User-to-user Key Distributed Over Data Link (i.e., No Center) Patents (Class 380/283)
  • Patent number: 11196547
    Abstract: A lifecycle management method, system, and computer program product include establishing a public key infrastructure (PKI) for end-to-end encryption of control plane and data plane communications by providing encryption between arbitrary components for applicant execution where an interaction pattern is isolated, secure, and a multi-tenant environment.
    Type: Grant
    Filed: March 20, 2019
    Date of Patent: December 7, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jayaram Kallapalayam Radhakrishnan, Vinod Muthusamy, Vatche Isahagian, Scott Boag, Benjamin Herta, Atin Sood
  • Patent number: 11176239
    Abstract: Embodiments as disclosed herein may provide systems and methods for component integration and security. In particular, in one embodiment, a native component that presents a network based interface may be on a device, where that native component may expose a network based interface for access by other components. This native component can then be accessed through the network based interface. To address security concerns and other issues, the native component may be configured to determine if a received request is associated with the same user space and only respond to requests originating from the same user space.
    Type: Grant
    Filed: October 3, 2019
    Date of Patent: November 16, 2021
    Assignee: Open Text SA ULC
    Inventors: Jonathan Carroll, Michel Gagnon, Gregory Pekofsky, Khanh Tuan Vu
  • Patent number: 11082844
    Abstract: A method performed by a network server is provided for authentication and key management for a terminal device in a wireless communication network. The method includes authenticating the terminal device during a primary authentication session for the terminal device. The method further includes responsive to a successful authentication of the terminal device, obtaining a first key. The method further includes generating bootstrapping security parameters. The parameters include a second key derived from the first key and a temporary identifier. The temporary identifier identifies the terminal device and the bootstrapping security parameters.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: August 3, 2021
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Noamen Ben Henda, Helena Vahidi Mazinani, Vesa Lehtovirta
  • Patent number: 11068611
    Abstract: The disclosed computer-implemented method for preventing data loss from data containers may include (1) identifying, at a computing device, a process running in a data container on the computing device, (2) intercepting an attempt by the process to exfiltrate information from the computing device via at least one of a file system operation or a network operation, and (3) performing a security action to prevent the intercepted attempt. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: July 20, 2021
    Assignee: CA, Inc.
    Inventor: Sumit Sarin
  • Patent number: 10999068
    Abstract: An authentication method for a QKD process includes: a sender selects a basis for preparing authentication information according to an algorithm in an algorithms library, and respectively applies different wavelengths to send quantum states of control information and data information according to a preset information format; a receiver filters the received quantum states, employs a basis of measurement corresponding to the algorithm to measure the authentication information quantum state, sends reverse authentication information when the measurement result is in line with the algorithm, and terminates the distribution process otherwise. In addition, the sender terminates the distribution process when its local authentication information is inconsistent with the reverse authentication information.
    Type: Grant
    Filed: June 3, 2019
    Date of Patent: May 4, 2021
    Assignee: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Patent number: 10960314
    Abstract: The present disclosure relates to processing operations configured to efficiently enable a client and a server to establish secure communication upon initial connection between the client and the server. Upon initial connection to with the server, the client provides an encrypted token which serves as both proof of authentication/identity and provides, in the encrypted token, an encryption key that the server can utilize to initiate secure communication with the client. The server is able to trust the encrypted token and the encryption key because the encrypted token is signed and encrypted by an authentication service that has a trusted relationship with the server and because the authentication service has pre-shared decryption and signature verification keys with the server. The server utilizes the encrypted key to secure communications with the client without requiring additional processing to lookup client identity or any further intervention from the authentication service.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: March 30, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Kyle Schouviller, Scott Guest
  • Patent number: 10938556
    Abstract: A method of sharing of a reference key (AppKey) between a connected object and at least one server. The method includes the object applying a function (f) to at least one datum (DevEUI, AppEUI, DevNonce) and to a key (KSE) specific to a secure element of the object to generate the reference key, transmitting to the server a join request of the object to a network of connected objects, which include the datum, and the key (KSE) of the secure element not being transmitted to the server. The method further includes obtaining, by the server, of the key (KSE) of the secure element on the basis of the request, the server applying the function (f) to the datum and to the key (KSE) obtained by the server, so as to obtain the reference key.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: March 2, 2021
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Julien Bringer, Vincent Bouatou
  • Patent number: 10902137
    Abstract: This application relates to a technique that enables a software application to perform an operation on a file stored on a file system, while enforcing privacy measures. The technique includes receiving, from a file browser, a selection of file made accessible by a file access service. The file access service is associated with the file system storing the file. The file browser executes in a mode that prevents the software application from identifying content displayed within the file browser. The technique also includes, provided the software application is authorized to access the file, communicating a first list of operations for receipt by the software application, in which the software application selects a first subset of operations, to perform on the file. Furthermore, the technique includes establishing, to perform the first subset of operations on the file, a first direct communication link between the software application and the file access service.
