Nbs/des Algorithm Patents (Class 380/29)
  • Patent number: 11108552
    Abstract: Plaintext data is encrypted and decrypted using a symmetric encryption algorithm that generates a sequence of pseudorandom values from a cryptographic key. A portion of the sequence of pseudorandom values is discarded. For example, in an embodiment, each value in the sequence of pseudorandom values is truncated by a number of bits. Encryption and decryption is performed by combining plaintext or ciphertext with the truncated sequence of pseudorandom values. In an embodiment, the combination is made by performing a bitwise exclusive or operation between the truncated pseudorandom values and the plaintext or ciphertext. In an embodiment, a number of bits discarded from each value is encoded into a message authentication code which is provided with any resulting ciphertext.
    Type: Grant
    Filed: May 2, 2018
    Date of Patent: August 31, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Shay Gueron, Matthew John Campagna
  • Patent number: 11093213
    Abstract: Operational n-state digital gates execute Finite Lab-transformed (FLT) n-state switching functions or n-state switching function tables to process n-state signals provided on at least 2 inputs to generate an n-state signal on an output, with n>2, n>3 and n>64. The FLT is an enhancement of a computer architecture. Cryptographic apparatus and methods apply circuits that are characterized by FLT-ed addition and multiplication over finite field GF(n) or by addition and multiplication modulo-n that are modified in accordance with reversible n-state inverters, and are no longer characterized by known operations. Known cryptographic methods executed with novel n-state digital gates include encryption/decryption, public key generation, message digest and Elliptic Curve Cryptography wherein one n-state switching function is replaced by an FLT'ed n-state switching function.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: August 17, 2021
    Assignee: Ternarylogic LLC
    Inventor: Peter Lablans
  • Patent number: 11030278
    Abstract: A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library.
    Type: Grant
    Filed: August 16, 2019
    Date of Patent: June 8, 2021
    Assignee: BlackBerry Limited
    Inventors: David Paul Yach, Herbert Anthony Little, Michael Stephen Brown
  • Patent number: 11023567
    Abstract: Presented are software intellectual property (IP) protection systems and methods that prevent potential attackers as well as customers from having access to plain text versions of both library source code and binary code. Potential attackers are prevented from reusing the software on other platforms. The protection mechanism does not impact the functionality or the performance of the library itself and does not interfere with existing software update mechanisms or application developer tools, such as Joint Test Action Group (JTAG).
    Type: Grant
    Filed: July 18, 2018
    Date of Patent: June 1, 2021
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Yann Yves Rene Loisel, Frank Lhermet, Stephane Di Vito, Vincent Albanese
  • Patent number: 11017393
    Abstract: Embodiments of the invention are directed to passing a plurality of communications directly from a merchant to a payment processing network. A first communication may include payment information in an authorization request, while a second transaction may include non-payment transaction data. The communications may be linked with a transaction identifier. In other embodiments, a capture file process is disclosed where capture files are generated by the payment processing network, and transactions are subsequently cleared and settled.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: May 25, 2021
    Assignee: Visa International Service Association
    Inventors: Phil Kumnick, Krishna Koganti, Davidson Wuichet, Lloyd Cato, Jeffrey Kusheba
  • Patent number: 10997272
    Abstract: A method of manufacturing an apparatus and a method of constructing an integrated circuit are provided. The method of manufacturing an apparatus includes forming the apparatus on a wafer or a package with at least one other apparatus, wherein the apparatus comprises a polynomial generator, a first matrix generator, a second matrix generator, a third matrix generator, and a convolution generator; and testing the apparatus, wherein testing the apparatus comprises testing the apparatus using one or more electrical to optical converters, one or more optical splitters that split an optical signal into two or more optical signals, and one or more optical to electrical converters.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: May 4, 2021
