Key Escrow Or Recovery Patents (Class 380/286)
-
Patent number: 12166875Abstract: A working method for a key device and a key device, including: a smart key apparatus receives an authentication instruction, determines a type of the authentication instruction, parses a FIDO2 authentication instruction to obtain a credential if the instruction is the FIDO2 authentication instruction, checks whether the credential is complete by using a changing key corresponding to the FIDO2, if a check is successful, the credential is registered in a FIDO2 mode, and the authentication response is generated and returned to the client; and if the check fails, whether the credential is complete is checked by using the changing key corresponding to a U2F, and the credential is registered in a U2F mode if a check is successful, the authentication response is generated and returned to the client, and an error response is returned to the client if the check fails.Type: GrantFiled: September 9, 2021Date of Patent: December 10, 2024Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 12130902Abstract: A security gate system includes an admission card and a security gate apparatus. The admission card has condition data that is data for specifying a condition to be satisfied when or before or after encrypted authentication data are transferred from the admission card to the security gate apparatus. When a user attempts to enter a building, authentication data including condition data are generated in the admission card 100 (S802), and encrypted into encrypted authentication data (S803). The encrypted authentication data are transmitted from the admission card to the security gate apparatus (S804, S904), and decrypted to be returned to the authentication data (S905). The security gate apparatus performs authentication determination which is a determination as to whether a condition specified by the condition data included in the authentication data is satisfied (S906), and opens a gate plate when a determination result is positive (S907).Type: GrantFiled: September 1, 2023Date of Patent: October 29, 2024Assignee: NTI, INC.Inventor: Takatoshi Nakamura
-
Patent number: 12095907Abstract: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.Type: GrantFiled: June 8, 2022Date of Patent: September 17, 2024Assignee: APPLE INC.Inventors: Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha, Yannick L. Sierra, Dian Wen, Ka Yang
-
Patent number: 12061731Abstract: A security key is configured to be replaced when a device is replaced in a machine-to-machine (M2M) system. A method for operating a first device may include: receiving a first message including first information associated with security key replacement from a second device or a third device; receiving a third message including second information associated with security key replacement, which is generated based on a second message including a security key replacement indication, from the second device or the third device; and replacing the security key.Type: GrantFiled: January 10, 2022Date of Patent: August 13, 2024Assignees: Hyundai Motor Company, Kia Motors Corporation, Industry Academy Cooperation Foundation of Sejong UniversityInventors: Jae Seung Song, Min Byeong Lee, Jongmyung Park
-
Patent number: 12026291Abstract: A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.Type: GrantFiled: January 21, 2022Date of Patent: July 2, 2024Assignee: DELL PRODUCTS L.P.Inventors: Mukund Khatri, Sanjeev S. Dambal, Chandrashekar Nelogal, Karthikeyan Rajagopalan, Craig Warren Phelps
-
Patent number: 12010229Abstract: Systems and methods for enforcing durability of second level encryption keys by a key management system (KMS) are provided. In embodiment, a method includes: receiving a first request to encrypt a first level key, the request including the first level key and a second level key identification associated with a stored encrypted second level key; determining that a durability check of the encrypted second level key is required based on the request; determining a durability status of the encrypted second level key by comparing actual storage of the encrypted second level key in one or more storage locations with predetermined storage rules for a durability level of the encrypted second level key, wherein the durability status indicates that the storage of the encrypted second level key complies with the durability level; and sending a notification regarding the durability status to the data storage service.Type: GrantFiled: May 25, 2021Date of Patent: June 11, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vaijayanthimala K. Anand, Wesley Leggette, Akila Srinivasan, Bruno Henriques, Cameron Paul Kurotori
-
Patent number: 11977924Abstract: A distributed ledger and transaction computing network fabric over which large numbers of transactions are processed concurrently in a scalable, reliable, secure and efficient manner. The computing network fabric or “core” supports a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently, with little synchronization, at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. The nodes operate on blocks independently from one another while still maintaining a consistent and logically-complete view of the blockchain as a whole.Type: GrantFiled: November 13, 2018Date of Patent: May 7, 2024Assignee: Akamai Technologies, Inc.Inventors: David C. Carver, Samuel Erb