    Type: Grant
    Filed: November 3, 2017
    Date of Patent: January 26, 2021
    Assignee: Apple Inc.
    Inventors: Jean-Gabriel Morard, Anthony S. Parker, Rony Fadel, Kevin S. Perry
  • Patent number: 10902392
    Abstract: An improved financial terminal automatically reconfigures into different financial processing terminal types. In one embodiment, the terminal comprises a housing; a card reader configured to accept at least a portion of a card having an integrated circuit; at least one display; at least one processor; and at least one memory configured to store machine readable code, the machine readable code comprising a first kernel corresponding to a first transaction type and a second kernel corresponding to a second transaction type.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: January 26, 2021
    Assignee: Everi Payments Inc.
    Inventors: Timothy Richards, Dale Baltzell, Brian T. Sullivan
  • Patent number: 10896413
    Abstract: Methods, systems and apparatus are provided for facilitating financial transactions using an IC type financial card via a terminal. A user is provided a list of transaction types, such as PIN-based, signature-based, etc., and a requested transaction is processed via a first selected transaction type. If the transaction is unsuccessful, the terminal automatically presents a list of remaining available transaction types from which the user may select and the transaction is processed by the next selected transaction type. If the transaction is successful, funds are provided to the user, such as in the form of currency/coins or funds transfer.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: January 19, 2021
    Assignee: Everi Payments Inc.
    Inventors: Timothy Richards, Dale Baltzell, Brian T. Sullivan
  • Patent number: 10860744
    Abstract: A system and method of downloading firmware into an embedded device while maintaining the integrity and confidentiality of the firmware is disclosed. In one embodiment, the process comprises four phases. In the first phase, unauthenticated content is written into the memory of the embedded device. In the second phase, this content is verified. In the third step, a secure connection is established between the host and the embedded device. In the fourth step, the firmware is loaded into the embedded device using this secure connection. The firmware is encrypted as it is transferred from the host to the embedded device and is never accessible outside of the embedded device.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: December 8, 2020
    Assignee: Silicon Laboratories, Inc.