    Inventors: Weiran Deng, Zhengping Ji
  • Patent number: 10984420
    Abstract: A transaction system performs a transaction for a purchase of goods or services. Information about a purchase of goods or services is displayed on a display of a transaction device. The transaction device receives from a user, primary identification data which comprises biometric data that identifies the user. The transaction device receives from the user, secondary identification data which identifies the user. The secondary identification data is in addition to the primary identification data, and the secondary identification is of a different type than the primary identification data. A primary biometric identification parameters database is accessed to verify identification of the user. A secondary identification parameters database is accessed to confirm identification of the user.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: April 20, 2021
    Inventors: Sujay Abhay Phadke, Binata Abhay Phadke
  • Patent number: 10972268
    Abstract: A Cryptographic Unit (CU) of a microcontroller, the CU including a first accelerator configured to generate first encrypted output data based on input data; and a second accelerator which is configured to be diversely implemented with respect to the first accelerator, and is configured to generate second encrypted output data based on the input data; and a comparator configured to compare a first comparator data obtained from the generation of the first encrypted output data with a second comparator data obtained from the generation of the second encrypted output data, and if the comparison indicates that the first and second comparator data differ, output an event signal pertaining to an event in a safety domain or a security domain.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: April 6, 2021
    Assignee: Infineon Technologies AG
    Inventors: Alexander Zeh, Viola Rieger
  • Patent number: 10944544
    Abstract: A method and apparatus for reducing a variable number of pre-key bits to a fix key size is disclosed. The resulting key is used with a symmetric block cipher to descramble content. By being able to directly adapt a large and variable number of bits, it is possible to use cryptographic algorithms that were not thought possible, such as the output of modem public key and hashing functions, in order to create a key to directly use with a symmetric block cipher. Some or all of the pre-key bits may be used in the creation of the key.
    Type: Grant
    Filed: November 7, 2018
    Date of Patent: March 9, 2021
    Assignee: Sony Corporation
    Inventor: Brant Candelore
  • Patent number: 10943020
    Abstract: A system includes at least two buses including a first bus and a second bus, an encryption and decryption system corresponding to each bus, at least one signal processing module corresponding to each bus, and a bus converter coupled between the first bus and the second bus. According to the system provided in embodiments of the present invention, because data transmitted on a bus is encrypted data, even though an attacker obtains bus data by means of a probe attack, it is quite difficult to break a key, and an anti-attack capability of the system can be improved.
    Type: Grant
    Filed: August 24, 2018
    Date of Patent: March 9, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Cui Hu, ZhuFeng Tan, Shaojie Sun
  • Patent number: 10936703
    Abstract: A method for compiling a matrix-product program into an obfuscated-matrix-product program includes receiving a plurality of matrices that form the matrix-product program, randomly generating a set of independent and invertible tensor-product matrices, randomly generating a set of independent and invertible linear-transform matrices, and generating a dynamic-fence-generation gadget by processing at least one of the plurality of matrices, the set of tensor-product matrices and the set of linear-transform matrices. The dynamic-fence-generation gadget is an obfuscated version of computer program represented by the plurality of matrices.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: March 2, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Craig Broadwell Gentry, Charanjit Singh Jutla
  • Patent number: 10931658
    Abstract: Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing.
