By Public Key Method Patents (Class 380/282)
  • Patent number: 10742427
    Abstract: Systems and methods for tamper-proof detection triggering of automatic lockdown using a recoverable encryption mechanism issued from a secure escrow service. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include: a processor; a secure storage device coupled to the processor, wherein the secure storage device comprises a container encrypted with a derived container key; and a memory coupled to the processor, the memory including program instructions stored thereon that, upon execution, cause the IHS to: receive a digital certificate from a remote server, wherein the digital certificate includes a public key and, in response to a detection of a tampering event, encrypt the derived container key using the public key.
    Type: Grant
    Filed: November 16, 2017
    Date of Patent: August 11, 2020
    Assignee: Dell Products, L.P.
    Inventors: Charles D. Robison, Carlton A. Andrews, Girish S. Dhoble, Joseph Kozlowski, Andrew T. Fausak, David Konetski, Ricardo L. Martinez
  • Patent number: 10740474
    Abstract: Systems and methods are disclosed for generation of secure indexes that permit the querying or searching of encrypted data in a cryptographically-secure manner. In various embodiments, a filter gradient comprises a node identifier, a set membership filter, and an ordered genealogy (such that it comprises a filter that encodes a subset of the items encoded by its parent), and a FiG tree is a rooted tree with filter gradients (and, optionally, one or more dictionaries) as nodes such that each filter gradient uses a different hash. A HiiT data structure, in various embodiments, comprises a hash table that points to the rows of an inverted index table. In various embodiments, an oblivious pseudorandom function may be employed to mask, secure, and prepare the phrases for insertion into the secure indexes.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: August 11, 2020
    Assignee: Ionic Security Inc.
    Inventors: Adam Ghetti, Ryan Mark Speers, Jonathan Thomas Burns, Jeffrey Howard
  • Patent number: 10742410
    Abstract: Methods and devices for updating biometric template protection keys can include updating at least one stored feature transformation key with which a set of biometric data of a user initially has been transformed at a first client device at which the biometric data of the user was captured and enrolled with a network node, which set of transformed biometric data of the user is stored at a biometric data verification node that does not have access to the feature transformation key. The method comprises generating random data, computing at least one new feature transformation key based on said random data, replacing the at least one stored feature transformation key with the computed at least one new feature transformation key, and transmitting the generated random data to the biometric data verification node, which uses the generated random data to update the at least one set of transformed biometric data.
    Type: Grant
    Filed: February 8, 2019
    Date of Patent: August 11, 2020
    Assignee: FINGERPRINT CARDS AB
    Inventors: Christian Gehrmann, Steven Pope
  • Patent number: 10735487
    Abstract: A dynamic secure mobile network is provided to enable the transfer and storage of private data. The dynamic secure mobile network can provide secured communication channels that segregates different types of data and allows for protected data streams to be sent via different secured channels than non-protected data. The enhanced wireless mobile network can support consistent compliancy/privacy and security policies across all networks.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: August 4, 2020
    Assignees: AT&T MOBILITY II LLC, AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Sangar Dowlatkhah, Erie Lai Har Lau
  • Patent number: 10726098
    Abstract: A method, system and program product comprise accessing a system having a digital currency infrastructure. At least one user address is created. Genetic and health related user data is prepared. The user data is transferred to the system wherein the system links the user data and the user address.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: July 28, 2020
    Inventor: Dror Samuel Brama
  • Patent number: 10721227
    Abstract: A system and method of validating an identity of a user device is disclosed that includes registering a biometric signature with an authoritative identity source, transmitting an encrypted user identity element from the authoritative identity source to a user device, sending an identity request from a third party entity to the user device, transmitting the encrypted user identity element from the user device to the third party, sending an identity validation request from the third party to the authoritative identity source, transmitting a communication from the authoritative identity request to the third party entity, and informing the third party entity if the identity of the user is confirmed.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: July 21, 2020
    Assignee: WELLS FARGO BANK, N.A.