    Inventor: Joshua Jay Norem
  • Patent number: 10812252
    Abstract: In aspects of string matching in encrypted data, a computing device stores homomorphic encrypted data as a dataset, and implements a string matching application that receives an encrypted query string as a query of the homomorphic encrypted data. The string matching application can then apply algorithms to perform addition and multiplication operations, and determine whether there are matching strings of the encrypted query string in the dataset. The string matching application can compute, for each row of the dataset, a sum of some function of dataset bits and query bits for a row result, and multiply the row results of the computed rows to determine matching strings. Alternatively, the string matching application can compute, for each row of the dataset, a product over some function of the dataset bits and the query bits for a row result, and add the row results of the computed rows to determine matching strings.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: October 20, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Kim Henry Martin Laine, Hao Chen, Gizem S. Cetin, Yuhou Xia, Peter B. Rindal, Kristin Estella Lauter
  • Patent number: 10742413
    Abstract: Embodiments of the present invention may provide the capability for performing public-key encryption with proofs of plaintext knowledge using a lattice-based scheme that provides improved efficiency over conventional techniques. For example, in an embodiment, a computer-implemented method of verifying encryption may comprise generating a ciphertext, derived from a plaintext, via an encryption scheme, proving validity of the ciphertext, wherein the proof includes at least one challenge value, and using a decryption procedure that recovers a plaintext by choosing at least one additional challenge value at random from a challenge space.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Vadim Lyubashevsky, Gregory Neven
  • Patent number: 10721064
    Abstract: Various embodiments relate to a key protocol exchange that provide a simple but still secure key exchange protocol. Security of key exchange protocols has many aspects; providing and proving all these properties gets harder with more complex protocols. These security properties may include: perfect forward secrecy; forward deniability; key compromise impersonation resistance; security against unknown key share attack; explicit or implicit authentication; key confirmation; protocol is (session-)key independent; key separation (different keys for encryption and MACing); extendable, e.g. against DOS attacks . . . (e.g. using cookies, . . . ); support of early messages; small communication footprint; and support of for public-key and/or password authentication.
    Type: Grant
    Filed: May 30, 2018
    Date of Patent: July 21, 2020
    Assignee: NXP B.V.
    Inventor: Bjorn Fay
  • Patent number: 10708978
    Abstract: Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A Virtual Private Network (VPN) service application is operated to route outgoing and incoming data packets of a mobile device. The mobile device is (i) either coupled to a remote server through the VPN service application for data packets transfer between the remote server and the mobile device or (ii) performs cross-layer translation for data packets transfer between the mobile device and direct target hosts on the Internet. Concurrently using multiple channels secures data packets transfer by sending encrypted data packets over multiple channels and receiving the encrypted data packets by a single apparatus. Data packets are designated to be transferred via a Wi-Fi channel or a cellular channel, and then transferred using both the Wi-Fi channel and the cellular channel.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: July 7, 2020
    Assignee: SHOELACE WIRELESS, INC.
    Inventors: Minh Thoai Anh Le, James A. Mains
  • Patent number: 10687263
    Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment concurrently communicates with a source base station (BS) and a target BS on a connection with the source BS and a connection with the target BS as part of a make-before-break (MBB) handover procedure; and performs a common packet data convergence protocol (PDCP) function for the connection with the source BS and the connection with the target BS before the connection with the source BS is released as part of the MBB handover procedure. Numerous other aspects are provided.
    Type: Grant
    Filed: February 13, 2019
    Date of Patent: June 16, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Karthika Paladugu, Gavin Bernard Horn, Prashanth Haridas Hande, Keiichi Kubota, Prasad Reddy Kadiri, Alberto Rico Alvarino, Masato Kitazoe, Umesh Phuyal, Supratik Bhattacharjee
  • Patent number: 10685333
    Abstract: In one embodiment, a method for automatic inference of meeting attendance is provided. The method comprises sending a calendar request to a plurality of users that are invited to a meeting. The method further comprises receiving from each user of the plurality, a unique string identifying the user. The method further comprises generating a lookup table identifying the users of the plurality and their respective unique strings. The method further comprises receiving a first string broadcasted by a first user during the meeting. The method further comprises, responsive to determining that the broadcasted first string does not match one of the unique strings in the lookup table, performing an action to prevent the first user from receiving meeting content determined to be confidential.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: June 16, 2020
    Assignee: International Business Machines Corporation
    Inventors: Christopher J. Poole, Mark A. Woolley, Andrew Wright
  • Patent number: 10671747
    Abstract: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: June 2, 2020
    Inventors: Dipankar Dasgupta, Arunava Roy, Debasis Ghosh
  • Patent number: 10616213
    Abstract: A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of accounts. Various cryptographic primitives are used to manipulate passwords to generate verifiers. The verifiers are used with external hardware security modules (HSMs) to eliminate HSMs and intermediate steps between the HSM and login servers as potential breach points.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: April 7, 2020
    Assignee: Airbnb, Inc.