    Type: Grant
    Filed: August 6, 2019
    Date of Patent: February 23, 2021
    Assignee: Jonetix Corporation
    Inventors: Paul Ying-Fung Wu, Richard J. Nathan, Harry Leslie Tredennick
  • Patent number: 10903995
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: January 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 10896267
    Abstract: Examples relate to Input/Output (I/O) data encryption and decryption. In an example, an encryption/decryption engine on an Integrated Circuit (IC) of a computing device obtains at least one plaintext data. Some examples determine, by the encryption/decryption engine, whether the at least one plaintext data is to be sent to a memory in the computing device or to an I/O device. Some examples apply, when the at least one plaintext data is to be sent to the I/O device and by the encryption/decryption engine, an encryption primitive of a block cipher encryption algorithm to the at least one plaintext data to create output encrypted data, wherein an initialization vector that comprises a random number is applied to the encryption primitive.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: January 19, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Geoffrey Ndu, Pratyusa K Manadhata, Christopher L. Dalton, Adrian Shaw, Stuart Haber
  • Patent number: 10860997
    Abstract: A secure point-of-sale (POS) portal architecture for delivering multiple services is provided. According to one exemplary aspect of the architecture, a number of services offered by various parties are integrated for delivery to merchants. The parties offering the services include, for example, payment processors and merchant acquirers and other external value-added service providers. The integrated services, in turn, are offered to merchants and/or their respective customers via one or more POS devices and its supporting system infrastructure at the merchant locations. The integrated services include, for example, acceptance of multiple payment instruments, payment processing, user dialog management, sales promotion and customer support, loyalty programs, back office processing, receipt capture, employee training, risk management, dispute resolution, system security, system administration etc.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: December 8, 2020
    Assignee: Visa U.S.A. Inc.
    Inventors: Eric Redmond, Jean Huang, Pete Heisinger
  • Patent number: 10834649
    Abstract: The present disclosure relates to a method, in a mobility function (MF) node. The method comprises receiving (S1) information about a mapping to a property, of each of a plurality of radio bearers of a radio device for carrying data traffic between the radio device and a first radio access network (RAN). The method also comprises determining (S2) based on the received (S1) information, that at least one of the radio bearers can be handed over to a second RAN. The method also comprises initiating (S3) a handover command to the radio device instructing the radio device to hand over the at least one radio bearer to the second RAN.
    Type: Grant
    Filed: May 28, 2014
    Date of Patent: November 10, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Dinand Roeland, Stefan Rommer, Mattias Bergström, Oumer Teyeb
  • Patent number: 10819502
    Abstract: The present invention relates to a method for symmetrical encryption or decryption of a data block from a secret key (K), the method comprising steps of: permutation (100) of at least one portion of the secret key (K) by means of a first permutation table (PC1?) so as to produce initial data, execution of several iterations, an iteration comprising steps of: rotation (102) of data dependent on the initial data so as to produce shifted data, permutation (104) of the shifted data by means of a second permutation table (PC2?) so as to produce a round key, execution of a plurality of encryption rounds (200) from the data block, an encryption round (200) using one of the round keys, generation of at least one of the permutation tables (PC1?, PC2?), the generation comprising determination of at least one function (F, G) variable from one encryption or decryption to another, composition of said function (F, G) with a predetermined permutation table (PC1, PC2), application of the inverse of said function (F,
    Type: Grant
    Filed: September 26, 2017
    Date of Patent: October 27, 2020
    Assignee: IDEMIA IDENTITY & SECURITY FRANCE
    Inventors: Houssem Maghrebi, Guillaume Dabosville, Emmanuel Prouff
  • Patent number: 10810314
    Abstract: Embodiments for a database connector are disclosed. The database connector can encrypt data from an application before storing the data in the database using attribute-based encryption (ABE). The database connector can also decrypt data retrieved from the database using an ABE private key before sending the data to the application. The database connector can generate a logical attribute statement for encryption of data from the application based on attributes, logical relations, and/or relational operators received from the application, directly from a user, or imbedded within rules governing logical attribute statement genesis.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: October 20, 2020
    Inventors: Ryan C. Marotz, Barry A. Trent
  • Patent number: 10756892
    Abstract: Methods and apparatus, including computer program products, are provided for securing data in a multi-tenant cloud-based system. In some implementations, there is provided a method. The method may include requesting access to at least one encrypted data element; obtaining, in response to the requesting, a long bit stream assigned to a client associated with the requested access; generating a key to decrypt the at least one data element, the key generated by selecting, based on a permutation, portions of the long bit stream; and decrypting, based on the generated key, the at least one data element. Related systems, methods, and articles of manufacture are also disclosed.
