Particular Algorithmic Function Encoding Patents (Class 380/28)
  • Patent number: 9973334
    Abstract: One embodiment of the invention includes a method, including performing, a symmetric homomorphic encryption of a secret SA with a cryptographic key H as input yielding a homomorphic encryption result SA*, sending SA* for mathematical combination by at least one device with at least one secret SB yielding G*, the device A not having access to SB, the at least one device not having access to SA and not having access to H, receiving G*, performing a symmetric homomorphic decryption of data based on G* with H as input yielding a first decrypted output, determining a symmetric cryptographic key KA based on the first decrypted output for secure communication with a first device which is operationally connected to, or includes, a tamper resistant security system including SA and SB therein, securing data using KA yielding secured data, and sending the secured data to the first device.
    Type: Grant
    Filed: March 13, 2016
    Date of Patent: May 15, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Eliphaz Hibshoosh, Aviad Kipnis, Andrew Sinton
  • Patent number: 9973336
    Abstract: A hash value generating device for generating a hash value based on the KECCAK algorithm includes a ? processing unit, a ? processing unit, a ? processing unit, a ? processing unit, and an processing unit for performing processing of five steps ?, ?, ?, ?, and included in round processing of the KECCAK algorithm. The ? processing unit receives input of data in units of planes and outputs data in units of sheets.
    Type: Grant
    Filed: February 17, 2014
    Date of Patent: May 15, 2018
    Assignee: Canon Kabushiki Kaisha
    Inventors: Seiga Karaki, Shinya Yamada
  • Patent number: 9967096
    Abstract: A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held by a trusted party. The blockchains may include a series of blocks secured by a chameleon hash that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret. Rewrite circuitry of the system may determine randomness data from the chameleon hash and altered data from a rewrite. The randomness data may be written to the randomness field of a block overwritten with the altered data such that the block remains coding-consistent with the chameleon hash and other blocks in the blockchain.
    Type: Grant
    Filed: May 16, 2017
    Date of Patent: May 8, 2018
    Assignee: Accenture Global Solutions Limited
    Inventors: Giuseppe Ateniese, Michael T. Chiaramonte, David Treat, Bernardo Magri, Daniele Venturi
  • Patent number: 9967088
    Abstract: A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held by a trusted party. The blockchains may include a series of blocks secured integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret. In some cases, the key may allow valid but tamper-evident rewrites of the blockchain by trusted entities. Integrity outputs may be generated from the integrity codes based on the content of the previous blocks in the series such that attempts by untrusted parties to replace a block may be detected through coding-inconsistencies with other blocks.
    Type: Grant
    Filed: May 16, 2017
    Date of Patent: May 8, 2018
    Assignee: Accenture Global Solutions Limited
    Inventors: Giuseppe Ateniese, Michael T. Chiaramonte, David Treat, Bernardo Magri, Daniele Venturi
  • Patent number: 9965639
    Abstract: Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a compound key, which is composed of a set of unique keys generated from a source file. A set of files are separately build based on a received source code, and a key generated and embedded into the files at the time of the build. A validation tool is used to compare the values of the generated compound key to the values of the embedded key to determine if the values match.
    Type: Grant
    Filed: July 17, 2015
    Date of Patent: May 8, 2018
    Assignee: International Business Machines Corporation
    Inventors: Badekila Ganesh Prashanth Bhat, Nageswararao V. Gokavarapu, John Kurian, Raghavendran Srinivasan
  • Patent number: 9959586
    Abstract: The present disclosure describes a system, method, and computer program for encoding and decoding a unique signature for a user in a video file, wherein the digital signature is substantially invisible to the viewer of the video, easy to detect during the coding process, does not require specialized equipment for playback of the video, and is resilient to transcoding, video editing, and high compression encoding. A numeric digital signature is converted into a binary number. The binary number is then divided into sequences, where sequence includes a subset of data bits from the binary number. Each sequence is also associated with a sequence ID that enables the data bits in the sequence to be later combined in the correct order to recreate the binary number. A watermark is created for each of the sequences and embedded within suitable areas of a color channel.