    Inventors: Ismail Cem Paya, Kevin Nguyen
  • Patent number: 10599677
    Abstract: A computer-implemented method of a distributed database system includes generating a database index. The method includes mapping a first specified number of bits of the database index to a database key. The method includes mapping a second specified number of bits to a data object associated with the database key. The method includes storing the first specified number of bits of the database key in a dram memory. The method includes storing second specified number of bits with the data object in a solid-state device (SSD) storage.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: March 24, 2020
    Inventors: Brian J. Bulkowski, Andrew Gooding, Venkatachary Srinivasan
  • Patent number: 10600506
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for creating source-specific, persistent patient identifiers for healthcare service providers. One method includes accessing a record of healthcare data, wherein the record includes patient identifying information (PII) associated with one or more persons to whom the healthcare data pertains. The portions of PII included in the accessed record of healthcare data are extracted from the accessed record and encrypted. Based on one or more business rules, one or more hashed tokens are created by applying one or more hashing functions to the extracted portions of PII. A source-specific identifier is received, the source-specific identifier having been encoded in a manner specific to an organization associated with the computer system and having been encoded with reference to the one or more hashed tokens. An association is stored between the source-specific identifier and the accessed record of healthcare data.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: March 24, 2020
    Assignee: IQVIA Inc.
    Inventors: Christopher Blum, Geoff Wall, John Giannouris
  • Patent number: 10594480
    Abstract: This invention establishes means and protocols to secure data, and practice online authentication, using large undisclosed amounts of randomness, replacing the algorithmic complexity paradigm. Computation is limited to basic primitives like transposition, and bit-flipping. Security is credibly appraised through combinatorics calculus, and this transfers the security responsibility to the user who determines how much randomness to use.
    Type: Grant
    Filed: February 12, 2018
    Date of Patent: March 17, 2020
    Inventor: Gideon Samid
  • Patent number: 10587585
    Abstract: Users desire a system that provides for the setting of custom, content-agnostic, permissions at a message, document, and/or sub-document-level through a communications network. Such a system may also allow the user to apply customized privacy settings and encryption keys differently to particular parts of a document. Customized encryption keys may be applied to particular parties (or groups of parties) to enhance the security of the permissions settings. In the case of structured document file types, dynamically-rendered content can present a challenge to accurately display to viewers, because one or more of the document's values referred to by the dynamically-rendered content may be encrypted or otherwise unavailable to the recipient—even though the dynamically-rendered content itself is viewable by the recipient.
    Type: Grant
    Filed: December 31, 2016
    Date of Patent: March 10, 2020
    Assignee: Entefy Inc.
    Inventor: Alston Ghafourifar
  • Patent number: 10496968
    Abstract: An improved financial terminal automatically reconfigures into different financial processing terminal types. In one embodiment, the terminal comprises a housing; a card reader configured to accept at least a portion of a card having an integrated circuit; at least one display; at least one processor; and at least one memory configured to store machine readable code, the machine readable code comprising a first kernel corresponding to a first transaction type and a second kernel corresponding to a second transaction type.
    Type: Grant
    Filed: February 9, 2018
    Date of Patent: December 3, 2019
    Assignee: Everi Payments Inc.
    Inventors: Timothy Richards, Dale Baltzell, Brian T. Sullivan
  • Patent number: 10491394
    Abstract: The present disclosure relates to a method and a device for processing a verification code. The method includes: acquiring the verification code in a message; determining whether the verification code has expired; and allowing an operation corresponding to the verification code if the verification code has not expired.
