By Public Key Method Patents (Class 380/282)
-
Patent number: 11757856Abstract: A cryptographic communication system includes: a first cryptographic communication apparatus including a first tamper-resistant device configured to store a first key generation function and a first storage unit configured to store first individual information; and a second cryptographic communication apparatus including a second tamper-resistant device configured to store a second key generation function and a second storage unit configured to store second individual information. The first cryptographic communication apparatus generates a twelfth shared key using the first key generation function and the second individual information. The second cryptographic communication apparatus generates a twenty first shared key using the second key generation function and the first individual information.Type: GrantFiled: December 8, 2021Date of Patent: September 12, 2023Assignees: SEIKO EPSON CORPORATION, Shinshu UniversityInventors: Takehiko Mieno, Hiroyuki Okazaki
-
Patent number: 11740994Abstract: Techniques and structures to provide secure data transfer between entities in a multi-user on-demand computing environment. An electronic device may comprise at least one physical memory device, one or more processors coupled with the at least one physical memory device, the one or more processors configurable to create a scratch destination organization within the computing environment, receive, via a user interface, a metadata selection comprising a plurality of metadata resources, extract the plurality of metadata resources from an origin organization within the computing environment into a metadata bundle, and deploy the metadata bundle in the scratch organization. Additional subject matter may be described and claimed.Type: GrantFiled: May 17, 2021Date of Patent: August 29, 2023Assignee: Salesforce, Inc.Inventors: Florian Bastianelli, Pascal Mercier, Sameer Singhvi
-
Patent number: 11741246Abstract: Techniques and structures to provide secure data transfer between entities in a multi-user on-demand computing environment. An electronic device may comprise at least one physical memory device, one or more processors coupled with the at least one physical memory device, the one or more processors configurable to create a scratch organization within the computing environment, receive, via a user interface, a metadata selection comprising a plurality of metadata resources which define a set of components for a service implemented in an origin organization of the multi-user, on demand computing environment, extract the plurality of metadata resources from the origin organization within the computing environment into a metadata bundle, and deploy the metadata bundle in the scratch organization. Additional subject matter may be described and claimed.Type: GrantFiled: May 17, 2021Date of Patent: August 29, 2023Assignee: Salesforce, Inc.Inventors: Florian Bastianelli, Pascal Mercier, Sameer Singhvi
-
Patent number: 11734676Abstract: Systems, methods, and articles of manufacture to securely share data stored in a blockchain. A contactless card may receive a request to provide a data element from a device. An applet of the contactless card may encrypt the data element and a wallet address. The applet may generate a signature for the request, and transmit, to a mobile device, the signature and the encrypted data. The mobile device may transmit, to a verification service, the signature and encrypted data. The verification service may verify the signature based on a public key. A node in a blockchain may generate a block in the blockchain, the block comprising indications of the verification of the signature, the requested data element, and the wallet address. An encrypted data element corresponding to the data element may be decrypted using a public key. The device may receive the decrypted data element from the wallet address.Type: GrantFiled: November 14, 2019Date of Patent: August 22, 2023Inventors: Jeffrey Rule, Rajko Ilincic, Kaitlin Newman
-
Patent number: 11733939Abstract: A communication device may: comprise an output unit configured to output first information obtained by using a first public key in a memory in a case where a predetermined instruction is inputted to the communication device; after the first information has been outputted, receive an authentication request in which the first public key is used from a terminal device; send an authentication response to the terminal device; establish a wireless connection between the communication device and an external device; and in a case where a predetermined condition is satisfied after the first information has been outputted, create a second public key different from the first public key and store the second public key in the memory. In a case where the predetermined instruction is inputted to the communication device again, the output unit may be configured to output second information obtained by using the second public key in the memory.Type: GrantFiled: June 4, 2021Date of Patent: August 22, 2023Assignee: Brother Kogyo Kabushiki KaishaInventor: Hiroshi Shibata
