Public Key Patents (Class 380/30)
  • Patent number: 11405375
    Abstract: A computer implemented method, device and computer program device are provided including one or more processors and an input to collect credential related content including a first network resource identifier related to a first one of multiple network resources, the credential related content further including a master password that is associated with the first network resource identifier and that is associated with network resource identifiers for a remainder of the multiple network resources. Responsive to execution of the program instructions, the processor converts the master password and the first network resource identifier into a first hash code to receive a temporary credential token from the authentication service in connection with the first hash code.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: August 2, 2022
    Assignee: LENOVO (SINGAPORE) PTE. LTD.
    Inventors: Russell Speight VanBlon, Nathan J. Peterson, John Carl Mese, Mark Patrick Delaney
  • Patent number: 11381382
    Abstract: An operating method of a memory controller includes generating a random value using a seed, generating encrypted intermediate data by encrypting plaintext data using the random value, and storing the seed and the intermediate data in a memory device. Ciphertext data is generated using the seed and the intermediate data based on Ring Learning with Error (RLWE).
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: July 5, 2022
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Kwang Hoon Kim, Pil Sang Yoon
  • Patent number: 11374770
    Abstract: Systems and methods for developing a novel public/private key pair having unique properties are disclosed, whereby standard data security operations in existing data security infrastructures return a data integrity validation result—but do not provide the intended data security of such infrastructures. These novel keys are referred to as degenerate keys and may be used to replace the public and private keys in existing public/private key cryptosystems. Because degenerate key data integrity validation may leverage existing data security infrastructures that are already widely-implemented, such examples may be applied immediately and configured to seamlessly transition from integrity only modes back to secure modes. In some instances, the degenerate key examples described herein may be employed during a software testing and/or factory validation stage of product development to allow for data integrity validation before burning in a developer's active (i.e.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: June 28, 2022
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Michael John Line
  • Patent number: 11368445
    Abstract: The present disclosure describes techniques that allow for a client-side application, located on a first client device, to generate a random encryption key and encrypt locally-stored application data with the random encryption key. The random encryption key is used in lieu of a password-derived encryption key. In order to ensure that the client-device application is unable to decrypt the locally-stored encrypted application data prior to authenticating with an external authentication source (i.e., SSO, IdP), the random encryption key is encrypted with a key-encrypting key derived using a pseudorandom function (PRF). By using a PRF, the first device is able to authenticate to the first server and derive a secure key as part of the authentication process. Accordingly, the present disclosure describes techniques for securing data on a client device when credentials are managed by an external authentication system.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: June 21, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Joël Alwen, Thomas Michael Leavy, Christopher Howell
  • Patent number: 11361174
    Abstract: An authentication method includes RFID tags authenticating RFID readers. A tag sends a tag identifier and a reader challenge to a reader in response to one or more commands from the reader. The reader then either derives a response to the reader challenge itself or has a verification authority derive the response. The response may be derived from parameter(s) in the reader challenge, and may be derived using a cryptographic key. The reader then sends the response to the tag along with one or more commands. The tag verifies the response before executing action(s) associated with the command(s).
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: June 14, 2022
    Assignee: Impinj, Inc.
    Inventors: Matthew Robshaw, Christopher J. Diorio
  • Patent number: 11362843
    Abstract: Techniques are disclosed to automate TLS certificate rotation. For example, a certificate rotation event may be detected from a certificate management tool. The certificate rotation event may be associated with a first certificate and may indicate that the first certificate is to be updated with a second certificate. An application server that is running on a host and to which the first certificate is bound may be identified. A certificate identifier for the second certificate may be provided to one or more agents running on the host. A distribution service may obtain certificate information, e.g., a public key, a private key, or a certificate identifier for the second certificate, from the certificate rotation tool. Some or all of the certificate information for the second certificate may be obtained by the one or more agents running on the host. The one or more agents may instruct the application server to bind the second certificate.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 14, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Zhe Jiang, Eugene S. Lam, Emil Velichkov
  • Patent number: 11361109
    Abstract: The present invention relates to a computer-implemented method for the collective signing of a file, preferably a PDF-based document, by a plurality of users, said method comprising the sequential realization of the following set of steps for each of said plurality of users: (a) providing the user with said file, and optionally with one or more existing identification strings belonging to said file; (b) determining an identification string belonging to said file based on at least said file and optionally based on said one or more existing identification strings; (c) establishing a document signature based on at least both said identification string belonging to said PDF-based document and a private key belonging to the user; (d) registering said document signature in a blockchain.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: June 14, 2022
    Assignee: ITEXT GROUP NV
    Inventor: Bruno Lowagie
  • Patent number: 11361341
    Abstract: Systems and methods are disclosed for traffic filtration by content providers. One method includes receiving a content request from a device of a user; determining whether one or more container tags are associated with requested content; determining, prior to responding to the content request, whether the content request is by a user based on the content request and the one or more container tags; generating, prior to responding to the content request, an ad request based on the content request and the one or more container tags; determining, prior to responding to the content request, an ad request recipient based on the generated ad request and the one or more container tags; transmitting the ad request to the determined ad request recipient; and transmitting, over the electronic network to the device, a response to the content request when the content request is determined to be by a user.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: June 14, 2022
    Assignee: Yahoo Ad Tech LLC
    Inventor: Seth Mitchell Demsey
  • Patent number: 11341247
    Abstract: Use of a trusted execution environment (TEE) as a safe build environment. A build task is initiated in a TEE of a compute instance. The build task generates a first software component.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: May 24, 2022
    Assignee: Red Hat, Inc.