    Type: Grant
    Filed: December 13, 2016
    Date of Patent: May 1, 2018
    Assignee: GoAnimate, Inc.
    Inventors: Tang Fei Yu, Omar Rabbolini
  • Patent number: 9953184
    Abstract: The techniques discussed herein facilitate the transmission, storage, and manipulation of data in an encrypted database management system (EDBMS). An untrusted machine is connected to a data store having encrypted records, a client machine that sends encrypted queries, and a trusted machine that receives and decrypts the encrypted records and encrypted queries. The trusted machine processes the query using semantically secure query operators to produce a query result. The trusted machine ensures the size of the query result conforms to an upper bound on the number or records in the query result and returns the query result.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: April 24, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Arvind Arasu, Kenneth Hiroshi Eguro, Ravishankar Ramamurthy, Kaushik Shriraghav
  • Patent number: 9953312
    Abstract: A wearable device including a touchscreen; a wireless communication unit configured to communicate with an external terminal including an electronic wallet (SE, Secure Element), the external terminal wirelessly linked with the wearable device; and a controller configured to receive a preset user gesture, receive information relating to an account of the electronic wallet (SE) from the external terminal in response to the preset user gesture, display the received information on the touchscreen, and process an NFC (Near Field Communication) payment using the information displayed on the touchscreen.
    Type: Grant
    Filed: October 14, 2014
    Date of Patent: April 24, 2018
    Assignee: LG ELECTRONICS INC.
    Inventor: Dongju Lee
  • Patent number: 9946662
    Abstract: A method of providing security in a computer system includes dividing a block of data into initial left and right halves, and calculating updated left and right halves for each of a plurality of rounds. Calculating the updated left half includes applying a first function to an input left half to produce a first result, and mixing the first result with an input right half. Calculating the updated right half includes applying a second function to the input left half to produce a second result, and mixing the second result with a round key. The input left and right halves are the initial left and right halves for the first round, and thereafter the updated left and right halves for an immediately preceding round. And method may include producing a block of ciphertext with a key composed of the updated left and right halves for the last round.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: April 17, 2018
    Assignee: THE BOEING COMPANY
    Inventor: Laszlo Hars
  • Patent number: 9948463
    Abstract: Multivariate public key signature/verification system including a signature module and a verification module. The signature module contains a processor, first affine transformation inversion component, isomorphic inversion component, trapdoor component, isomorphic component, and second affine transformation inversion component. Corresponding computations are executed sequentially by the components on a message to be signed; solutions are generated after being processed by the trapdoor component; one solution is selected randomly and transmitted to the isomorphic component and second affine component for processing, and a signature generated is transmitted with the message to the processor. The verification module contains the processor and a public key transformation component. The signature is transmitted by the processor to the transformation component and substituted into each multivariate polynomial in a public key mapping.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: April 17, 2018
    Assignee: SOUTH CHINA UNIVERSITY OF TECHNOLOGY
    Inventors: Shaohua Tang, Wuqiang Shen
  • Patent number: 9935951
    Abstract: A remote data protection network provides a blind hashing service. A blind hashing server receives a message such as a digest from a client, and uses the message to derive a set of indices or offsets into a huge block of random data that is maintained by the remote data protection network. The corresponding extents of data in the block are combined, e.g. using a hash or HMAC function, and then returned to the invoking client, e.g. as a salt. The message and response may be salted with a unique client salt.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: April 3, 2018
    Assignee: Taplink, Inc.
    Inventor: Jeremy Spilman
  • Patent number: 9928370
    Abstract: According to an embodiment, a communication device includes an acquirer and a determiner. The acquirer is configured to acquire a first history value for each of one or more applications that use an encryption key. The first history value indicates a history value of a volume of the encryption key used by the each of one or more applications. The determiner is configured to determine a volume of the encryption key to be assigned to the corresponding application, according to the first history value.