    Inventor: Darrell L. Suen
  • Patent number: 10699804
    Abstract: A system (1) for the management of personal data (3) relative to a user by maintaining personal privacy, comprising a Discontinuity Engine Interface (4) configured for receiving identification data (2) of the user and receiving encrypted personal data (3) of the user. The system uses separation of information domains to achieve the maximum privacy, different system components have only parts of the information as they manage information or encrypted, obfuscated or anonymous data also in combination. This separation between services and the way information are accessed permit to guarantee the maximum privacy against direct and indirect identification of the client. This level of security is permitted by pervasive cryptography starting from encapsulating data from the originator: client or analysis laboratory.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: June 30, 2020
    Assignee: KATALYXER SRL
    Inventor: Andrea Benoni
  • Patent number: 10693960
    Abstract: A data exchange guide device and an execution method thereof provided in the present disclosure are characterized that a processing program, which is executed by an electronic device connected with a connection interface, is able to read private key information, access a tabulation of remote shared data from an existing network available to the electronic device, and display the tabulation on a graphic user interface. Furthermore, a data exchange guide device and an execution method thereof provided in the present disclosure are also characterized that a processing program, which is executed by an electronic device connected with the connection interface and a virtual network card, is able to read private key information, access a tabulation of remote shared data from the virtual network card, and display the tabulation on a graphic user interface.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: June 23, 2020
    Assignee: WALTON ADVANCED ENGINEERING INC.
    Inventors: Hong Chi Yu, Mao Ting Chang
  • Patent number: 10693680
    Abstract: Example methods, apparatuses and systems are disclosed for establishing a secure communication channel between a network establishment service and a monitoring node. An example method includes retrieving, by a processor of a network establishment service, a monitoring node identifier (MID) corresponding to a monitoring node associated with a particular monitoring platform, wherein the MID comprises a private token unique to the monitoring node. The example method further includes identifying, by node configuration circuitry of the network establishment service and based on information regarding the monitoring node, a preferred gateway node for communicating with the monitoring node. The example method further includes logically pairing, by the node configuration circuitry of the network establishment service, the monitoring node with the preferred gateway node, and transmitting, by communications circuitry of the network establishment service, the association information to the preferred gateway node.
    Type: Grant
    Filed: May 10, 2018
    Date of Patent: June 23, 2020
    Assignee: HAND HELD PRODUCTS, INC.
    Inventor: James Timothy Sauerwein, Jr.
  • Patent number: 10686893
    Abstract: The mediation server registers identification information and authentication information to be associated with each other when a registration request is received from a first communication apparatus. The authentication information is for the first communication apparatus to be authenticated for using a first utilization target. The identification information is for using the second utilization target. The server outputs the identification information to an outputting destination without outputting the authentication information. The outputted identification information is available for a second communication apparatus. The server performs, in a case where a first utilization request including the identification information is received from the second communication apparatus, mediation communication in which a specific service from the service provider server to the second communication apparatus is mediate.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: June 16, 2020
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Takeshi Nagasaki
  • Patent number: 10673613
    Abstract: A polynomial complete homomorphic encryption method based on the coefficient mapping transformation. A plaintext is expressed as a polynomial consisting of a set of random values, two sets of random coefficient factors and a random constant of a specified mapping function, and in the polynomial: the expression and a set of random coefficient factors of the specified mapping function are taken as a key; another set of random coefficient factors, a set of random arguments and random constants of the mapping function are taken as the ciphertexts for homomorphic operations, so that the part of function key performs three different mappings and then undergoes numerical fitting to obtain the family of operational support functions consisting of three sub-functions respectively, which are used to perform the homomorphic operation of the ciphertext based on the family of operational support functions and return to the locality for decryption by the key.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: June 2, 2020
    Inventor: Kewei Zheng
  • Patent number: 10659435
    Abstract: Multi-party messaging is disclosed. A plurality of public keys is requested by a first device from a server, wherein the plurality of public keys is associated with a plurality of recipients. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted, using each of the respective public keys, resulting in a plurality of encrypted symmetric keys. The encrypted message and the encrypted symmetric keys are encapsulated in an encapsulation. The encapsulation is transmitted to the server.
    Type: Grant
    Filed: February 20, 2019
    Date of Patent: May 19, 2020
    Assignee: Wickr Inc.
    Inventor: Robert Statica
  • Patent number: 10652274
    Abstract: A system is connected to a plurality of user devices coupled to an enterprise's network. The system continuously collects, stores, and analyzes forensic data related to the enterprise's network. Based on the analysis, the system is able to determine normal behavior of the network and portions thereof and thereby identify abnormal behaviors within the network. Upon identification of an abnormal behavior, the system determines whether the abnormal behavior relates to a security incident. Upon determining a security incident in any portion of the enterprise's network, the system extracts forensic data respective of the security incident and enables further assessment of the security incident as well as identification of the source of the security incident. The system provides real-time damage assessment respective of the security incident as well as the security incident's attributions.