    Inventor: Michael H. M. Bursell
  • Patent number: 11341464
    Abstract: Online ordering systems allow a user to submit sensitive information such as payment card information to a merchant in encrypted form. A payment card processor server may be used to provide the user's web browser with code for an encryption function, a cryptographic key, and a key identifier. The web browser may encrypt the payment card information by executing the encryption function and using the key. The encrypted payment card information may be supplied to the merchant over the internet. A key identifier that identifies which cryptographic key was used in encrypting the payment card information may be provided to the merchant without providing the merchant with access to the key. The merchant can forward the encrypted payment card information to the credit card processor server with the key identifier. The processor server can use the key identifier to obtain the key and decrypt the payment card information for authorization.
    Type: Grant
    Filed: July 30, 2014
    Date of Patent: May 24, 2022
    Assignee: Micro Focus LLC
    Inventors: Matthew J. Pauker, Terence Spies
  • Patent number: 11334884
    Abstract: Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is created by encapsulating digital data including the functional data using at least two cryptographic systems of two parties. The encapsulation and subsequent de-encapsulation can utilize cryptographic systems of the parties that involve a private key for signing and decryption and a public key for encryption and signature verification. If constructed carefully over a series of rigorous events, the resulting EST can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: May 17, 2022
    Assignee: INSTITUTIONAL CASH DISTRIBUTORS TECHNOLOGY, LLC
    Inventor: Mark A. Heyner
  • Patent number: 11329831
    Abstract: Methods and apparatuses for providing cryptographic authentication within a voice channel are disclosed. The methods and apparatuses can provide cryptographic authentication solely within a voice channel or can use a combination of a voice channel and another data channel. A method for providing cryptographic authentication within a voice channel can operate between telephonic systems and be suitable for operating over G.711/PCMu, AMR and SPEEX™ codecs, and suitable for operating over mobile, PSTN, and VOIP networks. The method can include providing a modem that is codec agnostic and suitable for executing a TLS-based authentication protocol. The method can include using frequency-shift modulation within a frequency range of 300-3400 Hz.
    Type: Grant
    Filed: June 8, 2017
    Date of Patent: May 10, 2022
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Patrick G. Traynor, Bradley G. Reaves, Logan E. Blue
  • Patent number: 11310039
    Abstract: The techniques described herein may provide an efficient and secure two-party distributed signing protocol, for example, for the IEEE P1363 standard. For example, in an embodiment, method may comprise generating, at a key generation center, a first partial private cryptographic key for a user ID and a second partial private cryptographic key for the user ID, transmitting the first partial private cryptographic key to a first other device, transmitting the second partial private cryptographic key to a second other device, and generating a distributed cryptographic signature for a message using the first partial private cryptographic key and the second partial private cryptographic key.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: April 19, 2022
    Assignee: Board of Regents, The University of Texas System
    Inventors: Kim Kwang Choo, Debiao He
  • Patent number: 11303438
    Abstract: Instructions and logic provide for a Single Instruction Multiple Data (SIMD) SM4 round slice operation. Embodiments of an instruction specify a first and a second source data operand set, and substitution function indicators, e.g. in an immediate operand. Embodiments of a processor may include encryption units, responsive to the first instruction, to: perform a slice of SM4-round exchanges on a portion of the first source data operand set with a corresponding keys from the second source data operand set in response to a substitution function indicator that indicates a first substitution function, perform a slice of SM4 key generations using another portion of the first source data operand set with corresponding constants from the second source data operand set in response to a substitution function indicator that indicates a second substitution function, and store a set of result elements of the first instruction in a SIMD destination register.