    Type: Grant
    Filed: February 20, 2014
    Date of Patent: March 27, 2018
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yoshimichi Tanizawa, Hideaki Sato, Ririka Takahashi, Shinichi Kawamura, Shinya Murai
  • Patent number: 9929862
    Abstract: An optimized hardware architecture and method introducing a simple arithmetic processor that allows efficient implementation of an Elliptical Curve Cryptography point doubling algorithm for Jacobian coordinates. The optimized architecture additionally reduces the required storage for intermediate values.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: March 27, 2018
    Assignee: NXP B.V.
    Inventors: Miroslav Knezevic, Ventzislav Nikov
  • Patent number: 9923719
    Abstract: Encrypted data transmitted from a second entity to a first entity may be received. The encrypted data may be encrypted by a location based public key based on a public key and a location associated with the second entity. A location associated with the first entity may be identified. A location based private key may be generated based on a private key that corresponds to the public key and the location associated with the first entity. Furthermore, the encrypted data may be decrypted with the location based private key when the location associated with the first entity matches the location associated with the second entity.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: March 20, 2018
    Assignee: Cryptography Research, Inc.
    Inventors: Ambuj Kumar, Mark Evan Marson, Daniel Robert Beitel
  • Patent number: 9922720
    Abstract: In accordance with some embodiments, the way in which the fuses are sensed and, particularly, their order may be made more random so that it is much more difficult to simply exercise the device and determine all the values of the storage elements within the fuse array. One result is a more secure storage device.
    Type: Grant
    Filed: March 7, 2013
    Date of Patent: March 20, 2018
    Assignee: Intel Corporation
    Inventors: Jason G. Sandri, Horaira Abu, Charles A. Peterson, Matthew B. Pedersen, Brian Harris, Ian S. Walker, Monib Ahmed
  • Patent number: 9917695
    Abstract: A computer-implemented authenticated encryption method for converting a plaintext message into a ciphertext message. The method includes dividing the plaintext message into at least two working blocks, each working block having a mathematical relationship to the plaintext message. For each working block, a working block ciphertext is computed as a function of such working block, a deterministic working block initialization vector, and a deterministic working block encryption key. For each working block, a message authentication tag is computed as a function of a deterministic working block message authentication key and at least one of (a) the working block ciphertext computed for such working block and an indication corresponding to the mathematical relationship of such working block to the plaintext message and (b) such working block.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: March 13, 2018
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Atsushi Yamada, Gregory Marc Zaverucha
  • Patent number: 9917828
    Abstract: An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When a sender in one organization sends a message to a recipient in another organization, the federation server provides the sender's email server with a secure token for encrypting the message to provide secure delivery over the unsecured network.
    Type: Grant
    Filed: May 6, 2014
    Date of Patent: March 13, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Frank Byrum, Mayank Mehta, Chandresh Jain, Ladislau Conceicao, Brian Kress, Greg Gourevitch, Michael Nelte, Chris Barnes
  • Patent number: 9910792
    Abstract: A processing system includes a memory and a cryptographic accelerator operatively coupled to the memory. The cryptographic accelerator performs a split substitute byte operation within two paths of a cryptographic round by determining a first output from a first path by applying a mapped affine transformation to an input bit sequence represented by an element of a composite field of a finite-prime field, wherein the first output is represented by a first element of the composite field of the finite-prime field, and a second output from a second path by applying a scaled mapped affine transformation to the input bit sequence, wherein the second output is represented by a second element of the composite field and is equal to a multiple of the first output in the composite field.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: March 6, 2018
    Assignee: Intel Corporation
    Inventors: Sudhir K. Satpathy, Sanu K. Mathew, Vikram B. Suresh
  • Patent number: 9910971
    Abstract: Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed.
    Type: Grant
    Filed: January 12, 2016
    Date of Patent: March 6, 2018
    Assignee: IRDETO B.V.