-
Patent number: 11962691Abstract: Techniques are provided for generating and using a multi-signature token for electronic message validation according to the one or more embodiments as described herein. Specifically, a multi-signature token may be generated that includes at least two digital signatures and information (e.g., user information). Each of the at least two digital signatures may be generated using a private key of at least two key pairs that are maintained on a plurality of keystores that have at least two different implementations (e.g., security protocols). If the at least two digital signatures are valid, the multi-signature token may be determined to be valid and the client request may optionally be performed. If at least one of the at least two digital signatures is invalid, the client request is optionally not performed.Type: GrantFiled: June 14, 2023Date of Patent: April 16, 2024Assignee: FMR LLCInventors: Robert Cannata, Arun Nadger
-
Patent number: 11949780Abstract: A disclosed example gateway node includes network communicator circuitry, memory, instructions, and processor circuitry. The network communicator circuitry is to send a first portion of a multi-part secret key to a first secret holder node, and send a plurality of shares of a second portion of the multi-part secret key to second secret holder nodes. The processor circuitry is to execute the instructions to combine responses from the first secret holder node and at least one of the second secret holder nodes to generate a combined authentication message, the network communicator circuitry to send the combined authentication message to a terminal node for authentication.Type: GrantFiled: July 19, 2022Date of Patent: April 2, 2024Assignee: Intel CorporationInventors: Alexandra Afanasyeva, Sergey Bezzateev, Vitaly Petrov, Konstantin Zhidanov, Natalia Voloshina, Vladimir Zybin, Anna Bakunova
-
Patent number: 11924337Abstract: An aspect of the present invention is provided with a sensitive data protection code generating unit which generates a sensitive data protection code of a predetermined data length, a symmetric encryption key generating unit which generates a symmetric encryption key by using a key derivation function that takes, as input, the sensitive data protection code, a sensitive data encrypting unit which encrypts sensitive data by using the symmetric encryption key, a sensitive data protection code encrypting unit which encrypts the sensitive data protection code by using a public key provided from an sensitive data access support terminal, and a deleting unit which deletes the symmetric encryption key and the sensitive data after the encryption of the sensitive data, and deletes the sensitive data protection code after the encryption of the sensitive data protection code.Type: GrantFiled: September 30, 2020Date of Patent: March 5, 2024Assignee: Soliton Systems K.K.Inventors: Bo Stig Hansen, Emil Mourier, Kiril Georgiev Georgiev, Thomas Hermann Wang-Nielsen, Yuxiao Wang
-
Patent number: 11917061Abstract: A decentralized and/or hybrid decentralized method for secure cryptography key storage referred to as Mutual Dependency Architecture (MDA) includes the steps of encrypting the cryptographic key using an unlock key; encrypting the unlock key using an encryption tool to create an encrypted seed; and storing the encrypted seed; wherein a user must have access to a first storage area in the device and to a second storage area external to the device in order to access the cryptographic key. In one embodiment, the encryption tool is a store key that is stored in unencrypted form in the first storage area, while the encrypted seed is stored in the second storage area. In another embodiment, the encryption tool is a Hardware Security Module (HSM) having an authentication key that is encrypted using a store key and stored in the second storage area, while the encrypted seed and the store key are stored in unencrypted form in the first storage area.Type: GrantFiled: April 26, 2019Date of Patent: February 27, 2024Inventor: Barbara Jean Wilk
-
Patent number: 11838421Abstract: Systems and methods for enhanced mobile device authentication are disclosed. Systems and methods for enhanced mobile authentication are disclosed. In one embodiment, method for electronic device authentication may include (1) a server comprising at least one computer processor communicating a one-time passcode to an electronic device over a first communication channel; (2) the server receiving, from the electronic device over a second communication channel the one-time passcode encrypted with a private key associated with the electronic device; (3) the server decrypting the one-time passcode using a public key; (4) the server validating the one-time passcode; (5) the server generating a device identifier for the electronic device; and (6) the server persisting an association between the device identifier and the electronic device.Type: GrantFiled: August 14, 2020Date of Patent: December 5, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Cedric Ken Wimberley, Andrew Sloper, Ta-Wei Chen, Gautam Chhawchharia
-
