Particular Algorithmic Function Encoding Patents (Class 380/28)
  • Patent number: 10706489
    Abstract: Even when an image in which a watermark is embedded is processed, certainty of detecting the watermark is increased. Image data acquisition unit of an image processing device acquires image data. A watermark generation unit generates watermarks having a plurality of sizes. An image processing unit embeds the respective watermarks having the plurality of sizes generated by the watermark generation unit in an image indicated by the image data acquired by the image data acquisition unit.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: July 7, 2020
    Assignee: RAKUTEN, INC.
    Inventor: Tony Tung
  • Patent number: 10699229
    Abstract: Described herein, is a method for user segmentation for cost-based deployment of enterprise infrastructure. According to an implementation, for each of the users, a user fingerprint (UFP) score set comprising rating scores that quantify levels of enterprise-level needs of the each user is determined. For each of deployment solutions of the enterprise, a deployment fingerprint (DFP) score set comprising rating scores that quantify levels of capabilities of the each deployment solution enabled to meet enterprise-level needs of the users is determined. The users are grouped into user segments based on the UFP score sets of the users. A definition of each of the user segments is determined. The definition is indicative of a user whose enterprise-level needs define characteristics of the corresponding user segment. A number of user segments is found based on a cost associated with the deployment solutions for the user segments.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: June 30, 2020
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Mohan Raj Velayudhan Kumar, Sandip Sadashiv Jadhav, Rahul Ramesh Kelkar, Harrick Mayank Vin
  • Patent number: 10700862
    Abstract: A method may include obtaining public keys for each user of a set of users, where each user is associated with a unique public key and a unique private key. The method may also include obtaining a designated set of users, where the designated set of users is a subset of the set of users. The method may additionally include generating, using the public keys, a digest associated with the designated set of users. The digest includes reduced data sets in a secure form, where each user of the set of users is associated with one of the reduced data sets that is indicative of whether the user is in the designated set of users, and the reduced data set is accessible using the private key of the user. The method may also include posting the digest to a location accessible from an electronic device of the user.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: June 30, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery
  • Patent number: 10692596
    Abstract: A health kiosk system is provided. A kiosk has a computing unit and a physiological measurement apparatus connected to the computing unit. A Web browser of the computing unit transmits information corresponding to the physiological measurement apparatus and a request for a resource to a Web server. In response to receiving the request, the Web server transmits to the kiosk profile-specific Web content responsive to the request and specific to the received profile information. The information corresponding to the physiological measurement apparatus may be transmitted in a URL or HTTP Cookie of an HTTP request.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: June 23, 2020
    Assignee: Mobile NewMedia Ltd.
    Inventors: Tejinder S. Randhawa, John Richards
  • Patent number: 10693720
    Abstract: In one embodiment, a computing device groups a plurality of devices into update clusters based at least on their connectivity layout, and divides update data into a plurality of update portions, distributing the plurality of update portions to a plurality of selected redistribution devices in the particular cluster (each receiving one or more of the portions). The computing device notifies devices in the particular cluster (that can use the update data) of the plurality of selected redistribution devices along with which particular update portions are available from each of the plurality of selected redistribution devices. This therefore causes (or allows) the devices needing an update to i) download needed update portions of the plurality of update portions from the redistribution devices, ii) combine all of the plurality of update portions into the update data, and iii) perform an update using the combined update data.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: June 23, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Jazib Frahim, Aun Raza, Erum Frahim
  • Patent number: 10686769
    Abstract: A first connection between a first network server and a second network server may be established where the first connection is based on a connection key stored at a secure location of the first network server. A request for one or more cryptographic keys may be transmitted from the first network server to the second network server. The first network server may receive the one or more cryptographic keys from the second network server over the first connection. The one or more cryptographic keys from the second server may be stored at the secure location of the first network server that is storing the connection key used to establish the first connection.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: June 16, 2020
    Assignee: FORTANIX, INC.