    Inventors: Harold Joseph Johnson, Yuan Xiang Gu, Yongxin Zhou
  • Patent number: 9910856
    Abstract: Information source agent systems and methods for distributed content storage and management using content signatures that use file identicality properties are provided. A data management system is provided that includes a content engine for managing the storage of file content, a content signature generator that generates a unique content signature for a file processed by the content engine, a content signature comparator that compares content signatures and a content signature repository that stores content signatures. Information source agents are provided that include content signature generators and content signature comparators. Methods are provided for the efficient management of files using content signatures that take advantage of file identicality properties. Content signature application modules and registries exist within information source clients and centralized servers to support the content signature methods.
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: March 6, 2018
    Assignee: Callahan Cellular L.L.C.
    Inventors: Bruce Borden, Russell Brand
  • Patent number: 9906506
    Abstract: A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: February 27, 2018
    Assignee: Wickr Inc.
    Inventors: Christopher Howell, Robert Statica, Kara Lynn Coppa
  • Patent number: 9900153
    Abstract: A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In some examples, the plaintext and cryptographic key are input into an effectively one-way function, such as a cryptographic hash function, the output of which is usable as an initialization vector. Cryptographic keys may be rotated probabilistically based at least in part on probabilities of output collisions of the effectively one-way function to ensure a low probability of two different plaintexts resulting in calculation of the same initialization vector for use with the same cryptographic key.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: February 20, 2018
    Assignee: Amazon Technologies, Inc.
    Inventor: Matthew John Campagna
  • Patent number: 9898623
    Abstract: An encryption method includes accessing a look-up table (LUT) to implement countermeasures against side-channel attacks, such as embedding masks. The LUT is initialized by writing initialization values in the LUT by applying an address-mask to input data that identify a location of said LUT and a data-mask to data to be stored at a location of the LUT. The method includes carrying out an initialization of the LUT that includes providing at least one second address-mask and one second data-mask; and computing corresponding initialization values as a function of a logic combination of the aforesaid first address-mask and second address-mask and of a logic combination of the aforesaid first data-mask and second data-mask. In the resulting table the address data are masked only by the second address-mask and the data are masked only by the second data-mask. The structure of the LUT may allow convenient implementation by initializing all the values of the LUT in parallel in one cycle.
    Type: Grant
    Filed: March 18, 2015
    Date of Patent: February 20, 2018
    Assignee: STMICROELECTRONICS S.R.L.
    Inventor: Filippo Melzani
  • Patent number: 9892275
    Abstract: Various embodiments of systems, computer program products, and methods for encrypting data in a multi-tenant cloud environment are described herein. In an aspect, an encryption time frame to encrypt data associated with a user in a multi-tenant cloud environment may be retrieved. Based on the encryption time frame, a list of object types to be encrypted may be identified. A batch encryption period may be determined for encrypting data corresponding to the list of object types. Further, batches are sequentially selected based on the batch encryption period, for a selected batch: one or more data records may be retrieved based on the batch encryption period and the one or more data records may be encrypted in groups based on at least one throttling value.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: February 13, 2018
    Assignee: SAP SE
    Inventors: Vipul Gupta, Balaji Raghunathan, Darpan Dinker
  • Patent number: 9886597
    Abstract: The invention relates to a data-processing method that includes encoding a plurality of data of n bits into code words having a predefined constant Hamming weight, characterized in that said method also includes using (4000) encryption operations or arithmetic operations on the resulting code word(s) and also in that encoding each datum includes: decomposing (100) the datum into a plurality of m bit sequences to be encoded, m strictly being less than n; encoding (300) each bit sequence into a partial code word, each having a predefined Hamming weight, such that the sum of the Hamming weights of the partial code words are equal to the Hamming weights of the code word; and concatenating (300) the partial code words such as to produce the code word corresponding to the datum. The invention also relates to a data transmission method and to an electronic circuit configured to implement said methods.