    Type: Grant
    Filed: July 14, 2020
    Date of Patent: April 12, 2022
    Assignee: Intel Corporation
    Inventors: Sean M. Gulley, Gilbert M. Wolrich, Vinodh Gopal, Kirk S. Yap, Wajdi K. Feghali
  • Patent number: 11301465
    Abstract: Example configurations herein include a media player that initiates playback of content (e.g., play back of a movie in a web browser). Based on input from a respective user, the media player receives selections of playback commands (e.g., play, pause, stop, rewind, fast forward, etc.) applied to the content being played back by the media player. Based on the selections, the media player creates a log report. The log report records the selections of the playback commands applied to the content and indicates, for example, a corresponding time when the playback commands were applied. According to one configuration, the media player initiates distribution of the log report to notify a publisher associated with the content which playback commands were selected during playback of the content on the media player.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: April 12, 2022
    Assignee: Adobe Inc.
    Inventors: Brian Riggs, Vijay S. Ghaskadvi, Joel Huff
  • Patent number: 11301554
    Abstract: Systems, devices, and methods for secure data management and transfer for secure data transactions are provided. For example, disclosed herein are secure & tamper resistant smart cards configured to immutably store data and securely exchange at least a portion of the data via, for example, wireless networks and/or peer-to-peer networks. The smart cards comprise a plurality of dedicated hardware circuit blocks electrically coupled via a bus interconnection, the plurality of dedicated hardware circuit blocks configured to authenticate users, verify trust amongst the smart card and external devices, and encrypt sensitive data for secure transmission.
    Type: Grant
    Filed: March 13, 2019
    Date of Patent: April 12, 2022
    Assignee: ETHERNOM, INC.
    Inventors: Hock Thye Law, Orang Dialameh, Ulrich Franz Buddemeier, Lyn Phuong Nguyen, Lun Feng Tan, Alexandre Charapov, Tim Dorcey, Imraan Ahmed
  • Patent number: 11297500
    Abstract: A digital media authentication system comprises a media processing application executed by a mobile electronic device that computes a robust image hash for media data acquired by the mobile electronic device; a location attestation system that validates a location context of the media data, the location context determined in response to an object scene in a field of view of the mobile electronic device captured for conversion to the media data; and a blockchain network that maintains a ledger entry that includes the robust image hash, an immutable timestamp, and a location certificate validating the location context of the media data.
    Type: Grant
    Filed: April 15, 2020
    Date of Patent: April 5, 2022
    Assignee: Research Foundation of the City University of New York
    Inventor: Shweta Jain
  • Patent number: 11294846
    Abstract: In one embodiment, an apparatus includes: a processing circuit to execute instructions; and a host controller coupled to the processing circuit to perform a key exchange with a second device to couple to the apparatus via a bus to which a plurality of devices may be coupled, and in response to a successful completion of the key exchange, enable secure communication with the second device. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: April 5, 2022
    Assignee: Intel Corporation
    Inventors: Amit Kumar Srivastava, Kenneth P. Foust
  • Patent number: 11294888
    Abstract: The present application relates to a blockchain system based on Ethereum, including a master node configured to receive a transaction request transmitted by a client terminal, perform transaction processing by calling a smart contract deployed in a consortium blockchain according to the transaction request to obtain transaction data; and use the transaction data to generate a block, and broadcast the block is to the plurality of backup nodes; backup node configured to receive the block and verify the transaction data of the block; the master node is further configured to generate a first-stage certificate using complete block information, and transmit the first-stage certificate to the plurality of backup nodes; the backup node is further configured to respectively generate a second-stage certificate and a third-stage certificate according to a block hash value in the first-stage certificate, and the second-stage certificate and the third-stage certificate are respectively used to negotiate on the block to ob
    Type: Grant
    Filed: November 23, 2017
    Date of Patent: April 5, 2022
    Assignee: PING AN TECHNOLOGY (SHENZHEN) CO., LTD.
    Inventors: Yiming Wu, Qingshan Gu
  • Patent number: 11288985
    Abstract: An encryption device includes hardware processors to: acquire a public key including an identification polynomial f(t) and a multivariable indeterminate equation X having elements of a ring Fp[t]/g(t) as coefficients; disperse and embed a message m as coefficients of plaintext polynomial factors mi having, as coefficients, polynomials with a limited degree among the elements of the ring; generate a plaintext polynomial M by multiplying the plaintext polynomial factors mi; randomly generate a random polynomial r having as a coefficient an element of the ring; randomly generate a noise polynomial e having as coefficients polynomials with a limited degree among the elements of the ring; and generate a ciphertext by encryption processing of performing an operation including adding, subtracting, or multiplying the identification polynomial f(t), the random polynomial r, the noise polynomial e, and the multivariable indeterminate equation X to, from, or by the plaintext polynomial M.