    Inventors: Anand Kashyap, Andrew Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman
  • Patent number: 10686591
    Abstract: Instructions and logic provide SIMD secure hashing round slice functionality. Some embodiments include a processor comprising: a decode stage to decode an instruction for a SIMD secure hashing algorithm round slice, the instruction specifying a source data operand set, a message-plus-constant operand set, a round-slice portion of the secure hashing algorithm round, and a rotator set portion of rotate settings. Processor execution units, are responsive to the decoded instruction, to perform a secure hashing round-slice set of round iterations upon the source data operand set, applying the message-plus-constant operand set and the rotator set, and store a result of the instruction in a SIMD destination register. One embodiment of the instruction specifies a hash round type as one of four MD5 round types. Other embodiments may specify a hash round type by an immediate operand as one of three SHA-1 round types or as a SHA-2 round type.
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: June 16, 2020
    Assignee: Intel Corporation
    Inventors: Gilbert M. Wolrich, Vinodh Gopal, Kirk S. Yap
  • Patent number: 10685587
    Abstract: A cryptographic device (100) calculates a block cipher (500) on a block cipher input (105) and produces a block cipher output (106). The block cipher calculation operates on encoded values (210). The cryptographic device includes a round function unit (140; 300) for applying the final round (118) of the multiple rounds of cryptographic processing implementing the block cipher. A first output unit (160) and second output unit (180) decodes encoded output data (132, 152).
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: June 16, 2020
    Assignee: Koninklijke Philips N.V.
    Inventor: Ronald Rietman
  • Patent number: 10680801
    Abstract: A system and method for data distribution against credential information leak are presented. A data block may be encrypted with block cryptograph on virtual storage so as to create an encrypted block. The virtual storage may be obtained by virtualizing one or more cloud storages of a storage area network (SAN). The encrypted block may be divided into one or more divided blocks. Store-blocks may be generated by combining divided blocks from the encrypted block and different encrypted blocks. The store-blocks may be stored in the one or more cloud storages.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: June 9, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Atsushi Abe
  • Patent number: 10680796
    Abstract: A secure calculation is performed on at least one input value. The calculation includes a number of operations, with a first operation performed on the input value, and subsequent operations performed on results produced by previous operations. An initial encryption rank is set, based on the number of operations to be performed in the calculation. The input value is encoded, together with the initial encryption rank. The calculation is then performed, such that the first operation is performed on the encoded input value to produce an encoded result, and subsequent operations are performed on respective encoded results produced by previous operations to produce further encoded results. A new encryption rank is set when an operation in the calculation is performed on the encoded input value or on an encoded result produced by a previous operation, such that the encoded result of said operation in the calculation has the new encryption rank.
    Type: Grant
    Filed: May 5, 2016
    Date of Patent: June 9, 2020
    Assignee: Koninklijke Philips N.V.
    Inventors: Hendrik Jan Jozef Hubertus Schepers, Paulus Mathias Hubertus Mechtildis Antonius Gorissen
  • Patent number: 10679522
    Abstract: A secret sharing value of a value represented by a “first target bit string” is used to obtain a secret sharing value of a value represented by a “first check bit string” obtained by setting a value of the most significant bit of the “first target bit string” to a value of a “first check bit” that is lower than the most significant bit. Here, the “first target bit string” corresponds to a null value when the most significant bit is 1 and corresponds to a real number when the most significant bit is 0. Next, the secret sharing value of the value represented by the “first check bit string” is used to obtain secret sharing values of bit values of the least significant bit to “first check bit” of the “first check bit string”.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: June 9, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Dai Ikarashi, Koji Chida, Koki Hamada, Ryo Kikuchi
  • Patent number: 10673631
    Abstract: Elliptic curve cryptographic schemes performed between a pair of cryptographic correspondent computing devices. In an aspect, a first entity generates a first basis point in a first selected basis being, either a first basis (A) or a second basis (B), and performs a first key generation in the selected basis. A second entity receives the public key and determines the product of a predetermined scalar in a second selected basis being either the first basis (A) or the second basis (B) and one of the first auxiliary points. If the product is an identity point, performs second key generation in the second selected basis, otherwise performing second key generation in either of the first basis (A) or the second basis (B). A common key is generated using the private keys and public keys. In another aspect, a scheme is performed symmetrically between two entities to generate a common key.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: June 2, 2020
    Assignee: InfoSec Global Inc.