Patent number: 11822489Abstract: Methods, apparatuses, and systems related to data management and security in a memory device are described. Data may be stored in a memory system, and as part of an operation to move data from one region to another in the memory system, the data may be validated using one or more hash functions. For example, a memory device may compute a hash value of some stored data, and use the hash value to validate another version of that stored data in the process of writing the other version stored data to a region of the memory system. The memory device may store another hash that is generated from the hash of the stored data and a record of transactions such that transactions are identifiable; the sequence of transactions within the memory system may also be identifiable. Hashes of transactions may be stored throughout the memory system or among memory systems.Type: GrantFiled: December 21, 2018Date of Patent: November 21, 2023Assignee: Micron Technology, Inc.Inventor: Lucien J. Bissey
-
Patent number: 11818268Abstract: Systems and processes are described for establishing and using a secure channel. A shared secret may be used for authentication of session initiation messages as well as for generation of a private/public key pair for the session. A number of ways of agreeing on the shared secret are described and include pre-sharing the keys, reliance on a key management system, or via a token mechanism that uses a third entity such as a hub to manage authentication, for example. In some instances, the third party may also perform endpoint selection (e.g., load balancing) by providing a particular endpoint along with the token.Type: GrantFiled: October 15, 2021Date of Patent: November 14, 2023Assignee: Amazon Technologies, Inc.Inventors: Allan Henry Vermeulen, Matthew John Campagna, Colm Gearóid MacCárthaigh
-
Patent number: 11818275Abstract: A system and method for securing application programming interface (API) requests using multi-party digital signatures. The method includes generating, by a first system, at least one first secret share of a plurality of secret shares based on an API secret, wherein the plurality of secret shares includes the at least one first secret share and at least one second secret share, wherein the at least one second secret share is generated by at least one second system; and signing, by the first system, an API request using the at least one first secret share, wherein the API request is further signed by the at least one second system using the at least one second secret share, wherein the API request is signed without revealing any of the at least one first secret share to the at least one second system and without revealing any of the at least one second secret share to the first system.Type: GrantFiled: September 9, 2022Date of Patent: November 14, 2023Assignee: PAYPAL, INC.Inventors: Dan Yadlin, Ben Riva, Alon Navon, Lev Pachmanov, Jonathan Katz
-
Patent number: 11757617Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.Type: GrantFiled: December 15, 2020Date of Patent: September 12, 2023Assignee: Cryptography Research, Inc.Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
-
Patent number: 11750373Abstract: A technique, performed by an electronic device, of managing a security key is provided. The electronic device may receive security information from each of at least one other electronic device, determine a master electronic device based on a security level of the electronic device and a security level of a security level of the at least one other electronic device, the security level of the at least one other electronic device being included in the received security information, generate a security key as the electronic device is determined as the master electronic device, and determine a portion to be removed from the security key for each security level of a plurality of electronic devices including the electronic device and the at least one other electronic device, and provide each partial security key from which the determined portion is omitted, to the at least one other electronic device.Type: GrantFiled: January 11, 2022Date of Patent: September 5, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Sangwan Kwon, Taeho Kgil, Jinsu Kim
-
Patent number: 11743041Abstract: In an example system for private key recovery performed by a processor of a key recovery computing system, a key recovery computing system is configured to provide an original private key. The original private key is associated with a storage location of a blockchain-based asset. The key recovery computing system is configured to receive supplemental recovery information provided by a user via a user computing device. A recovery seed is derived from at least a subset of the supplemental recovery information, wherein the recovery seed is non-invertible. The original private key and the recovery seed are stored relationally to the supplemental recovery information. In some embodiments, the processor is further configured to cryptographically protect at least one of the original private key and the recovery seed via a universal second-factor authentication (U2F) device.Type: GrantFiled: May 28, 2021Date of Patent: August 29, 2023Assignee: SquareLink, Inc.Inventor: Alexander Patin
-