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: May 12, 2020
    Assignee: PALO ALTO NETWORKS, INC.
    Inventors: Gil Barak, Shai Morag
  • Patent number: 10652025
    Abstract: A data storage device is provided. The data storage device includes a storage medium having a first subset configured to store user data and a second subset configured to store snapshot data. The data storage device further includes a controller configured to (i) receive, from a host operably coupled to the data storage device, a command to configure the second subset, to (ii) verify an authenticity of the command, and to (iii) execute the command in response to the verification of the authenticity of the command.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: May 12, 2020
    Assignee: Micron Technology, Inc.
    Inventors: Robert W. Strong, Michael B. Danielson
  • Patent number: 10637656
    Abstract: A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
    Type: Grant
    Filed: November 28, 2017
    Date of Patent: April 28, 2020
    Assignee: BlackBerry Limited
    Inventor: Daniel Richard L. Brown
  • Patent number: 10628334
    Abstract: An adapter is configured to sit between an external storage device and another device configured to read and write to the external storage device. The adapter encrypts data written to the external storage device and decrypts data read from the external device. The adapter determines whether to allow reading from or writing to the external storage device responsive to instructions received from an authenticating device.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: April 21, 2020
    Assignee: McAfee, LLC
    Inventors: Fernando Ruiz Altamirano, German Lancioni
  • Patent number: 10623959
    Abstract: A method implemented on an augmented reality (AR) electronic device includes initiating a security access code software application on the AR electronic device. A user of the AR electronic device is identified. A first electronic computing device at or near a current location of the user is identified. The first electronic computing device is an input device for entry of a security code to permit access to a protected asset. A determination is made as to whether the user is authorized to access the protected asset. When a determination is made that the user is authorized to access the protected asset, a security access code is displayed on the AR electronic device. The security access code permits the user to access the protected asset via the first electronic computing device.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: April 14, 2020
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Brian Michael Young, Kourtney Eidam
  • Patent number: 10615961
    Abstract: A method and encryption node (300) for providing encryption of a message m according to a selected encryption scheme. A noise computation engine (300a) in the encryption node (300) computes (3:1) a noise factor F as a function of a predefined integer parameter n of the selected encryption scheme and a random number r. When the message m is received (3:3) from a client (302) for encryption, an encryption engine (300b) in the encryption node (300), encrypts (3:4) the message m by computing a cipher text c as e=gm·F mod n2, where g is another predefined integer parameter of the selected encryption scheme. The cipher text c is then delivered (3:5) as an encryption of the message m, e.g. to the client (302) or to a cloud of processing resources (304).
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: April 7, 2020
    Assignee: TELEFONATIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Bernard (Ben) Smeets, Christine Jost, Alexander Maximov
  • Patent number: 10607224
    Abstract: A method for authenticating a cardholder for a candidate purchase using an authentication computing device in communication with a memory is provided. The method includes receiving an authentication profile associated with the cardholder during an enrollment process for an authentication service, storing the authentication profile within the memory, and receiving an authentication request for the candidate purchase over a first communication link. The candidate purchase is initiated at a client device.