    Inventor: Vladimir Soukharev
  • Patent number: 10664240
    Abstract: The invention relates to a cryptographic processing method comprising multiplication of a point P of an elliptic curve on a Galois field by a scalar k, the multiplication comprising steps of: storing, in a first register, a zero point of the Galois field, executing a loop comprising at least one iteration comprising steps of: selecting a window of w bits in the non-signed binary representation of the scalar k, w being a predetermined integer independent of the scalar k and strictly greater than 1, calculating multiple points of P being each associated with a bit of the window and of the form ±2iP, adding or not in the first register of multiple points stored, depending of the value of the bit of the window with which the multiple points are associated, wherein the loop ends once each bit of the non-signed binary representation of the scalar k has been selected, returning a value stored in the first register.
    Type: Grant
    Filed: October 6, 2017
    Date of Patent: May 26, 2020
    Assignee: IDEMIA IDENTIFY & SECURITY FRANCE
    Inventors: Victor Servant, Guillaume Dabosville
  • Patent number: 10666422
    Abstract: The invention provides a data processing method, comprising: S1: reading original algorithm data; S2: selecting algorithm data within default range from the original algorithm and obtaining a corresponding encryption parameter by using an encryption algorithm, wherein the encryption parameter comprising at least one of the following: encryption coefficient and encryption vector S3: inserting the encryption parameter into a default position in the original algorithm data to obtain encrypted algorithm data. The invention encrypts the algorithm data, and the encrypted data is similar to the original algorithm data, thereby greatly improving the security of data transmission.
    Type: Grant
    Filed: January 30, 2018
    Date of Patent: May 26, 2020
    Assignee: SHENZHEN CHINA STAR OPTOELECTRONICS TECHNOLOGY CO., LTD.
    Inventor: Guangxing Xiao
  • Patent number: 10659223
    Abstract: A solution for controlling access to a resource such as a digital wallet implemented using a blockchain. Use of the invention during set up of the wallet can enable subsequent operations to be handled in a secure manner over an insecure channel. An example method comprises splitting a verification element into multiple shares; determining a common secret at multiple nodes in a network; and using the common secret to transmit a share of the verification element between nodes. The shares can be split such that no share is sufficient to determine the verification element and can be stored at separate locations. Upon share unavailability, the share can be retrieved a location accessibility. For safe transmission of the share(s), the common secret is generated at two different nodes independently and used to generate an encryption key for encrypting at least one share of the verification element to be transmitted securely.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: May 19, 2020
    Assignee: nChain Holdings Limited
    Inventors: Craig Steven Wright, Stephane Savanah
  • Patent number: 10657091
    Abstract: Embodiments for speculative execution in a distributed streaming system by a processor. Incoming data from a data packet may be shared with one or more applications for immediate processing upon the incoming data becoming available on an input/output (I/O) interface to enable overlapping of computation and communication in the distributed streaming system. A validity of the shared incoming data may be indicated to the one or more applications.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: May 19, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Xavier R. Guerin
  • Patent number: 10659447
    Abstract: A communication device of a communication network receives, via a network, a challenge, generates a first Diffie Hellman, DH, parameter, a first verification code for the first DH parameter, forwards the challenge or a derivative thereof to an identity module, receives at least one result parameter as response from the identity module, determines, based on the result parameter, whether the first DH parameter is authentic, and if the first DH parameter is authentic, generates and sends a second DH parameter to the network device for session key generation based on the first DH parameter and the second DH parameter.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: May 19, 2020
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Mats Näslund, Bengt Sahlin, Karl Norrman, Jari Arkko
  • Patent number: 10650343
    Abstract: A method and system for storing and retrieving a packaging hierarchy of traceable physical items includes at an item marking location, marking physical items to be packaged in the packaging hierarchy, with a unique code with a first and second identifier, transferring packaging relationships between the codes to a track and trace system, identifying for each code in the packaging relationships, hierarchical code relations expressed as parent and/or child codes, and for each code, storing the hierarchical code relations in a section of a data storage location of the first computer system, wherein a start position of the section is determined by a combination of the first and second identifiers of the code.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: May 12, 2020
    Assignee: KEZZLER AS
    Inventors: Magnar Løken, Morten Haraldsen
  • Patent number: 10644876
    Abstract: Provided are methods and systems for performing a secure analytic over a data source. An example method includes acquiring, by a client, an analytic, at least one analytic parameter associated with the analytic, and an encryption scheme. The encryption scheme can include a public key for encryption and a private key for decryption. The method further includes generating, using the encryption scheme, at least one analytical vector based on the analytic and analytic parameter, and sending the analytical vector and the encryption scheme to at least one server. The method includes extracting, by the at least one server based on the encryption scheme, a set of terms from a data set, and evaluating the analytical vector over the set of terms to obtain an encrypted result. The method further includes sending, by the server, the encrypted result and the error to the client where the encrypted result is decrypted.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: May 5, 2020
    Assignee: Enveil, Inc.