    Type: Grant
    Filed: September 22, 2017
    Date of Patent: November 26, 2019
    Assignee: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
    Inventors: Liangxiong Wu, Jiankai Zhao, Jianquan Liu
  • Patent number: 10412546
    Abstract: A system includes a processor configured to detect a vehicle wireless signal at a first frequency-band. The processor is also configured to choose a second signal at a second frequency-band having a predefined relationship to a requested action. The processor is further configured to connect to the second signal and lower a signal data-transfer rate, responsive to the detection, and use the second signal to perform a time-of-flight based user-proximity detection, to determine if a user is within a vehicle proximity range associated with the requested action.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: September 10, 2019
    Assignee: FORD GLOBAL TECHNOLOGIES, LLC
    Inventors: Hamid M. Golgiri, Vivekanandh Elangovan, Aaron Matthew DeLong
  • Patent number: 10348496
    Abstract: A method for leveraging a first secure channel of communication between a first agent and a second agent to create a second secure channel of communication between the first agent and a third agent. The method includes creating the first secure channel of communication between the first agent and the second agent using a configurable data-driven initial process on a first computing device. Responsive to the first agent receiving a request from the third agent to establish the second secure channel of communication, the method further includes retrieving identifying information from the third agent. The method further includes ending the identifying information from the third agent to the second agent over the first secure channel of communication. Responsive to receiving approval of the third agent's request from the second agent, the method further includes establishing the second secure channel of communication.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: July 9, 2019
    Assignee: Uniken, Inc.
    Inventors: Bimal I. Gandhi, Nishant Kaushik, Robert Alan Levine, James Anthony Villarrubia, Tejas Digambar Limaye
  • Patent number: 10321314
    Abstract: There is provided a communication device including: a storage unit configured to store an authentication key generated from a plurality of keys; a communication unit configured to receive authentication key identification information for specifying the authentication key; and an authentication unit configured to perform an authentication process for a transmission source of the authentication key identification information using the authentication key specified from the storage unit based on the authentication key identification information.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: June 11, 2019
    Assignee: SONY CORPORATION
    Inventor: Yoshihito Ishibashi
  • Patent number: 10313135
    Abstract: A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user's certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient's certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: June 4, 2019
    Assignee: Google LLC
    Inventors: Robert B. Lord, Terry N. Hayes, Justin Uberti
  • Patent number: 10263960
    Abstract: A wireless communication device 1 encrypts a passphrase which corresponds to a communication mode after change and which is a character string for authentication by using an encryption key PTK corresponding to a communication mode before change, and transmits the encrypted passphrase to a wireless communication device 2, and also creates an encryption key PTK corresponding to the communication mode after change from the passphrase corresponding to the communication mode after change. The wireless communication device 2 receives the encrypted passphrase transmitted from the wireless communication device 1 and decrypts the encrypted passphrase by using an encryption key PTK corresponding to the communication mode before change, and also creates an encryption key PTK corresponding to the communication mode after change from the decrypted passphrase.
    Type: Grant
    Filed: July 14, 2014
    Date of Patent: April 16, 2019
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventors: Shintaro Fujikami, Yukimasa Nagai, Takenori Sumi
  • Patent number: 10263959
    Abstract: A method for communicating medical data includes forming a secure channel between a first medical device and a second medical device connected to each other through a network on the basis of first authentication information of the first medical device and second authentication information of the second medical device; encrypting medical data that is obtained by the first medical device using a secure circuit that is provided in the first medical device; and transmitting the encrypted medical data to the second medical device through the secure channel.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: April 16, 2019
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Sung-Hoon Son, Ki-Hyoun Kwon, Seung-Ho Lee, Jun-Ho Lee, Jerome Han
  • Patent number: 10210489
    Abstract: A method of authenticating to a computer server involves a first authentication client transmitting an authentication token to the computer server via a first communications channel, and a second authentication client receiving a payload from the computer server via a second communications channel distinct from the first communications channel in accordance with an outcome of a determination of authenticity of the authentication token by the computer server.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: February 19, 2019
    Assignee: SecureKey Technologies Inc.