    Type: Grant
    Filed: February 9, 2017
    Date of Patent: August 25, 2020
    Assignee: SAP SE
    Inventor: Vipul Gupta
  • Patent number: 10742419
    Abstract: A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: August 11, 2020
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Phillip Lavender, Vikram Modi, Glenn Leon Powell
  • Patent number: 10742405
    Abstract: System and methods for generating round keys for a cryptographic operation are disclosed. The systems and method can use logic circuits that are operable to: obtain first inputs and second inputs; perform a bit-mixer operation on each of the first inputs and the second inputs; and generate round keys based on the performing the bit-mixer operation. The first inputs include a plurality of equal sized subkeys from a key material that is divided into a plurality of equal sized key material sub-blocks, a cipher key and the second inputs include a random input, one or more previous round keys, a round number. The cryptographic operation includes a cipher, a hash function, or a stream generator. The bit-mixer operation includes an exclusive-OR (XOR) tree, a substitution-permutation network, or a double-mix Feistel network, or a Rotate-Add-XOR (RAX) construction.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: August 11, 2020
    Assignee: THE BOEING COMPANY
    Inventor: Laszlo Hars
  • Patent number: 10721067
    Abstract: A CPU package includes an encryption and decryption module disposed in a communication path between an instruction path of a processor core and a data register that is externally accessible through a debug port, and a key store accessible to the module. The module is configured to encrypt and store data in the data register for each of a plurality of processes being handled in the instruction path, wherein data owned by each process is encrypted and decrypted by the module using an encryption key assigned to the process. The key store is configured to store the encryption key assigned to each of a plurality of processes, wherein the key store is inaccessible outside the CPU package. The data is only decrypted for a requesting process having a process identifier that matches the process identifier stored in the processor data structure along with the requested data.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: July 21, 2020
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Fred A. Bower, III, William G. Holland, Scott Kelso, Christopher L. Wood
  • Patent number: 10706159
    Abstract: Technologies for dynamically protecting memory of the mobile compute device include a main memory, a location sensor that produces sensor data indicative of a present location of the mobile compute device, a sensor hub communicatively coupled to the location sensor, and a security engine communicatively coupled to the sensor hub. The sensor hub determines a present location security zone of the mobile compute device based on the present location of the mobile compute device and a geofence policy, which maps locations to location security zones. The security engine encrypts the main memory of the mobile compute device and determines whether the present location security zone has changed relative to a most-previous location security zone of the mobile compute device. If the present location security zone has changed to a safe zone, the security engine decrypts the main memory.
    Type: Grant
    Filed: June 14, 2017
    Date of Patent: July 7, 2020
    Assignee: Intel Corporation
    Inventors: Siddhartha Chhabra, Prashant Dewan
  • Patent number: 10686764
    Abstract: The disclosure provides for two or more devices that securitize transmission(s) transmitted to and received from these devices comprising at least one executable coded cipher key(s), at least one executable coded encryption key (ECEK) device that encrypts transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that decrypts transmission(s) and that also uses at least one executable coded cipher key(s), such that transmission(s) are sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is encrypted and/or decrypted. When encryption/decryption is completed, the transmission(s) is sent to at least one transmitter such that encryption/decryption of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve encryption/decryption completion.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: June 16, 2020
    Inventor: Daniel Maurice Lerner
  • Patent number: 10680798
    Abstract: A secure computing device, including: a processor configured to carry out a secure operation; a memory in communication with the processer configured to store secure data; and a memory controller configured control storage of data in the memory and reading data from the memory, wherein the secure data is split into shares before being stored in the memory and wherein the memory controller is configured to: apply a masking storage transform (MST) to one of the shares to produce a masked share before storing the shares in the memory, wherein the MST is a permutation without a fixed point; apply an inverse MST to the masked share when reading the shares from the memory; and combine the read shares to reconstruct the secure data.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: June 9, 2020
    Assignee: NXP USA, Inc.