-
Patent number: 11721418Abstract: A system and method is provided to allow access to centralized patient data captured from a medical device across an open network to a third party. The system and method receives the request based upon patient-specific information, checks the request and allows access if the request matches stored information.Type: GrantFiled: May 17, 2021Date of Patent: August 8, 2023Assignee: Fisher & Paykel Healthcare LimitedInventor: Benjamin Wilson Casse
-
Patent number: 11716196Abstract: A secure multi-party computation implements real number arithmetic using modular integer representation on the backend. As part of the implementation, a secret shared value jointly stored by multiple parties in a first modular representation is cast into a second modular representation having a larger most significant bit. The parties use a secret shared masking value in the first representation, the range of which is divided into two halves, to mask and reveal a sum of the secret shared value and the secret shared masking value. The parties use a secret shared bit that identifies the half of the range that contains the masking value, along with the sum to collaboratively construct a set of secret shares representing the secret shared value in the second modular format. In contrast with previous work, the disclosed solution eliminates a non-zero probability of error without sacrificing efficiency or security.Type: GrantFiled: June 29, 2021Date of Patent: August 1, 2023Inventors: Mariya Georgieva, Nicolas Gama, Dimitar Jetchev
-
Patent number: 11710124Abstract: A method and apparatus for secured, multi-lateral, assured data transfer over a computer network for the assured exchange of data between counterparties related to qualifying transactions, the method being accomplished by a distributed computing system including a distributed ledger platform and an off-chain data host platform. On-chain authorization tokens are used to track data access rights, enforce access policies, and control distribution of encryption keys.Type: GrantFiled: March 24, 2021Date of Patent: July 25, 2023Assignee: SECURRENCY, INC.Inventors: George Daniel Doney, Ihor Yermakov, Manuel Rensink
-
Patent number: 11711208Abstract: A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.Type: GrantFiled: March 30, 2022Date of Patent: July 25, 2023Assignee: BlackBerry LimitedInventor: Daniel Richard L. Brown
-
Patent number: 11711355Abstract: Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.Type: GrantFiled: December 23, 2021Date of Patent: July 25, 2023Assignee: BEAME.IO LTD.Inventors: Zeev Glozman, Markus Neff
-
Patent number: 11706016Abstract: A public-key scheme of Homomorphic Encryption (HE) in the framework Quotient Algebra Partition (QAP) comprises: encryption, computation and decryption. With the data receiver choosing a partition or a QAP, [n, k, C], a public key Keypub=(VQen, Gen?) and a private key Keypriv=†P† are produced, where VQen is the product of an n-qubit permutation V and an n-qubit encoding operator Qen, Gen? an error generator randomly provides a dressed operator ?=V†EV spinor error E of [n, k, C]. Then, by Keypub, the sender can encode his k-qubit plaintext Ix) into an n-qubit ciphertext |?en, which is transmitted to the cloud. The receiver prepares the instruction of encoded computation Uen=PV†Qen† for a given k-qubit action M and sends to cloud, where is the error-correction operator of [n, k, C], =I2n?k?M the tensor product of the (n?k)-qubit identity I2n?k and M , and V†Q†en and P the complex-transposes of VQen and †P† respectively.Type: GrantFiled: December 10, 2021Date of Patent: July 18, 2023Assignee: NATIONAL APPLIED RESEARCH LABORATORIESInventors: Zheng-Yao Su, Ming-Chung Tsai
-
Patent number: 11706209Abstract: A system and method for granting access to network resources through access credentials given to an agent process running on each computer or machine where resource requesters reside. The system extends a traditional token-granting authorization system to the agent processes, where each agent has administrative access to machine information. The agent uses that access to acquire detailed information about resource requesters. Requester qualifications defined by the system limit requester access to resources, and are enforced both by the agent and by the central system on the network resource server. Resource requesters ask for a token for resource use from the agent, not the central system. The agent uses its credentials to get a token from the central system and then return the token to qualified requesters.Type: GrantFiled: April 29, 2021Date of Patent: July 18, 2023Assignee: DELINEA INC.Inventors: Nathaniel Wayne Yocom, Sek-Hon Albert Leung
-
Patent number: 11689357Abstract: In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document.Type: GrantFiled: June 1, 2018Date of Patent: June 27, 2023Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Joshua Serratelli Schiffman, Thalia Laing, Shivaun Albright
-