    Type: Grant
    Filed: April 4, 2016
    Date of Patent: March 31, 2020
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventor: Manoneet Kohli
  • Patent number: 10601795
    Abstract: The present disclosure relates to the field of terminal technologies, and discloses a service processing method and an electronic device. In the present disclosure, a plaintext message used for performing a service operation is provided in a second electronic device. In this case, when needing to perform service processing, a first electronic device may obtain, by means of encryption transmission between the first electronic device and the second electronic device, the plaintext message provided by the first electronic device, so as to perform service processing based on the plaintext message. No key exchange is involved in the interaction, and a private key of an electronic device is not exported from the device. Therefore, in this process, a device application scenario is significantly extended while information security is ensured.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: March 24, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Qiang Wang, Zixi Shen, Wenqing Liu
  • Patent number: 10601817
    Abstract: A secured device including a security hardware module and a method thereof are provided. The secured device generates first user authentication information based on a user input, generates encryption key generation information corresponding to the first user authentication information, receives second user authentication information from an electronic device, and transmits to the electronic device the encryption key generation information corresponding to the first user authentication information when the second user authentication information matches the first user authentication information. The first user authentication information and the encryption key generation information are secured by the security hardware module.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: March 24, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jae-yoon Lee, Hyun-sook Rhee, Su-kyoung Chae
  • Patent number: 10601589
    Abstract: The exemplary inventive instant messaging system may include a sending client that accesses encryption data associated with a receiving client on a distributed mesh network where the encryption data is signed by a receiver public key of the receiving client, forms a non-interactive message exchange session on the distributed mesh network, generates a first session key based on the encryption data and a sender secret key, encrypts a message using the first session key, encrypts session information using the receiver public key, produces a session state including the encrypted message and the encrypted session information and stores the session state in the non-interactive message exchange session. The receiving client accesses the session state, decrypts the encrypted session information with a receiver secret key, generates a second session key using the session information and a sender public key, and decrypts the message using the second session key.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: March 24, 2020
    Assignee: Banuba Limited
    Inventors: Viktor Prokopenya, Yury Hushchyn, Nikolay Voronetskiy, Kanstantsin Zakharchanka
  • Patent number: 10587418
    Abstract: An authentication request including at least one of a user identifier and a wearable device identifier of a user is received at a server from a terminal. The server stores a relationship between the user identifier, the wearable device identifier, and a server authentication key. Downlink authentication information is acquired by the server. A detection instruction including the downlink authentication information and the wearable device identifier is issued to the terminal. A detection acknowledgment returned by the terminal is received by the server. The detection acknowledgment includes uplink authentication information generated by a wearable device designated in the detection instruction, according to a device authentication key and the downlink authentication information. The device authentication key is the same as, or corresponds to, the server authentication key.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: March 10, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Long Jiang
  • Patent number: 10580070
    Abstract: A distributed system for commerce including a merchant system with a communication system for receiving, processing and transmitting data. The system further includes an intermediate server system in communication with the merchant system, and this intermediate server system includes a data storage system for storing data transmitted thereto, as well as a communication system for receiving, processing and transmitting data.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: March 3, 2020
    Assignee: PAYPAL, INC.
    Inventors: Thomas H. Keithley, Thomas E. Whitford
  • Patent number: 10572656
    Abstract: A pool of virtual environments, such as virtual machine instances and containers, can be maintained by an intermediary service, where the virtual environments can execute a specified application or service. When a request is received from a client for a connection to a resource, the intermediary service can allocate one of the virtual environments for the client and enable the client and virtual environment to communicate as if the virtual environment is executing on dedicated hardware. The virtual environment can be virtually isolated on a host machine, whereby session data for the client is stored locally in memory and then deleted at the end of the session when the virtual environment is destroyed, in order to prevent the data from being accessible between sessions and preventing multiple clients or customers from sharing the same environment over time.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: February 25, 2020
    Assignee: Amazon Technologies, Inc.
    Inventor: Andrew James Guenther
  • Patent number: 10565177
    Abstract: Aspects of the subject disclosure may include, for example, determining a differentiating information item, and modifying a standardized digital index based on the differentiating information item to obtain an entity. The standardized digital index includes a number of data fields that accommodate a number of differentiating information items according to a standardized taxonomic structure. The number of data fields includes a topic label, a resource and a manifest listing that identifies the resource. The entity is stored in an entity repository, wherein the entity is accessible to support a digital transaction within a network service provider ecosystem comprising a plurality of differentiated network services, and wherein the entity supports the digital transaction as one of a user, a consumer, a producer, content, capabilities and any combination thereof. Other embodiments are disclosed.