    Type: Grant
    Filed: January 17, 2014
    Date of Patent: February 6, 2018
    Assignee: MORPHO
    Inventors: Julien Bringer, Victor Servant
  • Patent number: 9887996
    Abstract: Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user receiving a communication from an entity. In response to receiving the communication from the entity, the method further includes generating a token. The token may be a one-time passcode, personal identification number (PIN), alphanumeric value, code word, pass phrase, or security question. The token is received by a device of the user. Additionally, the token is transmitted to the entity. The user may then receive evidence of the token from the entity.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: February 6, 2018
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Christopher Phillip Clausen, Lisa Michelle Lepage, Darrell Lee Suen, Jeffrey A. Cornman
  • Patent number: 9882712
    Abstract: An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data is divided by segmenting unit and that is registered with a storage device and a second encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data to be matched is divided by segmenting unit, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that takes a difference between the first and second encrypted text, and determines whether a Hamming distance between plaintexts that corresponds to the difference between the first and second encrypted text is equal to or less than a predetermined certain value.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: January 30, 2018
    Assignee: NEC CORPORATION
    Inventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
  • Patent number: 9880960
    Abstract: A configurable sponge function engine. The configurable engine includes a state register having bitrate and capacity sections, each having a variable size, where a sum of the bitrate and capacity sizes is fixed. A controller generates a bitrate size indication. A configurable message processor receives an input message from an input bus, receives the size indication, fragments the input message into fragmented blocks of a size specified by the size indication, and converts the blocks to a bus width of the bitrate and capacity sizes. An iterative calculator receives the blocks, performs iterative processing operations on the blocks, and stores a result of each operation in the state register overwriting a previous register value. An output adaptor receives a value stored in the state register after the block corresponding to the end of the input message is processed and outputs the register value converted to have an output bus width.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: January 30, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Ron Diamant, Ori Weber, Omer Shaked
  • Patent number: 9875370
    Abstract: Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA). A parameterized query is received by the DS from the DA based on a user query received from a requestor. The DS analyzes the parameterized query to attempt to determine an encryption configuration for a transformed version of the user query capable of being evaluated by the DS on encrypted data values. The DS responds to the DA with either a failure to determine the encryption configuration, or by providing the determined encryption configuration to the DA. The DA generates the transformed version of the user query, and provides the transformed version to the DS. The DS evaluates the transformed version of the user query, and provides results to the DA. The DA decrypts the results, and provides the decrypted results to the requestor.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: January 23, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Panagiotis Antonopoulos, Ajay S. Manchepalli, Kapil Vaswani, Haohai Yu, Michael James Zwilling
  • Patent number: 9875193
    Abstract: A method (and structure) protects confidentiality and integrity of information in a secure object from other software on the system. An object-id value that identifies software currently executing on a CPU (Central Processing Unit) is stored, the value having a predetermined standard value when software that is not a secure object is executing. Each block of information in the cache is associated with an ownership value that is used to store an identification of the software that owns the information in the block. When software attempts to access information in one of the blocks, the object-id of the currently executing software is compared with the ownership value associated with the block being accessed. Access to the block is allowed if the object-id of the currently executing software matches the ownership value of the block.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: January 23, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Richard Harold Boivie
  • Patent number: 9875375
    Abstract: A similar-information search method includes receiving, with a data computation device, an encrypted feature quantity and an encrypted similarity value from a user terminal device; calculating, with the data computation device, an encrypted distance between an encrypted reference feature quantity and the encrypted feature quantity; determining, with the data computation device, whether the encrypted distance matches the encrypted similarity value; generating, with the data computation device, encrypted reference data that is information obtained by encrypting reference data if it is determined that the encrypted distance matches the encrypted similarity value; and transmitting, with the data computation device, the generated encrypted reference data to the user terminal device.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: January 23, 2018
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Natsume Matsuzaki, Yuji Unagami
  • Patent number: 9871652