    Inventors: Ellison Anne Williams, Ryan Carr
  • Patent number: 10645077
    Abstract: The present invention relates to a system and method for securing offline usage of a certificate by authenticating a user by a One Time Password (OTP) system when the user computing device is working in offline. An external authentication server of the server generates a set of expected OTP to protect the certificate. The server encrypts each certificate with a wrapper key and derivates a key from each OTP. Each derived key encrypts the wrapper key to create a set of encrypted wrapper keys. The computing device stores into its memory the encrypted certificate and the set of encrypted wrapper keys received from the authentication server. During a use of the certificate by the computing device working offline, an authentication request is received from a user of the computing device, the authentication request including a user-provided OTP. The computing device derives a key from the OTP provided. The OTP derived key being used to decrypt one corresponding wrapper key of the set of encrypted wrapper keys.
    Type: Grant
    Filed: December 1, 2014
    Date of Patent: May 5, 2020
    Assignee: THALES DIS FRANCE SA
    Inventor: Jonas Paert
  • Patent number: 10635404
    Abstract: In one embodiment, an apparatus comprises a multiplier circuit to: identify a point multiply operation to be performed by the multiplier circuit, wherein the point multiply operation comprises point multiplication of a first plurality of operands; identify a point add operation associated with the point multiply operation, wherein the point add operation comprises point addition of a second plurality of operands, wherein the second plurality of operands comprises a first point and a second point, and wherein the first point and the second point are associated with a first coordinate system; convert the second point from the first coordinate system to a second coordinate system; perform the point add operation based on the first point associated with the first coordinate system and the second point associated with the second coordinate system; and perform the point multiply operation based on a result of the point add operation.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: April 28, 2020
    Assignee: Intel Corporation
    Inventors: Sudhir K. Satpathy, Raghavan Kumar, Arvind Singh, Vikram B. Suresh, Sanu K. Mathew
  • Patent number: 10630760
    Abstract: Embodiments are provided herein for applying adaptive encryption in checkpoint recovery of a file transfer. An embodiment includes establishing a first connection between a first node and a second node, generating a first ciphertext object at the second node by encrypting first input data received from the first node based, at least in part, on an encryption algorithm and an input block, and storing the first ciphertext object in an output file. The embodiment further includes, subsequent to a communication failure via the first connection, establishing a second connection between the first node and the second node, obtaining a last block stored in the output file, and generating a second ciphertext object by encrypting second input data received from the first node based, at least in part, on the encryption algorithm and the last block. More specific embodiments include storing a current file offset based on detecting the communication failure.
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: April 21, 2020
    Assignee: CA, Inc.
    Inventors: Dayakar Reddy Venkivolu, Machhindra Narayan Nale
  • Patent number: 10630472
    Abstract: The present invention relates to a method for providing encrypted data on a client, a cloud or the like, performed in a memory available to a computation device comprising the steps of a) Providing for each user a user specific encryption key for encrypting user-specific plaintext, b) Computing a common decryption key with a pre-determined function using the user specific encryption keys as input for said function, and wherein the common decryption key is computed based on at least two product groups of the same prime order, c) Encrypting each user-specific plaintext with the corresponding user-specific encryption key resulting in user-specific ciphertexts, d) Computing a common ciphertext with said function using the user-specific ciphertexts as input for said function, e) Providing the common ciphertext and the common decryption key for decryption, preferably to a user, wherein step c) is performed such that encryption is homomorphic in the user-specific plaintext as well in the user-specific encryption key
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: April 21, 2020
    Assignee: NEC CORPORATION
    Inventor: Sebastian Gajek
  • Patent number: 10630477
    Abstract: Threshold distributed elliptic curve key generation and signature system and method are disclosed where nodes can generate their own key pairs without the participation of a trust center, each node can process its own key pair according to a secret sharing protocol, complete conversion of the (n, n) threshold to the (t, n) threshold, after determining t signature node, generates a (t, t) threshold private key according to a threshold logic, complete mapping of ptki to ptki?, and according to a signature logic, use ptki? to complete the communication and calculation in the signature protocol, store the relevant calculation results, and complete an overall signature.