    Type: Grant
    Filed: November 14, 2016
    Date of Patent: February 18, 2020
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventor: Paul Gausman
  • Patent number: 10560267
    Abstract: The present solution discloses example methods and systems for verifying block data. One example method includes identifying newly added data to be stored in a blockchain, and selecting a data node in a block to store the newly added data. A string is generated based on the newly added data, and then a verification value for the newly added data is developed from the string using a predetermined algorithm. A new verification value for the block is calculated based on the verification value of the newly added data and the original verification values of the unchanged data nodes in the block. The new verification value for the block can then be used to verify the data stored in the block is consistent with data stored in the rest of the blockchain.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: February 11, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Honglin Qiu
  • Patent number: 10546153
    Abstract: Alert notification content is conveyed to an authorized user and other persons oriented relative to the mobile device to perceive the alert notification content during an ephemeral alert period, in response to determining that the authorized user is oriented to perceive the alert notification content during the ephemeral alert period, and that only the authorized user is proximate enough to perceive the alert notification content conveyed by the mobile device, or that is appropriate pursuant to rule or privacy setting applications to convey the alert notification content to each of the other persons. The alert content is muted in response to determining that it is not appropriate pursuant to the rule application or privacy setting to convey the content to the other persons, or that the authorized user is not oriented to perceive the alert notification content during the ephemeral alert period.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: James E. Bostick, John M. Ganci, Jr., Martin G. Keen, Sarbajit K. Rakshit
  • Patent number: 10547609
    Abstract: A method, an apparatus, and a system for controlling an intelligent device are provided. The device transmits a control request including a first intelligent device identifier corresponding to a first intelligent device to be controlled. In response to transmitting the control request, the device receives a first verification character string that corresponds to the control request. The first verification character string is transmitted to a first wearable device locally establishing a data connection with the first wearable device. First signed information is received from the first wearable device. The first signed information is a result of performing a signature on first to-be-signed information and includes the first verification character string. The first signed information and operation information for controlling the first intelligent device are transmitted.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: January 28, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Wenqing Liu, Zixi Shen, Qiang Wang
  • Patent number: 10547605
    Abstract: According to one embodiment, a communication device includes a first communicator capable of communicating with a server through a first network; a second communicator capable of communicating with an operation terminal of a user through a second network; a first communication processor to execute a first process; a second communication processor to receive, through the second communicator, an issue request, use identification information of the first communication processor, a first key, and a second key paired with the first key to issue a certificate signed by the second key including the identification information of the first communication processor and the first key, sign data to be signed by using a third key to generate signed data, and transmit the signed data and the certificate through the second communicator; and an authorizing processor to acquire permission information indicating permission by the user to issue the certificate.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: January 28, 2020
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventors: Daisuke Ajitomi, Keisuke Minami
  • Patent number: 10511444
    Abstract: The present solution discloses example methods and systems for verifying block data. One example method includes identifying newly added data to be stored in a blockchain, and selecting a data node in a block to store the newly added data. A string is generated based on the newly added data, and then a verification value for the newly added data is developed from the string using a predetermined algorithm. A new verification value for the block is calculated based on the verification value of the newly added data and the original verification values of the unchanged data nodes in the block. The new verification value for the block can then be used to verify the data stored in the block is consistent with data stored in the rest of the blockchain.
    Type: Grant
    Filed: June 14, 2019
    Date of Patent: December 17, 2019
    Assignee: Alibaba Group Holding Limited
    Inventor: Honglin Qiu
  • Patent number: 10511436
    Abstract: Key material is protected using white-box cryptography and split key techniques.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: December 17, 2019
    Assignee: EMC IP Holding Company LLC
    Inventor: Salah Machani
  • Patent number: 10509632
    Abstract: A principal model is configured within a memory to facilitate automatic generation of at least one resource for use by a computer-executable application. At least one model item required for a task that is absent from the principal model is identified. The absent model item is instantiated in a decoration model that operates with the principal model to augment operational functionality of the principal model.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: December 17, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin Halberstadt, Eliezer Israel, Boris Melamed, Guy Yitzhaki
  • Patent number: 10498704
    Abstract: In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.
    Type: Grant
    Filed: May 10, 2019
    Date of Patent: December 3, 2019
    Assignee: Encryptics, LLC
    Inventors: Cody Pollet, Charles Burgess, Courtney Roach, Brandon Hart
  • Patent number: 10491591
    Abstract: A method of a mesh network involves generating by a source node a random token to be included in a query packet having a source ID and a query for a destination node; transmitting the query packet to the destination node through a relay node; receiving at the destination node the query packet; adding, by the destination node, the random token to a response packet for the source node; and transmitting the response packet including the random token to the source node through the relay node. Also disclosed are arrangements for a source node, a relay node and a destination node, as well as a mesh network.