Patent number: 11687885Abstract: Embodiments relate to systems, apparatuses, and methods for performing transaction signing utilizing asymmetric cryptography and a private ledger. A transaction data is signed by a user device using a private key, and may be utilized in an authorization request message without including a real credential of the user. A transaction verification and accounting module (TVAM) can verify the signed transaction data and can continue processing the transaction.Type: GrantFiled: February 26, 2016Date of Patent: June 27, 2023Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Adam Clark, Kim Wagner
-
Patent number: 11677560Abstract: Disclosed are methods for utilizing a memory device as a security token. In one embodiment, a method includes receiving a request to perform an operation; transmitting a nonce to a memory device; receiving a second nonce from the memory device, the second nonce encrypted using a private key of the memory device; verifying the second nonce using a public key of the device, held by the host system; and executing the operation upon successfully verifying the second nonce.Type: GrantFiled: March 9, 2021Date of Patent: June 13, 2023Assignee: Micron Technology, Inc.Inventors: Zhan Liu, Lance W. Dover
-
Patent number: 11658954Abstract: The present invention relates in particular to a pairing method between a multimedia unit and one operator having an operator identifier, the multimedia unit having a multimedia unit identifier and receiving conditional access data from said operator, the method being characterized in that: receiving by the multimedia unit a multimedia unit key formed by applying a first cryptographically function to a personalization key and to the multimedia unit identifier; receiving by the operator an operator key formed by applying a second cryptographically function to said personalization key and to the operator identifier; said multimedia unit further having a function of the multimedia unit and said operator further having a function of the operator, these functions being such that the result of the application of the function of the operator to said operator key and to said multimedia unit identifier is equal to the result of the application of the function of the multimedia unit to said multimedia unit key aType: GrantFiled: June 20, 2019Date of Patent: May 23, 2023Assignee: Nagravision SàrlInventors: Nicolas Fischer, Brecht Wyseur, Jean-Bernard Fischer, Marco Macchetti
-
Patent number: 11645381Abstract: A tool for providing a user configured one-time password. Responsive to receiving a request for a one-time password, the tool sends the one-time password, based at least in part, on a user configured one time password rule. The tool receives a user configured one-time password return value for the one time password. The tool determines whether the user configured one-time password return value satisfies the user configured one-time password rule when applied to the one-time password. Responsive to a determination that the user configured one-time password return value satisfies the user configured one time password rule, the tool accepts the user configured one-time password return value and granting access to the application.Type: GrantFiled: December 11, 2020Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Nader M. Nassar, Tamer Nassar, John E. Moore, Jr., John Yow-Chun Chang
-
Patent number: 11646871Abstract: Systems and methods that may be used to provide multitenant key derivation and management using a unique protocol in which key derivation may be executed between the server that holds the root key and a client that holds the derivation data and obtains an encryption key. In one or more embodiments, the derivation data may be hashed. The disclosed protocol ensures that the server does not get access to or learn anything about the client's derived key, while the client does not get access to or learn anything about the server's root key.Type: GrantFiled: August 12, 2020Date of Patent: May 9, 2023Assignee: INTUIT INC.Inventors: Margarita Vald, Olla Nasirov, Gleb Keselman, Yaron Sheffer, Sergey Banshats
-
Patent number: 11646889Abstract: Set of two or more dongles for providing a digital signature, wherein each dongle holds a secret key, wherein each dongle is configured to receive a message, to compute a digital signature of the received message using the secret key, and to transmit the computed digital signature, wherein at least one of the dongles is configured to, before computing the digital signature, verify the presence of at least one other dongle belonging to the set, and to compute the digital signature only upon successful verification of the presence of one or more other dongles.Type: GrantFiled: December 18, 2018Date of Patent: May 9, 2023Assignee: RIDDLE & CODE GMBHInventor: Thomas Fuerstner
-