    Inventors: Miroslav Knezevic, Ventzislav Nikov
  • Patent number: 10680802
    Abstract: Various embodiments relate to a method of hashing a message M using a block cipher, including: producing N block cipher inputs by XORing message indices i, . . . i+N?1 respectively with state values S0, . . . SN?1, wherein N is an integer greater than 1; producing N block cipher keys by XORing N different blocks of message M and at least one of state values S0, . . . SN?1 for each of the N block cipher keys; encrypting the N block cipher inputs using the respective N block cipher keys to produce N block cipher outputs; combining the N block cipher outputs with N block cipher inputs to produce N block cipher combined outputs Tt, for t=0, . . . , N?1; calculating Y0=T0; calculating Yt=Yt?1?Tt, for t=1, . . . , N?1, calculating SN?1?=YN?1<<<a, where a is a number of bits to rotate where S0?, . . . , SN?1? are new state values; and calculating St?=Yt?SN?1?, for t=0, . . . , N?2.
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: June 9, 2020
    Assignee: NXP B.V.
    Inventor: Bjorn Fay
  • Patent number: 10645070
    Abstract: An access control system and associated devices are described that conceal and securitize data transmissions between one or more secure databases for various user devices to ensure proper entrance or access into secure locations by approved personnel only. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing communications for wireless/cellular phones with personnel access card readers for entry into secure locations are also described. These combined communication and access devices require using specific encryption techniques that cannot be corrupted and are essential to denying fraudulent or otherwise unauthorized personnel the ability to enter or access security protected devices or locations.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: May 5, 2020
    Inventor: Daniel Maurice Lerner
  • Patent number: 10616192
    Abstract: The disclosure provides for one or more devices and associated system that securitize and conceal data transmitted to and/or data received from the devices that utilize one or more master keys comprising at least one device that conceals and reveals such that the data and/or associated data files utilize both master keys and one or more key selectors, wherein the master keys and key selectors produce a specific set of one or more keys that conceal the data and/or associated data files such that one or more key selectors coincide with at least one value that directly corresponds with created cipher data and/or cipher data files. The key selectors can also be concealed and revealed as required. Produced concealed data and concealed data files can only be concealed and revealed with one or more master keys and one or more key selectors.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: April 7, 2020
    Inventor: Daniel Maurice Lerner
  • Patent number: 10608822
    Abstract: A method of computing a message authentication code (MAC) for a message having a common part and an independent part using a constrained processor, including: performing a MAC function on the common part of the message using a first secret key to produce a first output; performing a pseudorandom function on the independent part of the message using a second key to produce a second output, wherein the computation time of the pseudorandom function is significantly less than the computation time of the MAC function; and combining the first output and the second output to produce a computed MAC for the message.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: March 31, 2020
    Assignee: NXP B.V.
    Inventors: Florian Boehl, Simon Johann Friedberger, Thierry G. C. Walrant
  • Patent number: 10601805
    Abstract: One more devices and/or access control systems are described that securitize data and data transmissions using three sets of computing operations including authentication, validation, and securitization that allows or denies access to the data and/or the data transmissions. The system includes securitization of signals between one or more secure master and/or partial DASA databases for various user devices. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that offer the combination of securing communications from user devices with reader devices, are also is provided.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: March 24, 2020
    Inventor: Daniel Maurice Lerner
  • Patent number: 10572271
    Abstract: Efficient instantiation of encrypted guests is disclosed. In an example, a first host with a first hypervisor is separated from a second host with a second hypervisor by a network. The first hypervisor executes to allocate a requested amount of memory associated with a first guest on the first host. Pages of the requested amount of memory written to by a boot process of the first guest are tracked. The second hypervisor is requested to allocate the requested amount of memory on the second host. All tracked pages written to by the boot process are transferred to the second host. In response to transferring all of the tracked pages, a transfer completion confirmation is sent to the second hypervisor and a second guest that is a migrated copy of the first guest is instantiated on the second host with the transferred pages from the first guest.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: February 25, 2020
    Assignee: RED HAT, INC.