    Inventors: Andre Michel Boysen, Troy Jacob Ronda, Pierre Antoine Roberge, Patrick Hans Engel, Gregory Howard Wolfond
  • Patent number: 10212142
    Abstract: A method of establishing a network by sharing a secret between a first entity (A) and a second entity (B), comprising the steps of: the first entity (A) broadcasting (100) an ANNOUNCE message announcing its identity and details of other entities it is aware of, wherein each of the other entities of which it is aware is associated with a particular nonce, and the message is encrypted using a broadcast encryption scheme common to the first and second entities (A,B), and; the second entity (B), upon receiving and decrypting the ANNOUNCE message, transmitting (110) to the first entity (A) a SHARE message, wherein the SHARE message comprises a signcryption of the secret, authenticated using signcryption data associated with the particular nonce associated with the second entity (B).
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: February 19, 2019
    Assignee: BAE Systems plc
    Inventors: Christopher Mark Dearlove, Alan Manuel Cullen, Kenneth Graham Paterson, Jacob Chroeis Nakamura Schuldt
  • Patent number: 10212761
    Abstract: Systems and methods that efficiently combine multiple wireless networks or devices resulting in faster, more reliable, and more secure mobile Internet. A Virtual Private Network (VPN) service application is operated to route outgoing and incoming data packets of a mobile device. The mobile device is (i) either coupled to a remote server through the VPN service application for data packets transfer between the remote server and the mobile device or (ii) performs cross-layer translation for data packets transfer between the mobile device and direct target hosts on the Internet. Concurrently using multiple channels secures data packets transfer by sending encrypted data packets over multiple channels and receiving the encrypted data packets by a single apparatus. Data packets are designated to be transferred via a Wi-Fi channel or a cellular channel, and then transferred using both the Wi-Fi channel and the cellular channel.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: February 19, 2019
    Assignee: SHOELACE WIRELESS, INC.
    Inventors: Minh Thoai Anh Le, James A. Mains
  • Patent number: 10165421
    Abstract: A method of identifying contact between terminals, and a computer program and an application for executing the method are disclosed. The method for identifying contact between terminals according to this invention includes the server receiving from a first terminal a first state information data of a first terminal based on information about an external magnetic force of the first terminal generated by a first terminal; receiving, by the server, second state information data of the second terminal based on the information about the external magnetic force of the second terminal generated in the second terminal from the second terminal; determining whether a difference between a time when the first state information data is generated and a time when the second state information data is generated is within a preset time; and the step of transmitting a message to at least one of the first terminal and the second terminal according to the determination by the server.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: December 25, 2018
    Assignee: DINGUL CO. LTD.
    Inventor: Seung Wook Choi
  • Patent number: 10158609
    Abstract: A user terminal device is disclosed. A user terminal device that supports an instant messenger service includes: a display unit for providing an instant messenger service screen including an output message; and a control unit for, when the output message is an encrypted message, decrypting the encrypted message according to a predetermined event and providing the decrypted message to the screen or another screen separate from the screen.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: December 18, 2018
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jung-hwan Lim, Sung-kee Kim
  • Patent number: 10110552
    Abstract: The present invention is directed to a node (device), system, and computer program for providing secure dynamic address resolution and communication, without having to utilize third party DNS and/or MX server(s). Accordingly, a node may include processor and memory having instructions thereon, that when executed, cause the node to pair with another node. The pairing may include creating a DNS record on the node including a current address associated with the second node, this current address may be dynamically updated. The instructions may further allow the node to transmit a message to the second node, based on a resolved address from the DNS record on the first node. Authentication, dynamic message encryption and the provision of a DNS cache may further be implemented on the node.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: October 23, 2018
    Inventor: Willie L. Donaldson
  • Patent number: 10104545
    Abstract: An anonymity authentication method for wireless sensor networks is provided. A smart card carried by a user is used to provide two-factor verification protection. Moreover, a random factor and a hash function operation are introduced for participating an operation of the transmitted messages in all phases. Moreover, the operation of the transmitted messages uses only hash function and XOR operator.