Patent number: 11640289Abstract: A system and method for deploying software is disclosed. The system includes an architecture for deploying simulation software as a service. The architecture includes a client layer. The client layer includes an edge device, a resource manager, an update framework, a firewall, and a key management system. The architecture further includes a control layer communicatively coupled to the client layer, wherein a portion of the control layer is configured within a server. The control layer includes an application programming interface, one or more containers, wherein at least one of the one or more containers is a simulation processing container. The control layer further includes an orchestration node, a continuous integration tool, one or more processors, and a content delivery network module. The architecture further includes a data layer communicatively coupled to the one or more containers.Type: GrantFiled: August 24, 2020Date of Patent: May 2, 2023Assignee: Rockwell Collins, Inc.Inventors: Rishabh Kaushik, Jeanette M. Ling, Abhishek Verma
-
Patent number: 11620671Abstract: According to one aspect of the present invention, there is provided a method for managing a medical information platform using a blockchain, the method comprising the steps of: dynamically calculating an exchange ratio between tokens and points, with reference to at least one of an amount of points that a user intends to exchange for tokens on a medical information platform, an amount of tokens that the user intends to exchange for points on the medical information platform, an amount of tokens present in a token pool managed by the medical information platform, and an amount of points previously exchanged for tokens on the medical information platform; and providing the user with the tokens or points exchanged with reference to the calculated exchange ratio.Type: GrantFiled: April 10, 2018Date of Patent: April 4, 2023Assignee: MediBloc Co., Ltd.Inventors: Woo Kyun Kho, Eun Sol Lee
-
Patent number: 11621837Abstract: Systems and methods for securing encrypted data wherein a sending computer encrypts data to be transmitted with an encryption key. The encryption key itself is not sent, but can be derived from a second key and third key. The second key is modified such that an incomplete portion of the second key is sent along with the message to a recipient computer. The third key is sent separately to the recipient computer. The recipient computer obtains the remainder of the second key, reconstructs the complete second key and then uses it with the third key to derive a decryption key to decrypt the message.Type: GrantFiled: September 3, 2020Date of Patent: April 4, 2023Assignee: Theon Technology LLCInventor: Robert Edward Grant
-
Patent number: 11622268Abstract: A secure communication method and a secure communications apparatus related to the field of communications technologies and applied to a terminal. The terminal has a first security context and a second security context, the first security context is used by the terminal to communicate with a first network, the second security context is used by the terminal to communicate with a second network, and the first security context and the second security context include different first information.Type: GrantFiled: May 14, 2020Date of Patent: April 4, 2023Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: He Li, Jing Chen, Huan Li
-
Patent number: 11615403Abstract: A processor-implemented system and method for dynamically retrieving an attribute value of an identity claim for a user using a digitally signed access token that is digitally signed by a user device, at a relying party device associated with a relying party. The method includes (i) making an API call to retrieve at least one identity claim for the user, (ii) processing each identity claim of the user, with the relying party device, to identify if at least one by-reference identity claim that includes a URL of an endpoint, (iii) obtaining the digitally signed access token that is digitally signed by the user device, (iv) invoking the URL of the endpoint with the at least one by-reference identity claim and the digitally signed access token, and (v) dynamically retrieving the attribute value from the URL of the endpoint from an issuing party device associated with an issuing party.Type: GrantFiled: May 6, 2020Date of Patent: March 28, 2023Assignee: Workday, Inc.Inventors: Kamalanathan Thandapani, Lionello G. Lunesu, Aneesh Sandeep Verenkar, Keith Kowal, Prakash Sundaresan
-
Patent number: 11611430Abstract: An arithmetic apparatus includes an interface and a circuity. The interface is connected to an information processing apparatus that is connected to a client apparatus and that processes data in an encrypted state. The circuitry acquires, from the information processing apparatus, encryption input data or encryption target data encrypted with a first encryption key. The circuitry decrypts the acquired, encryption input data or encryption target data with a first decryption key. Then, the circuitry executes a predetermined arithmetic operation on the decrypted arithmetic operation target data, encrypts data of an arithmetic operation result obtained by the predetermined arithmetic operation with the first encryption to key, and outputs the encrypted data of the arithmetic operation result to the information processing apparatus.Type: GrantFiled: March 27, 2020Date of Patent: March 21, 2023Assignee: AXELL CORPORATIONInventor: Yusuke Hoshizuki