Patent number: 11711209Abstract: The present invention relates to methods for secure computation and/or communication. Entangled photons (118) are generated such that each participating party receives a series of optical pulses. Each party has private information (110, 112) which are never transmitted through public or private communication channels. Instead, each party converts their respective private information (110, 112) into measurement bases via an encryption process (114, 116) which are then applied to the entangled photons (118). After the measurement process, e.g., quantum frequency conversion (122, 124), reference indices are announced (124, 126) so that computation can be performed (128) without revealing the private information directly or indirectly.Type: GrantFiled: October 16, 2020Date of Patent: July 25, 2023Assignee: The Trustees of the Stevens Institute of TechnologyInventors: Yuping Huang, Lac Thi Thanh Nguyen
-
Patent number: 11604898Abstract: A method for secure online collaboration is provided. The method includes receiving, at a server of a cloud-based storage system, first encrypted data from a first client device. The cloud-based storage system stores a plurality of documents in an encrypted form. The method also includes determining a document of the plurality of documents that is associated with the first encrypted data. The document is not accessible to the server in a decrypted form. The first encrypted data represents an edit to a portion of the document. The method further includes determining a plurality of user accounts of collaborators of the document. The plurality of user accounts includes a first user account associated with the first client device. Moreover, the method includes providing the first encrypted data to one or more other client devices that are each associated with one of the plurality of user accounts, excluding the first user account.Type: GrantFiled: August 20, 2019Date of Patent: March 14, 2023Assignee: Google LLCInventor: Luke Ernest Camery
-
Patent number: 11552792Abstract: System and method for digitally signing messages using multi-party computation.Type: GrantFiled: December 22, 2020Date of Patent: January 10, 2023Assignee: Coinbase, Inc.Inventors: Jake Craige, Jesse Posner, Adam Everspaugh
-
Patent number: 11463431Abstract: A system and method for public API authentication by an API server includes receiving from a client/app a PK request for a Partial Key (PK), having a User ID, Session ID, rolling hash function (Fn2) version defining a client/app hash function (Fn2), and a received Temporary Key (TK); validating the received TK using Fn2 with the Session ID and either an Initial Key (IK) or a current PK; when the TK validation is complete, sending a PK calculated using a PK hash function (Fn1) with the User ID and a slot-generated rolling random number; receiving an API request for an API service having the User ID, Session ID, Fn2 version, and a received Authorization Key (AK); validating the received AK using Fn2 with the Session ID and the current PK; and when AK validation is complete, sending a successful response from the API service.Type: GrantFiled: May 29, 2020Date of Patent: October 4, 2022Assignee: DISNEY ENTERPRISES, INC.Inventors: Carmen Nigro, Jonathan Steinmann
-
Patent number: 11456864Abstract: The present disclosure discloses an information storage method performed at a server.Type: GrantFiled: March 15, 2019Date of Patent: September 27, 2022Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Rui Guo, Maocai Li, Wenwei Zou, Jianjun Zhang, Haitao Tu, Qi Zhao, Zongyou Wang, Jun Liang, Dawei Zhu, Binhua Liu
-
Patent number: 11438147Abstract: Technologies for providing multiple device authentication in a heterogeneous network include a gateway node. The gateway node includes a network communicator to receive a request from a terminal node to authenticate a user of a set of heterogeneous nodes connected to the gateway node and broadcast a credential request to the nodes. Additionally, the gateway node includes a response combiner to combine responses from the set of nodes to generate a combined authentication message. The network communicator is further to send the combined authentication message to the terminal node for authentication. Other embodiments are described and claimed.Type: GrantFiled: September 30, 2016Date of Patent: September 6, 2022Assignee: Intel CorporationInventors: Alexandra Afanasyeva, Sergey Bezzateev, Vitaly Petrov, Konstantin Zhidanov, Natalia Voloshina, Vladimir Zybin, Anna Bakunova
-
Patent number: 11405201Abstract: Methods and apparati for securely transferring application storage keys in an application in a trusted computing environment, when the trusted computing base is modified. In an apparatus embodiment of the present invention, a computing device comprises: a protected partition in which an application can execute without attack from outside a trusted computing base of the partition; and a storage key derivation module which provides a first storage key to said application, where the value of the first storage key is derived from a computation dependent upon a first version of the trusted computing base that is launched on the platform.Type: GrantFiled: December 7, 2021Date of Patent: August 2, 2022Assignee: Brickell Cryptology LLCInventor: Ernest Brickell
-
Patent number: 11398906Abstract: Methods and apparati for auditing uses of audited cryptographic keys.Type: GrantFiled: December 17, 2021Date of Patent: July 26, 2022Assignee: BRICKELL CRYPTOLOGY LLCInventor: Ernest Brickell