    Type: Grant
    Filed: July 26, 2019
    Date of Patent: April 21, 2020
    Assignee: Blue Helix
    Inventors: Jianhua Ju, Kai Wen, Kailiang Jiang, Yuqi Lin
  • Patent number: 10623187
    Abstract: A method (400) of generating a cryptographic checksum for a message M(x) is provided. The method is performed by a communication device, such as a sender or a receiver, and comprises calculating (405) the cryptographic checksum as a first function g of a division of a second function of M(x), ƒ(M(x)), modulo a generator polynomial p(x) of degree n, g(ƒ(M(x))mod p(x)). The generator polynomial is calculated (403) as p(x)=(1?x)·P1(x), and P1(x) is a primitive polynomial of degree n?1. The primitive polynomial is selected (402), based on a first cryptographic key, from the set of primitive polynomials of degree n?1 over a Galois Field. By replacing a standard checksum with a cryptographic checksum, an efficient message authentication is provided. The proposed cryptographic checksum may be used for providing integrity assurance on the message, i.e., for detecting random and intentional message changes, with a known level of security.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: April 14, 2020
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Elena Dubrova, Gunnar Mildh, Mats Näslund, Göran Selander
  • Patent number: 10615963
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: April 7, 2020
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10609457
    Abstract: Disclosed herein are system, apparatus, article of manufacture, method, and/or computer program product embodiments for selection and alignment of video segments for adaptive streaming. An embodiment operates by receiving one or more variant segments, the one or more variant segments including a first variant segment having a first bitrate and a second variant segment having a second bitrate for decoding and playback and generating a first packetized elementary stream (PES) collection based on the first variant segment and a second PES collection based on the second variant segment. The embodiment further operates by storing the generated first PES collection and second PES collection in a processing buffer; and determining a first out-of-tolerance splicing location and associated first out-of-tolerance offset between the first PES collection and the second PES collection based on a maximum tolerance offset.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: March 31, 2020
    Assignee: Roku, Inc.
    Inventor: Francis Degrange
  • Patent number: 10608811
    Abstract: The disclosure herein relates to private set intersection techniques. The described private set intersection techniques enable entities to determine common data strings in their respective data sets. The private set intersection techniques described herein allow those common data strings to be shareable between the entities, while maintaining the secrecy of other data strings stored in their respective data sets.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: March 31, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Hao Chen, Kim Laine
  • Patent number: 10609039
    Abstract: A method, computer program product, and system for providing verification processes associated with a commitment-based authentication protocol are described. A request by a user for access to one or more resources is received, and a presentation policy is transmitted to the user indicating required credentials. A commitment to a revocation handle is received, including an indication of an associated Sigma protocol executed by the user. A challenge value selected from a challenge value set associated with the associated Sigma protocol is transmitted to the user. Based on the selected challenge value, a presentation token and a value parameter that is distinct from the presentation token are received from the user. Based on a determination as to whether the presentation token and value parameter are valid in accordance with the associated Sigma protocol, access for the user to the one or more resources is granted to the user or prevented.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: March 31, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jan L. Camenisch, Robert R. Enderlein, Anja Lehmann, Gregory Neven
  • Patent number: 10601583
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: March 24, 2020
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10600428
    Abstract: An encoder for encoding an audio signal is configured to encode the audio signal in a transform domain or filter-bank domain, is configured to determine spectral coefficients of the audio signal for a current frame and at least one previous frame, and is configured to selectively apply predictive encoding to a plurality of individual spectral coefficients or groups of spectral coefficients which are separated by at least one spectral coefficient.
    Type: Grant
    Filed: September 6, 2017
    Date of Patent: March 24, 2020
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschug e.V.