-
Patent number: 11601421Abstract: Identity management is disclosed that allows authentication of a user for a third party by way of an encrypted token. A biometric signature can be requested for a user of a user device. In response, an encrypted token can be generated based at least in part on the biometric signature. The encrypted token can then be provided back to the user device, which can save the encrypted token to a secure location on the user device accessible by biometric authentication of the user on the user device. An authentication request can be provided from a third party which includes an encrypted token. A determination can be made regarding whether user identity can be confirmed based on the encrypted token. An indication of whether the user identity was confirmed or unconfirmed can then be communicated in response to the authentication request.Type: GrantFiled: June 23, 2020Date of Patent: March 7, 2023Assignee: Wells Fargo Bank, N.A.Inventor: Darrell L. Suen
-
Patent number: 11595430Abstract: A method, system and computer-usable medium for using pseudonyms to identify entities and their corresponding security risk factors is disclosed. In certain embodiments, a computer-implemented method for identifying security risks associated with a plurality of different entities is disclosed, wherein the method comprises: receiving a stream of events, the stream of events comprising a plurality of events associated with the plurality of different entities; pseudonymizing events of the plurality of events by replacing entity names in the plurality of events with corresponding entity pseudonyms to thereby provide a plurality of pseudonymized events; executing security analytics operations on the plurality of pseudonymized events to identify user behaviors presenting security risks; and using the entity pseudonyms to anonymously identify entities engaging in security risk related behaviors.Type: GrantFiled: May 25, 2021Date of Patent: February 28, 2023Assignee: Forcepoint LLCInventors: Kenneth Sarzynski, Phillip Bracikowski
-
Patent number: 11595191Abstract: A storage apparatus sends a request for a key encryption key to a key management server using a storage apparatus ID as a parameter, acquires the key encryption key, for which a request has been sent to the key management server, and its attribute information, and stores the key encryption key and its attribute information in a key encryption key list while eliminating the key encryption key that is duplicated. Then, in the order listed in the key encryption key list, decryption of the encryption key is attempted by the key encryption key stored in the key encryption key list, and the success or failure of the decryption of the encryption key is determined. When the decryption of the encryption key using the key encryption key fails, the decryption of the encryption key is attempted using a key encryption key, which has not been attempted yet, in the key encryption key list.Type: GrantFiled: February 19, 2021Date of Patent: February 28, 2023Assignee: Hitachi, Ltd.Inventors: Yutaka Yoshida, Mioko Moriguchi
-
Patent number: 11593249Abstract: A method for analyzing software with pointer analysis may include obtaining a software program, and determining a first independent program slice of the software program describing a first code segment of the software program. The method may further include determining, using a first pointer analysis objective, a first result from performing a first pointer analysis on the first independent program slice, and determining, using the first result, a first dependent program slice of the software program. The method may further include determining, using a second pointer analysis objective, a second result from performing a second pointer analysis on the first dependent program slice. The method may further include generating a report, using these results, indicating whether the software program satisfies a predetermined criterion.Type: GrantFiled: December 23, 2015Date of Patent: February 28, 2023Assignee: Oracle International CorporationInventors: Padmanabhan Krishnan, Raghavendra Kagalavadi Ramesh
-
Patent number: 11580184Abstract: The present disclosure provides systems and methods for electronically providing each of a plurality of content distributors with access to a library of content items, facilitating the selection of a combination of the content items, creating a unique set of links for each recipient-distributor combination, and distributing the selected content and unique links via one or more distribution channels to a plurality of recipients. As each link is associated with both a recipient and a distributor, conversion actions stemming from the selection of a link by a recipient are attributed to the proper distributor. Distributors can create content distribution approaches that can be shared with other distributors.Type: GrantFiled: August 6, 2021Date of Patent: February 14, 2023Assignee: Verb Technology Company, Inc.Inventors: Jason R. Matheny, Jason Colby Allen, McKinley Oswald, Jeremy James Oswald, Daniel Ryan O'Marra, Curtis John Gibby, David A. Skinner, Brycen Squire, Alex Dayton Cooper