-
Patent number: 11362816Abstract: A layered secret sharing scheme in which a trust set of each of the parties receiving a share of the secret is received and used to generate an authorized set and an adversary set for reconstruction of a secret. In this regard, an access structure defining an authorized subset of participants may be based, at least in part, on the encoded trust subsets of the shares. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized subset of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized subset of participants or if participants define an adversary subset, the secret reconstruction fails. In this regard, even if an authorized subset is present, if an adversary subset is present, the reconstruction may be “killed.Type: GrantFiled: September 11, 2020Date of Patent: June 14, 2022Assignee: SEAGATE TECHNOLOGY LLCInventors: Vipin Singh Sehrawat, Foo Yee Yeo
-
Patent number: 11343085Abstract: An example operation may include one or more of splitting a session key into a plurality of partial shares, distributing the plurality partial shares to a plurality of content providers, respectively, where each content provider receives a different partial share of the session key, encrypting a stream of media content based on the session key, and transmitting the encrypted stream of digital content to a user device which has one or more partial shares among the plurality of partial shares.Type: GrantFiled: September 19, 2020Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Jeronimo Irazabal, Luis Angel Bathen, Dulce B. Ponceleon
-
Patent number: 11343096Abstract: A system, method, and computer program product are provided for performing hardware-backed password-based authentication. In operation, a system receives a request to access software utilizing password-based authentication. Further, the system receives a password for the password-based authentication. The system computes a hash utilizing the password and a hardware-based authenticator associated with hardware of the system. Moreover, the system verifies that the hash computed utilizing the password and the hardware-based authenticator is correct for accessing the software.Type: GrantFiled: March 13, 2019Date of Patent: May 24, 2022Assignee: DIGITAL 14 LLCInventors: Michael Matovsky, Ravi Singh, Alexander Sherkin
-
Patent number: 11328080Abstract: Sensitive electronic data may be encrypted using multiple identity credentials from multiple parties. Before the sensitive electronic data is encrypted, the multiple N identity credentials are input to a software application. Moreover, a minimum number Nmin of the N of the identity credentials are selected for decryption. The software application thus generates at least one of an encryption key and a decryption key as a keypair based on the N identity credentials and the minimum number Nmin of the identity credentials. The software application encrypts the sensitive electronic data using the encryption key to generate an encrypted version. Before decryption of the encrypted version, though, the software application may require input of the minimum number Nmin of the identity credentials. If the minimum number Nmin of the identity credentials are correctly input, the correct decryption key is generated and may be used to decrypt the encrypted version.Type: GrantFiled: February 24, 2020Date of Patent: May 10, 2022Assignee: FrostByte, LLCInventors: Ransom Christofferson, Nathan Johnston, Vikram Nagrani, Saul Schwartzbach
-
Patent number: 11316673Abstract: A secret sharing scheme in which a trust structure of the parties receiving a share of the secret is encoded in the shares. In this regard, an access structure defining an authorized set of participants may be based, at least in part, on the encoded trust structures. The secret sharing scheme includes a secret generator that generates the shares distributed to the parties. In turn, an authorized set of participants as defined by the access structure may provide shares to a dealer for reconstruction of the secret. However, if the participants requesting secret reconstruction are not an authorized set of participants, the secret reconstruction fails. In this regard, secret sharing with asymmetrical trust structures may be provided in which the trust structures are not known by other parties in the scheme.Type: GrantFiled: September 11, 2020Date of Patent: April 26, 2022Assignee: SEAGATE TECHNOLOGY LLCInventors: Vipin Singh Sehrawat, Foo Yee Yeo
-
Patent number: 11270303Abstract: A method of participation verification includes generating sets of cryptocurrency coins (coin sets). The coin sets have cryptocurrency coins and correlate to events for which participation is verified. The method includes generating user keys including unique public keys for each user and user secret keys. The method includes assigning a public key to a user, communicating the assigned public key to a user device and enabling download of a verification application. The method includes receiving a first coin request that includes identification of a first coin set, the assigned public key, and a data set. The method includes verifying user participation in an event based on the data set. The method includes executing a cryptocurrency transaction with the user device. The cryptocurrency transaction including public validation of a transfer of a cryptocurrency coin from the identified coin set to the user device via an append-only ledger.Type: GrantFiled: May 20, 2016Date of Patent: March 8, 2022Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery
