Y components of the TV video obtained by extracting the luminance distribution of the degraded image. Accordingly, TV video that approximates the pre-degradation state is provided substantially in real time.
    Type: Grant
    Filed: November 27, 2014
    Date of Patent: September 12, 2017
    Assignee: Lightron International Co., Ltd.
    Inventor: Mitsuo Eguchi
  • Patent number: 9755829
    Abstract: Method for generating a pair of public and private cryptographic keys in the additive group of integers modulo n, where n is the product of two prime numbers p and q, the method including the following steps: calculating a public exponent e for said public key, and calculating a private exponent d for said private key from said public exponent and said public modulus, where d·e=1 mod ?(n), ?(n) being the least common multiple between p-1 and q-1, characterized in that the method furthermore comprises a step: of checking to check that ?(n)=0 mod (p-1) and ?(n)=0 mod (q-1).
    Type: Grant
    Filed: December 16, 2014
    Date of Patent: September 5, 2017
    Assignee: OBERTHUR TECHNOLOGIES
    Inventors: Alberto Battistello, Christophe Giraud
  • Patent number: 9756504
    Abstract: A security authentication method, device, and system are provided. A first device and a second device perform security authentication by using a first mapping key and a second mapping key, where the first mapping key is generated according to an initial key of the first device and a first predetermined algorithm, the second mapping key is generated according to an initial key of the second device and the first predetermined algorithm. A device in embodiments of the present invention performs security authentication by using a mapped initial key, which can increase the difficulty for an attacker to acquire a key, thereby improving security of a wireless network connection.
    Type: Grant
    Filed: July 6, 2015
    Date of Patent: September 5, 2017
    Assignee: HUAWEI DEVICE CO., LTD.
    Inventors: Gaokun Pang, Zhiming Ding
  • Patent number: 9749865
    Abstract: Provided are a method and apparatus for managing a beacon device. More particularly, a beacon management server is connected with the beacon device through a communication network and configured to periodically updates and manages a valid period of the beacon device. The beacon device initializes itself by autonomously deleting beacon information stored therein when the beacon device has been disconnected from the beacon management server for a certain time or more. Thus, the beacon device may be managed through the beacon management server. An operation of the beacon device may be controlled even when the beacon device is lost, thereby preventing illegal use of the beacon device by controlling a beacon signal that is transmitted even after the beacon device is lost. In addition, the beacon management server may verify the validity of the beacon device to give security to the beacon device and periodically update the valid period, thereby allowing efficient use of the beacon device.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: August 29, 2017
    Assignee: SK PLANET CO., LTD.
    Inventor: SeungHoon Moon
  • Patent number: 9749133
    Abstract: A method of secure communication in a transmitter, includes determining a method of generating a training sequence that is shared with a receiver. The method further includes generating the training sequence based on the method of generating the training sequence, and secret information. The method further includes communicating with the receiver based on channel information derived from the training sequence.
    Type: Grant
    Filed: June 25, 2013
    Date of Patent: August 29, 2017
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Mi Suk Huh, Jong Bu Lim, Kyung Hun Jang
  • Patent number: 9749135
    Abstract: From the least significant bit of the current secret key, k bits are retrieved, obtaining a binary window sequence. A binary bit string of concatenation of the random number to the more significant bits of the window sequence is obtained if the most significant bit of the window sequence is 0, subtracting a bit string from the current secret key to obtain a new secret key, or the bit string of a complement of the base number for the window sequence in binary system is calculated if the most significant bit of the window sequence is 1, obtaining a bit string by adding a minus sign to a bit string obtained by concatenating the random number to the more significant bits of the bit string, subtracting the bit string from the current secret key to obtain a new secret key.
    Type: Grant
    Filed: June 23, 2016
    Date of Patent: August 29, 2017
    Assignee: FUJITSU LIMITED
    Inventors: Jun Yajima, Kouichi Itoh, Masahiko Takenaka, Dai Yamamoto
  • Patent number: 9749302
    Abstract: In a method for securely collecting sensitive information, a first key entry made via a user interface is detected. Moreover, information is received via a secure communication channel from a remote server, where the information includes at least a current value of a first layer identifier. Using the current value of the first layer identifier, a bit string corresponding to the first key entry is determined. Using the bit string, at least a portion of a data string is generated. The data string is caused to be stored in a local memory and/or transmitted to another device via a network.