-
Patent number: 11580145Abstract: A method comprising receiving first data representative of a query. A representation of the query is generated using an encoder neural network and the first data. Words for a rephrased version of the query are selected from a set of words comprising a first subset of words comprising words of the query and a second subset of words comprising words absent from the query. Second data representative of the rephrased version of the query is generated.Type: GrantFiled: September 25, 2018Date of Patent: February 14, 2023Assignee: Amazon Technologies, Inc.Inventors: Anjishnu Kumar, Daniele Bonadiman
-
Patent number: 11580198Abstract: A method for transferring digital multimedia rights, the method including but not limited to requesting permission from the destination end user to transfer the digital multimedia rights to the destination end user device; and if the permission is received from the destination end user, canceling the source set of digital multimedia rights associated with the source end user and transferring the source set of digital multimedia rights associated with the source end user to the destination end user device. A system and computer program product are disclosed for performing the method.Type: GrantFiled: March 6, 2019Date of Patent: February 14, 2023Assignee: AT&T Intellectual Property I, L.P.Inventors: Randolph Wohlert, Paul Van Vleck
-
Patent number: 11582209Abstract: A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.Type: GrantFiled: January 24, 2022Date of Patent: February 14, 2023Inventor: Dennis J. Dupray
-
Patent number: 11569911Abstract: Disclosed is a method of registering a new optical network unit (ONU) to be performed by an optical line terminal (OLT). The method includes transmitting a ranging notification message to a centralized unit (CU)/distributed unit (DU) to register the new ONU, receiving scheduling information for registering the new ONU from the CU/DU in response to the ranging notification message, transmitting a serial number request message to a service region in which ONUs are present based on the received scheduling information, and when the serial number response message is received from the new ONU in response to the serial number request message, registering the new ONU that transmits a serial number request message. The transmitting of the serial number request message is performed through a multi-quiet zone of a short period.Type: GrantFiled: July 6, 2021Date of Patent: January 31, 2023Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Kwang Ok Kim, Kyeong Hwan Doo, Jung-yeol Oh, Han Hyub Lee, Hwan Seok Chung
-
Patent number: 11526887Abstract: Example embodiments relate to transaction authentication using biometric inputs from multiple users. The biometric inputs are input via a single computing entity simultaneously or within a configurable time period. The biometric inputs can be used to generate a transaction authentication record to authenticate the transaction.Type: GrantFiled: October 23, 2019Date of Patent: December 13, 2022Assignee: Optum, Inc.Inventor: Kurt Indermaur
-
Patent number: 11520934Abstract: A method for preventing a differential cryptanalysis attack is provided. The method is implemented by an adaptive scan chain, a control module, and a plaintext analysis module. The plaintext analysis module controls the adaptive scan chain, so that two plaintexts differing in the last bit of only one byte are input through scan chains with different structures. Consequently, the two input plaintexts for which differential cryptanalysis attack technology originally can be used to crack the key are unable to generate outputs that can be used by the differential cryptanalysis attack technology.Type: GrantFiled: March 12, 2021Date of Patent: December 6, 2022Assignees: Nanjing University Of Posts And Telecommunications, NANTONG INSTITUTE OF NANJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS CO., LTD.Inventors: Zhikuang Cai, Xun Xu, Ming Wang, Zixuan Wang, Henglu Wang, Jingqi Yao, Jiafei Yao, Yufeng Guo
-
Patent number: 11514164Abstract: The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes.Type: GrantFiled: January 12, 2021Date of Patent: November 29, 2022Assignee: Advanced Elemental Technologies, Inc.Inventors: Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St. John Redmond
-
Patent number: 11514074Abstract: A method and system for processing query requests, including receiving, at a secondary site, a query request from a client and executing the query request to obtain an archive replica package (ARP). The method further includes making a determination that a record associated with the ARP is not stored at the secondary site and based on the determination, transmitting a request to a primary site. The method further includes, in response to the request to the primary site, receiving an archive package and a record where the archive package is associated with the record, and providing the first record to the client.Type: GrantFiled: October 9, 2019Date of Patent: November 29, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Jeroen Mattijs van Rotterdam, Michael T. Mohen, Pardeep Kumar