-
Patent number: 11252161Abstract: A system of peer identity verification that reduces the risk of identity theft in case of a data breach. The system does not require a vendor to maintain a database of sensitive customer-related data. Cryptographic keys are used. The system creates a one-time encryption keypair. The public and private keys of each user are saved securely on each user's device. While the public key for each user is stored remote from each user's device (such as in a cloud), the private key for a given user is not stored anywhere other than securely on that user's device. Thereafter, a user (i.e., the main user) requests another user to act as their “trusted peer” to be added to their “trust cluster.” If that other user accepts the request, the main user's private key is encrypted with that other user's public key and this encrypted data gets stored remotely, such as in a cloud.Type: GrantFiled: April 18, 2019Date of Patent: February 15, 2022Assignee: PIV SECURITY LLCInventor: Joshua D. Holton
-
Patent number: 11245527Abstract: Secure distribution of data objects using a unique quantum-safe cryptographic key provided to a user requesting the data object that has been authenticated using a zero-knowledge authentication. A user may access the system by way of the zero-knowledge authentication to request access to a data object of a data library. The system may generate and associate a unique quantum-safe cryptographic key for the instance of the data library to be provided to the authenticated user. The data object is encrypted using the unique quantum-safe cryptographic key. The encrypted data object and the unique quantum-safe cryptographic key are provided to the authenticated user. Other instances of the data object may also be encrypted with other unique quantum-safe cryptographic keys. In turn, access to a unique quantum-safe cryptographic key may not be useful in decrypting other instances of the data object, and other data objects may not be decrypted using a given unique key for a given data object instance.Type: GrantFiled: October 30, 2019Date of Patent: February 8, 2022Assignee: SEAGATE TECHNOLOGY LLCInventors: Vincent Uy, Nino Wicaksono, Saravanan Nagarajan, Kwong Heng Alphonsus John Kwok, Kian Beng Lim
-
Patent number: 11240222Abstract: A registry apparatus is provided for maintaining a device registry of agent devices for communicating with application providing apparatus. The registry comprises authentication information for uniquely authenticating at least one trusted agent device. In response to an authentication request from an agent device, the authentication information for that device is obtained from the registry, and authentication of the agent device is performed. If the authentication is successful, then application key information is transmitted to at least one of the agent device and the application providing apparatus.Type: GrantFiled: July 24, 2019Date of Patent: February 1, 2022Assignee: ARM IP LimitedInventors: William Allen Curtis, Douglas Miles Anson, Kerry Balanza
-
Patent number: 11216899Abstract: An Iconsent application allows a party to consent to a transaction or to a romantic advance. The party is given a request, and if accepted, the acceptance is stored along with the biometric indicating that the authorized user did in fact carry out the acceptance.Type: GrantFiled: August 13, 2019Date of Patent: January 4, 2022Inventor: Connie Jordan Carmichael
-
Patent number: 11212095Abstract: Methods and apparatus for auditing uses of cryptographic keys. In a method embodiment of the present invention, a set of audited uses for a cryptographic key is defined; the key is generated inside a protected execution environment of a digital computer; all software and firmware that is usable in the execution environment to access the key is demonstrated to an auditor; and, for each audited use of the key, a non-tamperable audit record describing said use is released.Type: GrantFiled: July 23, 2021Date of Patent: December 28, 2021Inventor: Ernest Brickell
-
Patent number: 11212082Abstract: Methods are described for constructing a secret key by multiple participants from multiple ciphertexts such that any quorum combination of participants can decrypt their respective ciphertexts and so generate a fixed number of key fragments that can be combined by a recipient to generate the secret key. Worked examples are described showing how the encryption keys for the ciphertexts may be key wrapped using a key encapsulation mechanism for which ciphers that are resistant to attack by a quantum computer may be used. In these cases, a post-quantum quorum system is realised. Methods are described by which the quorum key fragment ciphertexts may be updated so that the original key fragments become invalid without necessitating any change to the secret key.Type: GrantFiled: September 30, 2019Date of Patent: December 28, 2021Assignee: PQ SOLUTIONS LIMITEDInventors: Martin Tomlinson, Cen Jung Tjhai
-