    Type: Grant
    Filed: October 7, 2016
    Date of Patent: August 29, 2017
    Assignee: Charter Communications Operating, LLC
    Inventors: Rodney Allen Copeland, Jay Eric Carlson, Michael David Hanrahan, Christopher Scott Alcott
  • Patent number: 9740456
    Abstract: Galois-field reduction circuitry for reducing a Galois-field expansion value, using an irreducible polynomial, includes a plurality of memories, each for storing a respective value derived from the irreducible polynomial and a respective combination of expansion bit values, wherein expansion bits of the expansion value address the plurality of memories to output one or more of the respective values. The Galois-field reduction circuitry also includes exclusive-OR circuitry for combining output of the plurality of memories with in-field bits of said expansion value. There are also a method of operating such Galois-field reduction circuitry to reduce a Galois-field expansion value, a programmable integrated circuit device incorporating the circuitry, a method of performing a Galois-field multiplication operation on such a programmable integrated circuit device, and a method of configuring a programmable integrated circuit device to perform such a Galois-field multiplication operation.
    Type: Grant
    Filed: April 23, 2015
    Date of Patent: August 22, 2017
    Assignee: Altera Corporation
    Inventor: Pohrong Rita Chu
  • Patent number: 9735953
    Abstract: A distributed technique for implementing a cryptographic process performs operations in parallel on both valid and irrelevant data to prevent differentiation of the operations based on an encryption key content. A control entity switches or points valid data to appropriate CPU(s) that are responsible for operations such as squaring or multiplying. Irrelevant data is also switched or pointed to appropriate CPU(s) that execute operations in parallel with the CPU(s) operating on the valid data. The distributed technique contributes to obscuring side channel analysis phenomena from observation, such that cryptographic operations cannot easily be tied to the content of the encryption key.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: August 15, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Olivier Jean Benoit, Rosario Cammarota
  • Patent number: 9729323
    Abstract: In one embodiment, it is proposed a method of cryptographic processing of data, the method being executed by an electronic device, and comprising obtaining at least two points belonging to a same elliptic curve defined on an algebraic structure being a finite ring, each point being represented by at least two coordinates.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: August 8, 2017
    Assignee: Thomson Licensing
    Inventors: Marc Joye, Raveen Goundar
  • Patent number: 9729310
    Abstract: A system and method for providing a scrambled counter mode encryption for a device that mitigates the effect of side channel attacks based on differential power analysis (DPA). The scrambled counter mode encryption engine creates noise at the start of the encryption process by obfuscating the counter value with the use of the very fast mixing function, such as a mixing function based on a XOR tree, substitution-permutation networks, or double-mix Feistel networks. The mixing function uses some secret key material, which diversifies its behavior between different instantiations. Because the counter values are scrambled and the mixing functions operate very fast in parallel hardware, the input of the block cipher is pseudorandom and groups of blocks can't be correlated. The output of the block cipher is XORed with a plaintext message to obtain a cipher text message.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: August 8, 2017
    Assignee: The Boeing Company
    Inventors: Laszlo Hars, Donald P. Matthews, Jr.
  • Patent number: 9727720
    Abstract: Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: August 8, 2017
    Assignee: Certicom Corp.
    Inventor: Robert John Lambert
  • Patent number: 9722787
    Abstract: A method of configuring a network device for key sharing and a method for a first network device to determine a shared key are provided. The method of configuring uses a private modulus (p1) a public modulus (N), and a bivariate polynomial (f1) having integer coefficients, the binary representation of the public modulus and the binary representation of the private modulus are the same in at least key length (b) consecutive bits. Local key material for a network device is generated by substituting an identity number into the bivariate polynomial and reducing modulo the private modulus the result of the substitution to obtain a univariate polynomial. Security may be increased by adding (440) one or more obfuscating numbers to coefficients of the univariate polynomial to obtain an obfuscated univariate polynomial.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: August 1, 2017
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Jaime Gutierrez, Sandeep Shankaran Kumar, Domingo Gomez
  • Patent number: 9720957
    Abstract: According to an aspect of the invention, an aggregator node is conceived for use in a network, wherein said aggregator node is arranged to aggregate encrypted data, and wherein said aggregator node comprises a secure element which is arranged to perform the aggregation of the encrypted data in a secure manner.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: August 1, 2017
    Assignee: NXP B.V.
    Inventors: Timotheus Arthur van Roermund, Maarten Christiaan Pennings, Hugh Maaskant