    Type: Grant
    Filed: January 18, 2016
    Date of Patent: November 26, 2019
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (publ)
    Inventors: Christoffer Jerkeby, Ian Kumlien
  • Patent number: 10482101
    Abstract: A method and system for processing query requests, including receiving, at a secondary site, a query request from a client and executing the query request to obtain an archive replica package (ARP). The method further includes making a determination that a record associated with the ARP is not stored at the secondary site and based on the determination, transmitting a request to a primary site. The method further includes, in response to the request to the primary site, receiving an archive package and a record where the archive package is associated with the record, and providing the first record to the client.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: November 19, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Jeroen Mattijs van Rotterdam, Michael T. Mohen, Pardeep Kumar
  • Patent number: 10476677
    Abstract: Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like.
    Type: Grant
    Filed: August 7, 2014
    Date of Patent: November 12, 2019
    Assignee: BlackBerry Limited
    Inventors: Michael Kenneth Brown, Herbert Anthony Little, Michael Stephen Brown
  • Patent number: 10467422
    Abstract: Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based at least in part on evaluation of a policy that itself is based at least in part on the associated data. Other policies include automatic rotation of keys to prevent keys from being used in enough operations to enable cryptographic attacks intended to determine the keys.
    Type: Grant
    Filed: February 12, 2013
    Date of Patent: November 5, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt
  • Patent number: 10461928
    Abstract: An identity of an email-address utilized by a client device is verified. According to one example, a server receives a request for verifying the identity of the email-address and calculates a first verification token, which is transmitted to the email address to be verified. The first verification token is received by the client device, which in response calculates a second verification token. The second verification token is transmitted to the server. The server verifies the identity of the email-address by verifying that the first and second verification tokens are identical. Other examples are disclosed.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: October 29, 2019
    Assignee: Virtual Solution AG
    Inventors: Thomas Jakobi, Christian Graf Von Spreti
  • Patent number: 10447473
    Abstract: A method for generating a cryptographic key, wherein a first node transmits a first signal on a first channel to a relay, a second node transmits a second signal on a second channel to the relay, the first node receives a third signal from the relay on the first channel and a fourth signal derived at least from the first signal and from the second signal, the second node receives the third signal and the fourth signal from the relay on the second channel, the first node determines the key based on the first signal, on the third signal and on the fourth signal and the second node determines the key based on the second signal, on the third signal and on the fourth signal.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: October 15, 2019
    Assignee: Robert Bosch GmbH
    Inventors: Stephan Ludwig, Thomas Strohm
  • Patent number: 10437957
    Abstract: A medical campaign method, computer program product, and system are provided. A patient registry record in a patient registry is analyzed to identify at least one trend of a clinical measure for a corresponding patient and correlate the at least one trend with one or more medical campaigns directed to improving the clinical measure. A medical campaign is selected from the one or more medical campaigns for application to the patient. The medical campaign is executed to apply the medical campaign to the patient. Executing the medical campaign involves sending a communication to a communication device associated with the patient.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: October 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: James S. Cox, Anthony J. DiGiorgio
  • Patent number: 10433911
    Abstract: Enhanced targeting systems and methods may be used to visualize trajectories for surgical instruments. Such a targeting system may have a first light source and a second light source. The first light source may project first light along a first plane, and the second light source may project second light along a second plane nonparallel to the first plane. At an intersection of the first and second planes, the first light and the second light may cooperate to produce a targeting line that indicates the desired trajectory. An image capture system may also be used to capture image data of anatomical features of a patient at one or more locations in space, and a controller may receive the image data and indicate the trajectory relative to the anatomical features of the patient.
    Type: Grant
    Filed: January 26, 2016
    Date of Patent: October 8, 2019
    Inventors: Hao Wang, Neil Duggal
  • Patent number: 10433017
    Abstract: A system for managing content distributed over an electronic network includes a multichannel video programming distributor server for distributing and managing content, and an authorization server for establishing and managing permissions for subscriber access to the content. Each of the servers are in operable communication with the electronic network. The system further includes at least one subscriber device in operable communication with the electronic network. The subscriber device includes a processor, a device memory, and a display, and also an MVPD application stored within the device memory and configured to run on the processor when executed. The MVPD application is configured to display for viewing, upon invocation of a deep link within the MVPD application, content from the multichannel video programming distributor server.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: October 1, 2019
    Assignee: Cable Television Laboratories, Inc.