Patent number: 11210678Abstract: A security component according to an example embodiment includes: a user authentication processor configured to authenticate the input data by determining whether the input data is provided by an authorized user of the security component based on component user data of the input data; a master key generator configured to generate a master key based on the component user data of the input data in response to the user authentication processor authenticating the input data; a decryption processor configured to generate security data by decrypting encrypted data of the input data based on the master key; and a security storage configured to store the security data.Type: GrantFiled: October 26, 2017Date of Patent: December 28, 2021Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Jeong-tae Kim, Bo-gyeong Kang
-
Patent number: 11210422Abstract: A system and methods for identifying personal identifiable information in a data container are disclosed. The system and methods interrogate data at its most fundamental level, thereby allowing complex rule matching to occur. This can be coupled with a data in transit analysis mechanism, or be integrated into a data store search mechanism, to ensure maximum awareness of any potential issues with the security of the qualified data elements.Type: GrantFiled: February 19, 2021Date of Patent: December 28, 2021Inventor: Lee David Buckland
-
Patent number: 11206129Abstract: The invention relates to a method for setting up a secure session between a first entity and a second entity. In an embodiment, the first entity is a user authentication device and the second entity is an application running on a platform. The method comprises generating a first random number. A user enters a first string, derived from said first number, into the second entity. Further, the method includes applying a one-way function to the first string or to a derivative thereof, obtaining an encoded string. The method also comprises transmitting the encoded string to an intermediate node that is in connection to the first entity and the second entity. Further, the method comprises the step of sharing a second random number with the second entity. The method also comprises a step of deriving a secret key from the first and the second string.Type: GrantFiled: April 29, 2016Date of Patent: December 21, 2021Assignee: Ubiqu B.V.Inventor: Boris Petrov Dokov Goranov
-
Patent number: 11205006Abstract: Data storage nodes that participate in a requested data statistical analysis as participant data storage nodes are determined and divided into a plurality of node sets. Data stored in each participant data storage node associated with a particular node set is encrypted, where the encrypted data is divided into a number of fragments at least equal to a number of participant data storage nodes associated with the particular node set. Each participant data storage node sends a portion of the encrypted data to each of the other participant data storage nodes within the particular node set. Each participant data storage node processes received encrypted data and data remaining on the particular participant data storage node to obtain a processing result. Each participant data storage node sends the processing result to a proxy node, wherein the proxy node performs data statistical analysis based on the processing result.Type: GrantFiled: October 30, 2018Date of Patent: December 21, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Wenzhen Lin
-
Patent number: 11206134Abstract: For protection of multipart system applications using a cryptographically protected package, a package map and a package object store for decryption and verification at runtime on the target device platform, a method including associating a device class with a set of content signing and encryption keys; signing application files based on the device class of the target device platform; aggregating application files into a file container based on a structured construct; encrypting application files/file containers with an encryption key associated with the device class; generating a package map and object stores for cryptographic artifacts and detached package metadata for passwords associated with the device package; building, the device package and update packages of the device package, detached package metadata, and package install scripts for the target device platform; publishing, the update packages signed with update package provider and update package publisher signing keys, and encrypted with target deType: GrantFiled: November 22, 2019Date of Patent: December 21, 2021Assignee: MOCANA CORPORATIONInventors: Srinivas Kumar, Shreya Uchil, Srikesh Amrutur Srinivas
-
Patent number: 11177945Abstract: Enabling access to encrypted information by providing a master key and a public key to a partial content owner, generating a ciphertext of content according to a complete content data, at least one content data partition and the public key, wherein the content data partition comprises a portion of the complete content data, providing the ciphertext of the content data and the public key to a validator, receiving a validation result from the validator, and acting upon the validation result.Type: GrantFiled: July 24, 2020Date of Patent: November 16, 2021Assignee: International Business Machines CorporationInventor: Chun Lei Xu
-