    Abstract: A computer generates a third encrypted polynomial that corresponds to a result of encrypting a third polynomial by use of a result of multiplying a first encrypted polynomial by a second encrypted polynomial, and outputs cryptographic information that represents the third encrypted polynomial. The first encrypted polynomial is a polynomial obtained by encrypting a first polynomial that corresponds to a first vector, and the second encrypted polynomial is a polynomial obtained by encrypting a second polynomial that corresponds to a second vector. The third polynomial includes a first term that has a coefficient based on an inner product of the first vector and the second vector and a second term other than the first term, in which a coefficient of the second term is masked.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: January 16, 2018
    Assignee: FUJITSU LIMITED
    Inventors: Ikuya Morikawa, Masaya Yasuda
  • Patent number: 9866371
    Abstract: A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: ?f(X1(t))·f(X2(t))=U(t)2 in the finite body Fq, irrespective of the parameter t, q=3 mod 4. A value of the parameter t is obtained and the point P is determined by: (i) calculating X1=X1 (t), X2=X2(t) and U=U(t); (ii) testing whether the term f(X?1) is a squared term in the finite body Fq and, if so, calculating the square root of the term f(X1), the point P having X1 as abscissa and Y1, the square root of the term f(X1), as ordinate; (iii) otherwise, calculating the square root of the term f(X2), the point P having X2, as abscissa and Y2, the square root of the term f(X2), as ordinate. The point P is useful in encryption, scrambling, signature, authentication or identification cryptographic applications.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: January 9, 2018
    Assignee: MORPHO
    Inventor: Thomas Icart
  • Patent number: 9860055
    Abstract: A method of implementing large number multiplication and exponentiation is provided upon a general purpose microprocessor. These large number multiplication and exponentiation processes being common to cryptography standards such as RSA and AES that typically employ numbers with 512-bits, 1024-bits, and 2048-bits. According to the invention the method establishes the size of the large number processes according to value stored within a control register, this control register and other registers storing data are configured according to this value and accessed as N-bit registers (i.e. as 1024-bit registers for 1024-bit encryption. Additionally, the multiplication and exponentiation processes are handled according to the size of an arithmetic primitive, which is established according to the hardware configuration upon which the process is operating.
    Type: Grant
    Filed: March 22, 2007
    Date of Patent: January 2, 2018
    Assignee: Synopsys, Inc.
    Inventors: Neil F. Hamilton, Arthur J. Low
  • Patent number: 9860058
    Abstract: Each of at least three arithmetic units includes: a random number generator determining shared value [r] obtained by performing secret sharing of random number r; a randomizator using shared value [a0], . . . , [aM?1] obtained by performing secret sharing of value a0, . . . , aM?1 and shared value [r] to generate randomized shared value <a0>, . . . , <aM?1> with shared values [a0], . . . , [aM?1] and [a0r], . . . , [aM?1r] as a pair; a secret computator determining concealed function value [F([a0], . . . , [aM?1])] by executing function F including at least one secret operation while including randomized shared value <fi> of an operation target and an operation result depending on contents of secret operation into checksum C:=<f0>, . . . , <f??1>; and a correctness prover verifying correctness of function value [F([a0], . . .
    Type: Grant
    Filed: January 16, 2014
    Date of Patent: January 2, 2018
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida
  • Patent number: 9851948
    Abstract: Disclosed is a method for implementing precomputation of a large number in an embedded system. A modulo module, a modulo adding module, and a Montgomery modular multiplier are invoked according to a data format of a modulus length and a value of each data bit of a binary number corresponding to the modulus length, to perform an iterative operation, so that a precomputation result of a large number can be obtained when the modulus length is an arbitrary value, thereby improving the data processing speed.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: December 26, 2017
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 9852419
    Abstract: Methods and systems are disclosed for providing Near Field Communications. In certain embodiments, an Android mobile operating system based mobile device is configured with software that, when executed by one or more processors, determines whether the mobile device is to perform an NFC communication with a contactless payment terminal (CPT) using a secure element associated with an NFC controller included in the mobile device. Based on the determination, the mobile device is configured to execute software that performs communications with the CPT using the NFC controller.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: December 26, 2017
    Assignee: Capital One Financial Corporation
    Inventor: Panayiotis Varvarezis
  • Patent number: 9846785
    Abstract: A querying node generates public keys, secret keys, and switch key matrices. A public key associated with a first level and the switch key matrices are sent to a receiving node. The receiving node generates a key-value table, mapping values to keys, and encodes the keys and values using a polynomial ring of a predetermined type. The querying node encodes using a polynomial ring of the same predetermined type, then encrypts a query, using a public key, and sends the query to the receiving node. The receiving node performs a homomorphic comparison of the encrypted, encoded query with each encoded key entry in the encoded key-value store to determine a comparison result. The receiving node sums the results for each of the value entries and returns the summed result to the querying node. The querying node decrypts and decodes the received result using the corresponding secret key.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: December 19, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David F. Bacon, Graham A. Bent, Flavio A. Bergamaschi, Wei Zhang
  • Patent number: 9847877