    Type: Grant
    Filed: November 2, 2016
    Date of Patent: October 16, 2018
    Assignee: NATIONAL CHIN-YI UNIVERSITY OF TECHNOLOGY
    Inventor: Chi-Tung Chen
  • Patent number: 10068210
    Abstract: Methods, systems and apparatus are provided for facilitating financial transactions using an IC type financial card via a terminal. A user is provided a list of transaction types, such as PIN-based, signature-based, etc., and a requested transaction is processed via a first selected transaction type. If the transaction is unsuccessful, the terminal automatically presents a list of remaining available transaction types from which the user may select and the transaction is processed by the next selected transaction type. If the transaction is successful, funds are provided to the user, such as in the form of currency/coins or funds transfer.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: September 4, 2018
    Assignee: Everi Payments Inc.
    Inventors: Timothy Richards, Dale Baltzell, Brian T. Sullivan
  • Patent number: 10027482
    Abstract: A method and a cryptographic device for encrypting/decrypting an input message by using an algorithm having as entries, said input message, a cryptographic key, and a complementary unique value used as parameter of the algorithm. The output data is formed by the input message decrypted/encrypted by the algorithm using the cryptographic key and the complementary value. The latter is determined on the basis of a unique value physically bound to an electronic device by using a physically unclonable function (PUF) which is inherent to this device and which is used to generate this unique value from a plurality of physical measurements carried out on components integrated in said device.
    Type: Grant
    Filed: June 17, 2014
    Date of Patent: July 17, 2018
    Assignee: Nagravision S.A.
    Inventors: Marco Macchetti, Claudio Favi
  • Patent number: 10015287
    Abstract: A system tunnels real-time communications (“RTC”). The system creates a connection between a tunneling client and a signaling server. The connection includes a stream-based tunnel between the tunneling client and a tunneling server and a stream connection between the tunneling server and the signaling server. The system then receives, from the tunneling client, stream traffic encapsulated as datagram traffic within the stream-based tunnel. The system translates the datagram traffic into the stream traffic, and forwards the stream traffic to the signaling server over the stream connection.
    Type: Grant
    Filed: March 4, 2015
    Date of Patent: July 3, 2018
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Rolando Herrero, Henry Katz
  • Patent number: 10009328
    Abstract: In one embodiment, a system including one or more hardware processors is: to receive a user request to access a website; sign a nonce with at least some of the plurality of group private keys, the at least some of the plurality of group private keys corresponding to personalization attributes of the website; and send the signed nonce to a web server to enable personalized interaction with the web server. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: June 26, 2018
    Assignee: McAfee, LLC
    Inventors: Ned M. Smith, Sven Schrecker, Howard C. Herbert
  • Patent number: 9979542
    Abstract: Embodiments relate to deduplication and compression on data performed downstream from where the data is encrypted. Confidentiality of data is maintained, and the ability of storage systems to perform data reduction functions is supported. Encrypted data to be written to a storage system is separated into one or more data chunks. For a data chunk, a master encryption key for an owning entity associated with the data chunk is retrieved. The data chunk is decrypted into plaintext, and the plaintext is transformed by performing one or more advanced data functions. A private key is created and used to encrypt the transformed plaintext, which is stored as a first encryption unit. A wrapped key is created by encrypting the private key with the master key, limits data access to the owning entity, and is stored as metadata for the encryption unit.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: May 22, 2018
    Assignee: International Business Machines Corporation
    Inventors: Elli Androulaki, Nathalie Baracaldo, Joseph S. Glider, Alessandro Sorniotti
  • Patent number: 9954684