-
Patent number: 11509458Abstract: A method and system for securely replicating encrypted deduplicated storages. Specifically, the method and system disclosed herein entail the replication and migration of encrypted data between storage systems that support deduplication. More specifically, a first encrypted data, which may have been encrypted using a first public cryptographic key and consolidated on a source storage system, may be translated into an interim (yet still encrypted) state using a first split private cryptographic key. Thereafter, using a compound conversion key, the interim state data may be further translated into a second encrypted data, which may be characterized as being encrypted by a second public cryptographic key. Therefore, substantively, the method and system disclosed herein may be directed to the translation of encrypted data from one encryption scheme to another while in-flight from a source storage system to a target storage system.Type: GrantFiled: July 17, 2020Date of Patent: November 22, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Jehuda Shemer, Assaf Natanzon
-
Patent number: 11507699Abstract: An example private processing pipeline may include: a masked decryption unit to perform a masked decryption operation transforming input data into masked decrypted data; a masked functional unit to produce a masked result by performing a masked operation on the masked decrypted data; and a masked encryption unit to perform a masked encryption operation transforming the masked result into an encrypted result.Type: GrantFiled: September 27, 2019Date of Patent: November 22, 2022Assignee: Intel CorporationInventors: Casimir Wierzynski, Fabian Boemer, Rosario Cammarota
-
Patent number: 11507665Abstract: The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes.Type: GrantFiled: January 12, 2021Date of Patent: November 22, 2022Assignee: Advanced Elemental Technologies, Inc.Inventors: Victor Henry Shear, Peter Robert Williams, Jaisook Rho, Timothy St. John Redmond
-
Patent number: 11496892Abstract: A secure infrastructure onboarding system includes an infrastructure device with an infrastructure device wireless subsystem that it may use to perform wireless key management system discovery operations in response to initialization. A key management system includes a key management system wireless subsystem it uses to perform the wireless key management system discovery operations with the infrastructure device. The key management subsystem may then wirelessly receive an infrastructure device certificate along with an infrastructure device validation key from the infrastructure device, and validate the first infrastructure device based on the first infrastructure device certificate and the first infrastructure device validation key. In response, the key management system may wirelessly transmit a first credential generation key that is configured for use by the first infrastructure device to generate first authentication credentials.Type: GrantFiled: January 22, 2021Date of Patent: November 8, 2022Assignee: Dell Products L.P.Inventors: Naman Goel, Shivendra Katiyar, Ravishankar Kanakapura Nanjundaswamy, John H. Terpstra
-
Patent number: 11489675Abstract: A computing system for generating tamper-proof electronic messages is disclosed herein. A service provider application receives an electronic message from a client application. The electronic message comprises an authorization provider (AuP) token that includes a public key of a local signing authority (LSA) and a signed payload that has been signed by the LSA using a private key of the LSA that forms a cryptographic key pair with the public key, the signed payload comprising an indication of a programmatic task to be executed by the service provider application. Responsive to validating the AuP token in the electronic message, the service provider application extracts the public key from the electronic message. Responsive to validating the signed payload based upon the extracted public key of the LSA, the service provider application executes the programmatic task.Type: GrantFiled: July 12, 2019Date of Patent: November 1, 2022Assignee: ALLSCRIPTS SOFTWARE, LLCInventors: Stanislav Makarskyy, Sayee Balaji Chandrasekaran, Ram Pratapa, Gaurav Samudra
-
Patent number: 11481852Abstract: A system for generating and applying a secure token in a resource distribution network is provided. For example, a headend system generates a global token based on a time duration specified for multiple meters that are in communication with the headend system through at least a mesh network in a normal condition. The global token is associated with the time duration and is applicable to the multiple meters. The headend system causes the global token to be broadcast via a broadcast network. After receiving the global token, the meter verifies the global token and determines the time duration associated with the global token. The meter further connects premises associated with the meter to a resource distribution network for at least the time duration associated with the global token.Type: GrantFiled: October 18, 2019Date of Patent: October 25, 2022Assignee: LANDIS+GYR INNOVATIONS, INC.Inventor: Pushpesh Kumar Deshmukh