    Inventors: Michael Tsirkin, David Hildenbrand
  • Patent number: 10536445
    Abstract: An access control system with devices that securitize one or more blockchains using three sets of rules including authentication, validation, and access is provided. The system also can include protection of signals between one or more secure DASA databases and/or one or more blockchains for various user devices. The DASA databases may exist external to, along with, or within the blockchains. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications offering the combination of securing communications from user devices with reader devices, are also provided. This disclosure also provides for the securitization and/or encryption of blockchain(s) for ensuring communication signals transmitted from and data residing within databases and/or the blockchain itself are not corruptible or compromised.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: January 14, 2020
    Inventor: Daniel Maurice Lerner
  • Patent number: 10530567
    Abstract: A noise generation module generates power consumption noise to conceal the power consumption characteristics of a cryptographic module. The cryptographic module performs first non-linear transformation on received data, and the noise generation module performs second non-linear transformation on received data during the operational period of the first non-linear transformation.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: January 7, 2020
    Assignee: MEGACHIPS CORPORATION
    Inventors: Takahiko Sugahara, Hiromu Yutani, Hajime Yoshimura, Masayuki Imagawa
  • Patent number: 10521608
    Abstract: A device may obtain information included in a corpus of documents relating to an organization. The device may identify a set of values indicating personal information for one or more individuals by using a set of natural language processing (NLP) techniques to analyze the information included in the corpus. The device may determine a set of relationships between one or more values, of the set of values indicating the personal information using one or more additional NLP techniques and/or one or more rules. The device may generate a set of user profiles for the one or more individuals based on the set of relationships between the one or more values indicating the personal information. The device may perform one or more actions associated with using the set of user profiles to service a request for information.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: December 31, 2019
    Assignee: Accenture Global Solutions Limited
    Inventors: Urvesh Bhowan, Bogdan Eugen Sacaleanu, Navdeep Sharma, Gavin Kearney, Laura O'Malley, Aoife Whelan, Qurrat Ul Ain, Anthony McCoy
  • Patent number: 10523427
    Abstract: In accordance with embodiments of the present disclosure, a management controller configured to provide management-domain management of an information handling system may include a processor and a key management utility embodied in non-transitory computer-readable media. The key management utility may be configured to issue one or more commands to a cryptoprocessor for storing and sealing a key encryption key on the cryptoprocessor, wherein the key encryption key is for decrypting a media encryption key for encrypting and decrypting data stored to a storage resource of a host domain of the information handling system. The key management utility may also be configured to issue one or more commands to the cryptoprocessor for unsealing and retrieving the key encryption key from the cryptoprocessor.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: December 31, 2019
    Assignee: Dell Products L.P.
    Inventors: Gobind Vijayakumar, Johan Rahardjo, Theodore Stratton Webb
  • Patent number: 10476669
    Abstract: Space-efficient key allocations in broadcast encryption systems are provided. In some embodiments, a key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. A plurality of encrypted keys is received. Each encrypted key has an associated identifier. A first encrypted key is selected from the plurality of encrypted keys such that the key identifier of the first encrypted is equivalent to the first key identifier. A first cryptographic function is determined corresponding to the first cryptographic function identifier. The first cryptographic function is applied to the first encrypted key using the first cryptographic key to obtain a first intermediate cryptographic key. A content cryptographic key is determined using the first intermediate cryptographic key. The content cryptographic key is adapted for decryption of encrypted content.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: November 12, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Dulce B. Ponceleon
  • Patent number: 10447657
    Abstract: A communications system, and a method suitable for use therein, are described which are suitable for transmitting and receiving both secure and non-secure data. The system comprises: means for transmitting data comprising both ciphered secure data and unciphered non-secure data; means for receiving transmitted data; means for deciphering the received data to produce deciphered data; and means for: validating the deciphered data to produce a first validation result and outputting the deciphered data depending upon the first validation result; or validating the received data to produce a second validation result and outputting the received data depending upon the second validation result; or validating the deciphered data to produce a first validation result and outputting the deciphered data depending upon the first validation result, and also validating the received data to produce a second validation result and outputting the received data depending upon the second validation result.