    Abstract: Among other things, at a central server, management of a document sharing process includes uploading from client devices through a communication network, storing at the server, and downloading to client devices through the communication network documents that are shared between users of the client devices. Encryption keys are used to protect features of the documents from unauthorized or unintended disclosure. Operations are performed on encryption keys or encrypted data as a result of which protection of features of the documents from unauthorized or unintended disclosure may be compromised. A determination is made whether performance of a given one of the operations on any of the encryption keys or encrypted data meets predefined conditions for approval by members of an approval group. Performance of the operation on the encryption key or encrypted data is controlled based on a result of the determination.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: April 24, 2018
    Assignee: PreVeil LLC
    Inventors: Raluca Ada Popa, Nickolai Zeldovich, Sanjeev Verma, Randall Steven Battat, Aaron Delano Burrow
  • Patent number: 9913177
    Abstract: A communication system is described in which user plane communication and control plane communication for a particular mobile communication device can be split between a base station that operates a small cell and a macro base station. Appropriate security for the user plane and control plane communications is safeguarded by ensuring that each base station is able to obtain or derive the correct security parameters for protecting the user plane or control plane communication for which it is responsible.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: March 6, 2018
    Assignee: NEC Corporation
    Inventor: Vivek Sharma
  • Patent number: 9882713
    Abstract: A method for securing communications for a given network topology is provided. The method comprises generating by a node N(i) of the network, security parameters for the node N(i); transmitting by the node N(i), said security parameters to a controller for the network; maintaining by the controller said security parameters for the node N(i); receiving by the controller a request from a node N(j) for the security parameters for the node N(i); retrieving by the controller the security parameters for the node N(i); and transmitting by the controller said security parameters to the node N(j).
    Type: Grant
    Filed: January 30, 2013
    Date of Patent: January 30, 2018
    Assignee: VIPTELA INC.
    Inventors: Syed Khalid Raza, Praveen Raju Kariyanahalli, Rameshbabu Prabagaran, Amir Khan
  • Patent number: 9876823
    Abstract: In one embodiment, a method includes receiving, in a system of an external verifier of a first network, a plurality of attestation reports and a plurality of attestation values from a plurality of reporting nodes of the first network, each of the plurality of attestation values randomly generated in the corresponding reporting node based on a common random seed value; determining whether at least a threshold number of the plurality of attestation values match; responsive to at least the threshold number of the plurality of attestation values matching, decrypting the plurality of attestation reports, processing the decrypted plurality of attestation reports to obtain aggregated telemetry data of the plurality of nodes, where identity of the plurality of nodes remains anonymous to the external verifier; and enforcing a security policy based at least in part on the aggregated telemetry data. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: January 23, 2018
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Rajesh Poornachandran
  • Patent number: RE47841
    Abstract: Using the same mathematical principle of paring with errors, which can be viewed as an extension of the idea of the LWE problem, this invention gives constructions of a new key exchanges system, a new key distribution system and a new identity-based encryption system. These new systems are efficient and have very strong security property including provable security and resistance to quantum computer attacks.
    Type: Grant
    Filed: January 26, 2018
    Date of Patent: February 4, 2020
    Inventor: Jintai Ding
  • Patent number: RE48643
    Abstract: Using the same mathematical principle of paring with errors, which can be viewed as an extension of the idea of the LWE problem, this invention gives constructions of a new key exchanges system, a new key distribution system and a new identity-based encryption system. These new systems are efficient and have very strong security property including provable security and resistance to quantum computer attacks.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: July 13, 2021
    Inventor: Jintai Ding
  • Patent number: RE48644
    Abstract: Using the same mathematical principle of paring with errors, which can be viewed as an extension of the idea of the LWE problem, this invention gives constructions of a new key exchanges system, a new key distribution system and a new identity-based encryption system. These new systems are efficient and have very strong security property including provable security and resistance to quantum computer attacks.
    Type: Grant
    Filed: November 21, 2019
    Date of Patent: July 13, 2021
    Inventor: Jintai Ding