-
Patent number: 11463267Abstract: A network function virtualization system, comprises a request receiving unit that receives a request to a certificate of at least one of data exchanging parties; a private key generator that generates a first private key information using a second private key information stored in a hardware-based isolated secure execution environment, in response to the request; a public key extractor that extracts a public key information of the first private key information; a public key information storage unit that stores the public key information; and a verifying unit that is accessible from the request receiving unit and verifies the certificate using the public key information corresponding to the certificate.Type: GrantFiled: April 18, 2017Date of Patent: October 4, 2022Assignee: NEC CORPORATIONInventors: Pradheepkumar Singaravelu, Sivabalan Arumugam, Anand Prasad, Hironori Ito
-
Patent number: 11461435Abstract: Techniques, for secure processing of encrypted data on public resources, include receiving first data indicating a sequence of reversible q-bit gates including a first segment for decrypting, a second segment for operating on the decrypted data, and a third segment for encrypting the resulting data. Second data indicates rules for replacing a first sequence of two gates operating on at least one shared bit of an input N-bit word with a different second sequence of one or more gates that produce the same output N-bit word. The second data is used to propagate: a gate from the first segment a distance into the second segment or beyond; and, a gate from the third segment a distance into the second segment or before. This produces an obfuscated sequence of reversible gates. Obfuscated instructions based on the obfuscated sequence of gates are sent to the public resources.Type: GrantFiled: December 17, 2018Date of Patent: October 4, 2022Assignees: UNIVERSITY OF CENTRAL FLORIDA RESEARCH FOUNDATION, INC., TRUSTEES OF BOSTON UNIVERSITYInventors: Eduardo Mucciolo, Claudio Chamon
-
Patent number: 11461434Abstract: The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing,Type: GrantFiled: November 6, 2020Date of Patent: October 4, 2022Assignee: OL SECURITY LIMITED LIABILITY COMPANYInventors: David H. Sitrick, Russell T. Fling
-
Patent number: 11409883Abstract: An information handling system may include a circuit board; a processor disposed on the circuit board, wherein the processor includes a media access control (MAC) address and a hidden root key (HRK) encoded therein; and a memory not disposed on the circuit board. The information handling system may be configured to: determine a customer public key (CPK); create a data structure comprising the CPK and the MAC address; encrypt the data structure using the HRK to generate an encrypted structure; and store the encrypted structure in the memory.Type: GrantFiled: January 19, 2021Date of Patent: August 9, 2022Assignee: Dell Products L.P.Inventors: Balaji Bapu Gururaja Rao, Elie Jreij, Paul Vancil, Marshal Savage
-
Patent number: 11411738Abstract: Systems, methods, and apparatuses of using biometric information to authenticate a first device of a user to a second device are described herein. A method includes storing, by the first device, a first key share of a private key and a first template share of a biometric template of the user. The second device stores a public key, and one or more other devices of the user store other key shares and other template shares. The first device receives a challenge message from the second device, measures biometric features of the user to obtain a measurement vector, and sends the measurement vector and the challenge message to the other devices. The first device receives partial computations, generated using a respective template share, key share, and the challenge message, from the other devices, uses them to generate a signature of the challenge message and send the signature to the second device.Type: GrantFiled: October 4, 2019Date of Patent: August 9, 2022Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee
-
Patent number: 11405218Abstract: An example method includes receiving a quantum-resistant double signature (QSDS) message. The QSDS message is generated by digitally signing a quantum SignerInfo (qSignerInfo) attribute of a Quantum Signed Data (QSignedData) message using a private key of a signing party computing system using a quantum-vulnerable signature algorithm. The method then includes verifying the digital signature on the QSDS message, identifying the qSignerInfo attribute in a SignedAttributes value of the QSDS message, transmitting the SignedAttributes value to a QSDS processing computing system, and receiving, from the QSDS processing computing system, a verification notification for the QSignedData message.Type: GrantFiled: August 7, 2020Date of Patent: August 2, 2022Assignee: Wells Fargo Bank, N.A.Inventor: Phillip H. Griffin