Patent number: 11178116Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data that may be communicated using multiple communications paths.Type: GrantFiled: May 11, 2018Date of Patent: November 16, 2021Assignee: Security First Corp.Inventors: Mark S. O'Hare, Rick L. Orsini, Roger S. Davenport, Steven Winick
-
Patent number: 11128452Abstract: A data set shared by multiple nodes is encrypted. The data set can be split into independent records. The records can be encrypted and shared independently, without the need to modify and transmit the full data set. Although the records are encrypted with their own encryption key, they are all accessible by a single authentication method.Type: GrantFiled: March 22, 2018Date of Patent: September 21, 2021Assignee: Avast Software s.r.o.Inventors: Petr Van{hacek over (e)}k, Jan Schwarz, Pavel Studený
-
Patent number: 11115196Abstract: Methods and apparatus are provided for secret sharing with a verifiable reconstruction type. An exemplary method comprises receiving a plurality of shares of a secret generated using a secret splitting scheme; reconstructing the secret if the plurality of shares satisfies a predefined reconstruction threshold; and generating a proof identifying at least one of the plurality of shares used in the reconstruction. The proof is optionally verified by a verifier and the verification is optionally based on auxiliary information derived by the secret splitting scheme used to share the secret. The verifier optionally implements layered access control, for example, based on a rank of the shares used for reconstruction. The reconstructed secret is optionally provided to the verifier. A user can be granted a level of access to a protected resource based on the proof, the reconstructed secret and one or more predefined policies. One or more steps can be proactivized to maintain share freshness.Type: GrantFiled: December 8, 2015Date of Patent: September 7, 2021Assignee: EMC IP Holding Company LLCInventors: Nikolaos Triandopoulos, Kevin D. Bowers, Yupeng Zhang
-
Patent number: 11106549Abstract: Secure logging systems and methods using cryptography and/or encryption with crash recovery. In some embodiments, the secure logging system includes an initialization module to initialize cells of a logging database, including inserting a pseudorandom number into each cell of the logging database. In some embodiments, the secure logging system includes an addition module to encrypt new log messages and add them to the logging database in a given number of pseudorandom cells of the logging database. In some embodiments, the secure logging system includes a listing module to determine where in the logging database the log message was stored and then to decrypt the encrypted log messages. These systems and methods improve computer related technology including by improving crash reconstruction, root cause analysis, network systems security, and logging system encryption and security.Type: GrantFiled: February 18, 2019Date of Patent: August 31, 2021Assignees: Airbus Defence and Space GmbH, Northeastern UniversityInventors: Erik-Oliver Blass, Guevara Noubir
-
Patent number: 11095455Abstract: The present disclosure describes techniques that improve upon the use of authentication tokens as a means of verifying a user identity. Rather than facilitating the issuance of authentication tokens as bearer tokens, whereby any user may present an authentication token to a secure service provider for access to secure service, this disclosure describes techniques for generating recursive authentication tokens that are digitally signed by an Identity Service Provider (IDP) and the entity that purports to present the authentication token to the service provider. Additionally, a recursive token application is described that is configured to nest preceding authentication tokens that trace back to an initial secure service request. For example, a recursive authentication token received by a second service provider may include, nested therein, the first service provider recursive authentication token and a preceding client recursive authentication token that is associated with the initial secure service request.Type: GrantFiled: March 27, 2019Date of Patent: August 17, 2021Assignee: T-Mobile USA, Inc.Inventors: Michael Engan, Douglas McDorman, James Latham, Vikash Kodati
-
Patent number: 11095635Abstract: A client seeking to establish a cryptographically-secure channel to a server has an associated public key acceptance policy. The policy specifies a required number of certificates that must be associated with the server's public key, as well as one or more conditions associated with those certificates, that must be met before the client “accepts” the server's public key. The one or more conditions typically comprise a trust function that must be satisfied before a threshold level of trust of the client is met. A representative public key acceptance policy would be that certificate chains for the public key are valid and non-overlapping with different root CAs, and that some configurable number of those chains be present. The technique may be implemented within the context of an existing client-server SSL/TLS handshake.Type: GrantFiled: December 18, 2019Date of Patent: August 17, 2021Assignee: International Business Machines CorporationInventors: Dimitrios Pendarakis, Enriquillo Valdez