    Inventor: Ralph William Brown
  • Patent number: 10423125
    Abstract: The present disclosure provides systems and methods to boot a computing system of an autonomous vehicle. In particular, the systems and methods of the present disclosure can initialize a basic input output system (BIOS) of a computing system comprising one or more computing devices of an autonomous vehicle. The computing system can utilize data stored in the BIOS and data stored in one or more files comprising a kernel of an operating system of the autonomous vehicle and a random access memory (RAM) drive to verify the kernel and the RAM drive. Responsive to verifying the kernel and the RAM drive, the operating system of the autonomous vehicle can be booted.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: September 24, 2019
    Assignee: Uber Technologies, Inc.
    Inventor: Christopher Valasek
  • Patent number: 10425389
    Abstract: A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: September 24, 2019
    Inventor: Dennis Dupray
  • Patent number: 10425397
    Abstract: An information processing apparatus includes; a generator that generates an instruction for a terminal used by an administrator of the information processing apparatus to verify a first electronic certificate whose verification has failed; a transmitter that transmits information indicating the first electronic certificate and the instruction to the terminal used by the administrator of the information processing apparatus; and a setting unit that, when an instruction to set a second electronic certificate is received from the terminal, sets the second electronic certificate.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: September 24, 2019
    Assignee: FUJI XEROX CO., LTD.
    Inventor: Ryoji Matsumura
  • Patent number: 10419511
    Abstract: The unique watermark system comprising: identifying a presenter attendee, a first recipient attendee, and a second recipient attendee through a video conferencing session; detecting the presenter attendee sharing the visual content with the first recipient attendee and the second recipient attendee; selecting a first unique watermark and a second unique watermark from the plurality of unique watermarks and assigning them to a first recipient attendee and a second recipient attendee, respectively; inserting the first unique watermark into the visual content for the first recipient attendee and the second unique watermark into the visual content for the second recipient attendee; and transmitting the visual content with the first unique watermark to the first recipient attendee and the visual content with the second unique watermark to the second recipient attendee, wherein the method is performed by one or more special-purpose computing devices for hosting the video conferencing session.
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: September 17, 2019
    Assignee: Zoom Video Communications, Inc.
    Inventor: Zheng Yuan
  • Patent number: 10419931
    Abstract: Systems, methods, and articles of manufacture comprising processor-readable storage media are provided for implementing security for a network environment using a centralized smart security system. For example, a method includes implementing a network comprising a plurality of network devices which collectively generate data that is utilized by a computing system to execute an application, and implementing a centralized security system as a computing node within the network to manage security operations within the network and to establish secured and trusted communications between the network devices and the computing system. The network devices may comprise wireless sensor devices operating in a wireless sensor network, wherein computing system executes an IoT (Internet of Things) application which processes the data that is generated by the wireless sensor devices.
    Type: Grant
    Filed: August 25, 2016
    Date of Patent: September 17, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Mohamed Sohail, Stephen Todd, Said Tabet, Khaled Ahmed
  • Patent number: 10397209
    Abstract: An embodiment of the invention provides a system and method for risk-aware multiple factor authentication based on pattern recognition and calendar. Recent activity performed by the user can be obtained from data sources and stored in a user transaction database. An interface can receive a login name from a user; and, a processor can select one or more security questions regarding the recent activity performed by the user. The interface can receive an answer to the security question(s) from the user; and, the processor can determine whether the answer(s) matches data stored in the user transaction database and is associated with the login name of the user.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jinho Hwang, Clifford A. Pickover, Maja Vukovic, Frederick Y. Wu
  • Patent number: 10395330
    Abstract: Mechanisms are provided for monitoring quality and correctness of content in communications handled by a vendor. The mechanisms sample a set of communications handled by the vendor to generate a sample set of communications and extract content from the sample set of communications. The mechanisms compare the extracted content with expected content of communications handled by the vendor and analyze the extracted content and the expected content to thereby identify differences between the extracted content and the expected content based on results of the analysis. In addition, the mechanisms determine a level of significance of the differences and generate a notification of whether or not to modify the communications, or an operation of the vendor, based on the determined level of significance of differences.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: August 27, 2019
    Assignee: International Business Machines Corporation
    Inventors: Dustin M. Dorris, Alan C. Edwards, Shilpa Mudhiganti