    Abstract: Methods and apparatus are provided for generating a secret cryptographic key of a user computer connectable to a server via a network. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. The user computer encodes the secret user value and an input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first and the check values to check whether the input password equals the user password. If so, the server encodes the first and the secret server values to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: December 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jan Camenisch, Robert Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Patent number: 9843441
    Abstract: Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and an accumulator. The substitution box is to perform a substitution operation on one byte per clock cycle. The accumulator is to accumulate four bytes and perform a mix-column operation in four clock cycles. The encryption unit is implemented using optimum Galois Field polynomial arithmetic for minimum area.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: December 12, 2017
    Assignee: Intel Corporation
    Inventors: Sanu Mathew, Vikram Suresh, Sudhir Satpathy, Mark Anders, Himanshu Kaul, Ram Krishnamurthy
  • Patent number: 9838281
    Abstract: Methods, apparatus and articles of manufacture to monitor streaming media are disclosed. Example methods disclosed herein include combining first metering data extracted from first media included in a transport stream being sent to a media device with second metering data obtained independently of the first media to form combined metering data, the combined metering data not being decodable by a meter associated with the media device. Disclosed example methods also include transcoding the combined metering data to form transcoded metering data having a format decodable by the meter associated with the media device. Disclosed example methods further include encoding the transcoded metering data as metadata associated with the transport stream.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: December 5, 2017
    Assignee: The Nielsen Company (US), LLC
    Inventors: Jan Besehanic, Arun Ramaswamy
  • Patent number: 9838198
    Abstract: A method of performing a keyed cryptographic operation mapping an input message to an output message, wherein the input message comprises m input data and the output message comprises m output data and wherein the cryptographic operation includes at least one round and the cryptographic operation specifies a substitution box for mapping input data into output data, including: transforming each of the m input data into n output data using n split substitution boxes, wherein the n split substitution boxes sum to the specified substitution box; and mixing and combining the m×n output data.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: December 5, 2017
    Assignee: NXP B.V.
    Inventors: Wil Michiels, Jan Hoogerbrugge
  • Patent number: 9826395
    Abstract: A method implemented in a first user equipment (UE) includes generating a first intermediate address. The method further includes transmitting a data packet using the first intermediate address by (i) applying a first address mechanism to a first part of the first intermediate address, and (ii) applying a second address mechanism to a second part of the first intermediate address.
    Type: Grant
    Filed: March 13, 2015
    Date of Patent: November 21, 2017
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Pontus Wallentin, Fredrik Gunnarsson
  • Patent number: 9825946
    Abstract: A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of formatting templates, each template being associated with an account number length; receiving a selection indicating a specific primary account number; identifying a specific formatting template where the associated account number length corresponds to a length of the specific primary account number; receiving an unpredictable number from a point of sale device; generating a cryptogram based on at least the unpredictable number and one or more algorithms; generating a data string, wherein the data string includes at least the generated cryptogram, the specific primary account number, and the unpredictable number, and wherein the data string is formatted based on the identified specific formatting template; and electronically transmitting the generated data string to the point of sale device.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: November 21, 2017
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Mehdi Collinge, Michael Christopher Ward, Sandra Jansen
  • Patent number: 9813384
    Abstract: A method and apparatus for transmitting secure data packets through a node network. Unsecure data packets are received at a set of unsecure inputs and secure data packets are received at a number of secure inputs in a node in the node network. The secure data packets are authorized to be sent to a number of secure destination devices. The unsecure data packets are not authorized to be sent to the number of secure destination devices. The secure data packets and the unsecure data packets are integrated to form a number of output data streams based on a predetermined schedule. The number of output data streams is sent to a number of next nodes in the node network.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: November 7, 2017
    Assignee: THE BOEING COMPANY
    Inventors: Wayne R. Howe, Jeffrey H. Hunt, Angela Wai-an Li
  • Patent number: 9813725
    Abstract: The present disclosure describes a system, method, and computer program for encoding and decoding a unique signature for a user in a video file, wherein the video file was created using a video format that does not specifically support embedding a unique signature in the video file. A unique signature, comprising a plurality of data bits, is associated with a user and divided into groups. For each group, a different sine wave is created for each bit in the group. The frequencies of the sine waves correspond to the types of bits, and the amplitudes of the sine waves indicate the values of the bits. Group signals are overdubbed on the infrasound range of the audio track of the video file. The unique signature is decoded from the video file by analyzing the frequencies and amplitudes of sine waves in the infrasound range of the audio track.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: November 7, 2017
    Assignee: GoAnimate, Inc.