    Inventors: Bernd Edler, Christian Helmrich, Max Neuendorf, Benjamin Schubert
  • Patent number: 10601584
    Abstract: An information processing apparatus that processes a plurality of encrypted text data items includes: an input unit for inputting first data and second data that are the encrypted text data items; a first transforming unit for transforming the first data to first transformed data based on a first table; a second transforming unit for transforming the second data to second transformed data based on a second table; an addition unit for calculating an addition result by adding the first transformed data and the second transformed data; a remainder calculation unit for obtaining a remainder by dividing the addition result by an exponential number having 2 as a base and having the number of bits of the encrypted text data items as an exponent; and a third transforming unit for outputting an output result by transforming the remainder based on a third table.
    Type: Grant
    Filed: February 20, 2018
    Date of Patent: March 24, 2020
    Assignee: FUJI ELECTRIC CO., LTD.
    Inventor: Kenji Takatsukasa
  • Patent number: 10601829
    Abstract: A decentralized application platform and associated method creates an ID that can be used to sign into any decentralized application that follows the platform protocol without having a centralized third party having to vouch for the user's identity.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: March 24, 2020
    Assignee: Blockstack PBC
    Inventors: Jude Nelson, Aaron Blankstein, Lawrence Salibra, Yukan Liao, Matthew Little
  • Patent number: 10599348
    Abstract: A method of processing transactions associated with a command in a storage system is provided. The method includes receiving, at a first authority of the storage system, a command relating to user data. The method includes sending a transaction of the command, from the first authority to a second authority of the storage system, wherein a token accompanies the transaction and writing data in accordance with the transaction as permitted by the token into a partition that is allocated to the second authority in a storage device of the storage system.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: March 24, 2020
    Assignee: Pure Storage, Inc.
    Inventors: John Hayes, Robert Lee, Igor Ostrovsky, Peter Vajgel
  • Patent number: 10594474
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: March 17, 2020
    Assignee: INTEL CORPORATION
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10594472
    Abstract: Using a secure hardware or other form secure elements, where we securely implement the decryption and then encryption function to perform the re-encryption function, we build a hybrid fully homomorphic encryption system, where the bootstrap step is replaced the re-encryption function in the hardware module. This new hybrid system are very efficient because the re-encryption is much more efficient than the bootstrap function, which is the main bottleneck in terms of computations in FHE. In such a system, we make the system secure by making this hardware module secure using all or some of known techniques including temper proof, self-destruction and etc. This module can be controlled by either the server or the client or jointly.
    Type: Grant
    Filed: March 4, 2016
    Date of Patent: March 17, 2020
    Inventor: Jintai Ding
  • Patent number: 10594475
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: March 17, 2020
    Assignee: INTEL CORPORATION
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10586064
    Abstract: New techniques for safeguarding valuables in a recreational, public setting are provided. In some aspects of the invention, a specialized portable safe is configured for insertion and securing into sand or other loose ground particles, with computer hardware controlling wireless locking, unlocking and alerting techniques. The alerting techniques may include local communications directed to a computer system within the safe's lockable compartment, enabling the extension of range and exporting signals with enhanced security through a smart device held within the safe. In other aspects, segregated scrap memory is provided, featuring data off-boarding from a main computer system and redundant control of user interface controls.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: March 10, 2020
    Inventor: Christopher V. Beckman
  • Patent number: 10587395
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: March 10, 2020
    Assignee: INTEL CORPORATION
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10581605
    Abstract: In an embodiment, a computer-implemented data security method comprises: using a first computing device, generating a plurality of encrypted shares from a plurality of shares of hidden security service data by using a separate public key from a plurality of public keys that correspond to a plurality of second computing devices; using a requesting second computing device, accessing and decrypting a first encrypted share of the plurality of encrypted shares using a first private key corresponding to the requesting second computing device to generate a first portion of the hidden security service data; using an available second computing device, decrypting a second encrypted share of the plurality of encrypted shares using a second private key corresponding to the available second computing device to generate a decrypted share; using the available second computing device, re-encrypting the decrypted share using a public key corresponding to the requesting second computing device to generate a re-encrypted share
    Type: Grant
    Filed: September 17, 2018
    Date of Patent: March 3, 2020
    Assignee: Xage Security, Inc.
    Inventors: Susanto Junaidi Irwan, Roman M. Arutyunov, Alexander Michael Valderrama
  • Patent number: 10579337
    Abstract: A decoding apparatus having a non-transient memory in which is stored an electromagnetic signal representative of data which were encrypted relying on the difficulty of computing discrete logarithms. The decoding apparatus has a computer in communication with the memory that decodes the encrypted data in the memory by computing the data's discrete logarithm. The decoding apparatus has a display on which the decoded encrypted data are displayed by the computer. A method for decoding.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: March 3, 2020
    Assignee: Chorus Call, Inc.