    Type: Grant
    Filed: March 17, 2009
    Date of Patent: October 15, 2019
    Assignee: Qualcomm Incorporated
    Inventors: Mungal Singh Dhanda, Simon Walke
  • Patent number: 10434981
    Abstract: A method for protecting a vehicle, the method may include providing, by an immobilizer, false error information that is associated with a false error; wherein the false error information, once received or processed by an electronic control unit (ECU) of the vehicle, contributes to an immobilizing the vehicle during a vehicle start process; and sending the false error information to the ECU, during a vehicle shut down process that preceded the vehicle start process.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: October 8, 2019
    Assignee: Traffilog
    Inventors: Robert Izraeli, Assi Bitton, Arik Greenberger
  • Patent number: 10425808
    Abstract: A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: September 24, 2019
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Mats Naslund, Jari Arkko
  • Patent number: 10419416
    Abstract: Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: September 17, 2019
    Assignee: Jonetix Corporation
    Inventors: Paul Ying-Fung Wu, Richard J. Nathan, Harry Leslie Tredennick
  • Patent number: 10387654
    Abstract: A method for providing a computer program for a computing unit of an electronic device, in particular a control device of a motor vehicle or of a household appliance, wherein the method includes: evaluation of properties of the electronic device relating to a susceptibility to side channel attacks and/or fault attacks, as a result of which an evaluation result is obtained, selection of at least one influencing parameter that has an influence on the susceptibility of the electronic device to side channel attacks and/or fault attacks, in particular as a function of the evaluation result, use of the at least one influencing parameter to diversify the computer program for the computing unit.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: August 20, 2019
    Assignee: Robert Bosch GmbH
    Inventors: Hans Loehr, Herve Seudie, Paulius Duplys, Robert Szerwinski, Sebastien Leger
  • Patent number: 10389531
    Abstract: An authentication system includes a terminal having a transmitter, a processor, and a memory, and a server having a receiver, a processor and a memory. The terminal transmits request information to the server. The terminal acquires time information, generates a first one-time password at a pre-determined cycle by using the time information within the terminal, and generates encryption information which is acquired by encrypting the request information using the first one-time password as a key, the encryption information being transmitted from the terminal to the server. The server acquires time information within the server, generates a second one-time password at the pre-determined cycle as the cycle within the terminal by using the time information within the server, generates reference information which is acquired by decoding the encryption information using the second one-time password as a key, and compares the request information with the reference information.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: August 20, 2019
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Saburo Toyonaga, Hiroyuki Tanaka, Masakatsu Matsuo
  • Patent number: 10387120
    Abstract: Systems and methods for a random number generator including a systolic array to receive a plurality of first inputs, and to provide a random number output. In one embodiment, the systolic array can be arranged in two or greater dimensions, and each cell of the array comprises a ring oscillator. Data is read from a random access memory to provide the inputs to the systolic array. A linear feedback shift register receives the random number output as a feedback signal used to address the memory to read data to provide as the inputs to the systolic array.
    Type: Grant
    Filed: June 21, 2018
    Date of Patent: August 20, 2019
    Assignee: SECTURION SYSTEMS, INC.
    Inventor: Richard J. Takahashi
  • Patent number: 10382193
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: August 13, 2019
    Assignee: Cryptography Research, Inc.