    Inventors: Tang Fei Yu, Omar Rabbolini
  • Patent number: 9799229
    Abstract: A method and apparatus for managing data in a platform. A first permission level is identified for first data in the data generated by a source in the platform. A second permission level is identified for an intended recipient of the first data. The first data is modified to form second data in the data in which the second data has the second permission level. The second data is distributed to the intended recipient.
    Type: Grant
    Filed: December 13, 2012
    Date of Patent: October 24, 2017
    Assignee: THE BOEING COMPANY
    Inventors: John Wokurka, Kenn R. Luecke, David K. Liefer
  • Patent number: 9800406
    Abstract: Generally, the present disclosure provides technology modifying a first cryptographic cipher with one or more operations of a second cryptographic cipher. In some embodiments the technology leverages a mathematical relationship between representations of data used in the first and second ciphers to enable the substitution of one or more operations of the first cipher with one or more operations of the second cipher. The resulting modified cipher may in some instances exhibit improved performance and or security, relative to the unmodified first cipher. Methods, computer readable media, and apparatus including or utilizing the technologies are also described.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: October 24, 2017
    Assignee: INTEL CORPORATION
    Inventor: Shay Gueron
  • Patent number: 9794068
    Abstract: A memory stores therein a first vector. A processor generates a first encrypted polynomial by encrypting a first polynomial that corresponds to a first binary vector obtained by performing a binary transformation on elements of the first vector. A transmitter transmits to a cryptographic operation device cryptographic information that represents the first encrypted polynomial. The cryptographic operation device multiplies the first encrypted polynomial by a second encrypted polynomial that is generated by encrypting a second polynomial that corresponds to a second binary vector obtained by performing a binary transformation on elements of a second vector, so as to generate a third encrypted polynomial. When assigning 2 to a variable in a prescribed portion of a third polynomial obtained by decrypting the third encrypted polynomial, a result of an operation of the first vector and the second vector is obtained.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: October 17, 2017
    Assignee: FUJITSU LIMITED
    Inventor: Masaya Yasuda
  • Patent number: 9788049
    Abstract: A multimedia signal processing system utilizes an easily manipulated, low-cost storage and display system that allows the user to view a television program and instantly review previous scenes within the program. The invention also allows the user to store selected programs while simultaneously watching or reviewing another. A versatile system architecture enables providing the invention in multiple configurations, each adapted to receive input signals from a different source. At the highest level, the system includes an input section and an output section. Across all configurations, the output section remains substantially the same, while the input section varies according to the signal type and the source. Thus, several configurations are provided, each one requiring only minor system board modifications. The system architecture thus simplifies the design and manufacturing challenge presented by producing units to serve different markets, such as digital satellite, digital cable and analog cable.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: October 10, 2017
    Assignee: TiVo Solutions Inc.
    Inventors: David Lockett, Kurtis G. Heaton, James M. Barton, Jean Swey Kao, Ching Tong Chow, Roderick James McInnis, Andrew Martin Goodman