    Inventor: Giorgio Coraluppi
  • Patent number: 10581594
    Abstract: A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements ai, bi, ei, and fi for a current round (i) of a secure hash algorithm 2 (SHA2) hash algorithm. The instruction indicates a second source of a second packed data. The first packed data has a width in bits that is less than a combined width in bits of eight state data elements ai, bi, ci, di, ei, fi, gi, hi of the SHA2 hash algorithm. The method also includes storing a result in a destination indicated by the instruction in response to the instruction. The result includes updated state data elements ai+, bi+, ei+, and fi+ that have been updated from the corresponding state data elements ai, bi, ei, and fi by at least one round of the SHA2 hash algorithm.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: March 3, 2020
    Assignee: Intel Corporation
    Inventors: Gilbert M. Wolrich, Kirk S. Yap, Vinodh Gopal, James D. Guilford
  • Patent number: 10574702
    Abstract: A system assesses a security configuration proposed for production on a target computer system. The system may receive the security configuration proposed for production and obtain telemetry metrics generated based on security configurations implemented on one or more computer systems of the service provider. The system may assess a security configuration proposed for deployment based on telemetry metrics and generate status information based on the assessment. An authorization recommendation may be provided based whether the status information indicates that the proposed security configuration satisfies one or more conditions.
    Type: Grant
    Filed: January 3, 2018
    Date of Patent: February 25, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Jacob Edward Rickerd, Amanda Gray, Tushaar Sethi, Pujun Wu
  • Patent number: 10572926
    Abstract: Artificial intelligence is used to identify significant records in a computer database. The records in the database are ordered in accordance with a first factor. Records in the database which have a position less than a first threshold are identified to provide second-level records. At least some of the second-level records, but only the second-level records, are arranged into a plurality of groups based on a second factor. For at least one of the groups, the second-level records in the group are then ordered in accordance with a third factor. At least one second-level record in the group is selected, where the selected second-level record has a position greater than a second threshold. Information regarding the selected second-level record is then provided, such as to a client device.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: February 25, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Jeffrey Matthew Bilger
  • Patent number: 10572870
    Abstract: Methods and systems are disclosed for binding a payment element in a mobile wallet operating on a mobile device with a payee. The mobile wallet, can for example, receive an indication from a point of sale (POS) device that a transaction has been completed with a payee associated with the POS device, using a payment element of the mobile wallet. The mobile wallet can query a payment database table with an identifier for the payee and an identifier for the payment element to determine if the payment element has previously been used to complete transactions with the payee. The mobile wallet can bind the payment element to the payee if the payment element has previously been used to complete transactions with the payee and if the payment element is to be bound to the payee. Other systems, methods and apparatuses are also described.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: February 25, 2020
    Assignee: Wells Fargo Bank, N.A.
    Inventor: Joon Maeng
  • Patent number: 10567160
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 18, 2020
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10567161
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 18, 2020
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10560256
    Abstract: Systems and methods include establishing a cryptographically secure communication between an application module and an audio module. The application module is configured to execute on an information-handling machine, and the audio module is coupled to the information-handling machine. The establishment of the cryptographically secure communication may be at least partially facilitated by a mutually trusted module.
    Type: Grant
    Filed: October 2, 2018
    Date of Patent: February 11, 2020
    Assignee: INTEL CORPORATION
    Inventors: Pradeep M. Pappachan, Reshma Lal, Rakesh A. Ughreja, Kumar N. Dwarakanath, Victoria C. Moore
  • Patent number: 10560258
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 11, 2020
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal
  • Patent number: 10560259
    Abstract: A flexible aes instruction for a general purpose processor is provided that performs aes encryption or decryption using n rounds, where n includes the standard aes set of rounds {10, 12, 14}. A parameter is provided to allow the type of aes round to be selected, that is, whether it is a “last round”. In addition to standard aes, the flexible aes instruction allows an AES-like cipher with 20 rounds to be specified or a “one round” pass.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: February 11, 2020
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Wajdi K. Feghali, Vinodh Gopal