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
  • Patent number: 10341860
    Abstract: Systems, devices, and methods are described for allowing a first device to learn how to connect to a first network using information that a second device obtained about a second network that is related to the first network. The second device can perform a virtual network discovery of the first network on behalf of the first device. The second device can describe how to initiate one or more connections to the first network by modifying the information the second device obtained about the second network. The second device can send the information identifying how to initiate the connections to the first network to the first device. The first device can automatically initiate connections to the first network without requiring user input.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: July 2, 2019
    Assignee: Apple Inc.
    Inventors: Vinesh Pallen, Hyeonkuk Jeong, Kapil Chhabra
  • Patent number: 10341309
    Abstract: Aspects of the disclosure relate to a system and method for cryptographically protecting data transferred between spatially distributed computing devices. An intermediary database may be used to facilitate the protected data transfer and/or record the data transfers. A first computing device may transfer, to the intermediary database, encrypted data that may be securely transferred to other computing devices. A second computing device may generate a GUI used to view data available from the intermediary database. Once data is selected by the second device, the second device may transfer a key (or other encryption mechanism) to the first device. The first computing device may encrypt the data using the received key and transmit the encrypted data to the intermediary database. The intermediary database may transmit the encrypted data to the second computing device, and the second computing device may decrypt and use the data.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: July 2, 2019
    Assignee: Allstate Insurance Company
    Inventors: Philip Peter Ramirez, Michael J. McNichol, Jr., Tao Chen, Vincent Quigley, Brian Rice
  • Patent number: 10341104
    Abstract: An encryption apparatus includes a table generator configured to generate a key table based on each of a plurality of encryption keys, the plurality of encryption keys having different attributes, generate a key-independent table independent of the plurality of encryption keys, and generate an encryption algorithm based on the key table and the key-independent table; and a transmitter configured to transmit the key table and the key-independent table to a client terminal, wherein the table generator and the transmitter are implemented by using at least one hardware processor.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: July 2, 2019
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Duk-Jae Moon, Ji-Hoon Cho, Kyu-Young Choi
  • Patent number: 10341356
    Abstract: A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message. The message is then sent to a recipient.
    Type: Grant
    Filed: November 13, 2017
    Date of Patent: July 2, 2019
    Assignee: Certicom Corp.
    Inventor: Marinus Struik
  • Patent number: 10341089
    Abstract: The Advanced Encryption Standard (AES) cipher can be performed in a manner that preserves the secrecy of cryptographic keys, even under the intense scrutiny of a reverse-engineer observing every aspect of the computation. A method can include loading a key in a non-standard representation. The method can also include processing the key with respect to data in at least three first type rounds and a plurality of second type rounds. The processing the key with respect to data can include either encrypting the data using the key or decrypting the data using the key. The first type rounds can be configured to maintain an order of channels of bits at an output from the order of corresponding channels of bits at an input. The second type rounds can be configured to vary the order of channels of bits at an output from the order of corresponding channels of bits at an input.
    Type: Grant
    Filed: April 20, 2016
    Date of Patent: July 2, 2019
    Assignee: MICROSEMI CORP. - SECURITY SOLUTIONS
    Inventor: Scott D. Miller
  • Patent number: 10313315
    Abstract: Aspects of the disclosure relate to ensuring information security in data transfers by utilizing proximity keys. A computing platform may receive a data collection comprising one or more data sets to be transferred to one or more remote recipient systems, as well as one or more transfer path specifications defining a specific sequence of hop points via which the data collection is to be transferred. Subsequently, the computing platform may receive, from a quorum of authorization devices, a plurality of authorization keys. Based on validating the plurality of authorization keys, the computing platform may encrypt the data collection using the plurality of authorization keys. Then, the computing platform may send the encrypted data collection to a first hop point associated with the specific sequence of hop points defined by the one or more transfer path specifications, so as to initiate a transfer of the data collection to a decryption platform.
    Type: Grant
    Filed: August 25, 2017
    Date of Patent: June 4, 2019
    Assignee: Bank of America Corporation
    Inventor: Manu Kurian