    Type: Grant
    Filed: August 27, 2020
    Date of Patent: March 29, 2022
    Assignee: KABUSHIKI KAISHA TOSHIBA
    Inventor: Koichiro Akiyama
  • Patent number: 11283606
    Abstract: The present disclosure provides a trusted execution environment-based key burning system. After a terminal device is enabled, a normal operating system is started, the normal operating system acquires key data to be burned and outputs a switching signal and the key data to be burned, a microprocessor receives the switching signal in a monitor mode and the microprocessor is switched to the secure operating system from the normal operating system, the secure operating system receives the key data to be burned and decrypts the data to be burned according to preset key data, to acquire and write the corresponding original key data into a secure storage area of the secure operating system. Due to the use of the trusted execution environment-based key burning, the key is burned, stored and used safely. In addition, the cryptography protects the key from unexpected damage in transmission and keeps the key integral.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: March 22, 2022
    Assignee: AMLOGIC (SHANGHAI) CO., LTD.
    Inventors: Pengguang Zhu, Peifu Jiang
  • Patent number: 11283628
    Abstract: An information processing device includes: a non-volatile storage; a communication interface; a processor; and a memory. The non-volatile storage is configured to store a private key. The memory stores computer-readable instructions therein. The computer-readable instructions, when executed by the processor, cause the information processing device to perform: acquiring the private key from the non-volatile storage; acquiring a certificate from a specific external device via the communication interface, the certificate including a public key corresponding to the private key, and the specific external device being different from the information processing device; converting specific data using the private key to generate converted specific data, the converting including one of encrypting the specific data and decrypting the specific data encrypted using the public key; and outputting the certificate.
    Type: Grant
    Filed: March 27, 2018
    Date of Patent: March 22, 2022
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Ken Saito
  • Patent number: 11281805
    Abstract: The present invention relates to a computer-implemented method for recording a location of a file by a user in a blockchain; said location comprising one or more location alternatives; said method comprising the following steps: (a) receiving, from said user, at least said file and said location; (b) calculating a file hash based on said file by means of a cryptographic function; (c) optionally, evaluating a uniqueness of said file hash and/or said location and/or a further characteristic with respect to the blockchain, in which a non-uniqueness leads to a corresponding action; (d) composing a location reference comprising said location and said file hash; (e) registering said location reference In said blockchain.
    Type: Grant
    Filed: October 25, 2017
    Date of Patent: March 22, 2022
    Assignee: ITEXT GROUP NV
    Inventor: Bruno Lowagie
  • Patent number: 11283591
    Abstract: Multiple systems may determine neural-network output data and neural-network parameter data and may transmit the data therebetween to train and run the neural-network model to predict an event given input data. A data-provider system may perform a dot-product operation using encrypted data, and a secure-processing component may decrypt and process that data using an activation function to predict an event. Multiple secure-processing components may be used to perform a multiplication operation using homomorphic encrypted data.
    Type: Grant
    Filed: May 25, 2021
    Date of Patent: March 22, 2022
    Assignee: Via Science, Inc.
    Inventors: Kai Chung Cheung, Mathew Rogers, Jeremy Taylor
  • Patent number: 11277257
    Abstract: A method for performing an operation according to one embodiment includes performing a homomorphic operation using one or more ciphertexts that are homomorphically encrypted based on an encryption key, determining a count value for a ciphertext generated through the homomorphic operation based on count values for each of the one or more ciphertexts, requesting a key management apparatus, which holds the encryption key and a decryption key corresponding to the encryption key, to re-encrypt the generated ciphertext based on the determined count value, acquiring, from the key management apparatus, a ciphertext generated by re-encrypting the generated ciphertext through decryption based on the decryption key and encryption based on the encryption key; and determining a count value for the acquired ciphertext to be a preset initial value.
    Type: Grant
    Filed: May 27, 2020
    Date of Patent: March 15, 2022
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Eun Kyung Kim, Duk Jae Moon, Hyo Jin Yoon, Jung Hoon Sohn, Jang Hyuk Ahn, Jin Hyuck Jeong, Ji Hoon Kwon, Young Hyun Kim
  • Patent number: 11275836
    Abstract: Disclosed herein are systems and methods for determining trust levels of files on a computing device. In one aspect, an exemplary method comprises, selecting file names which are stable, generating at least one group of files from at least two files of the selected file names, the at least two files being components of a same application, searching for a presence of a dominant developer such that at least one private key of the dominant developer has been used to sign at least one file of the group of files that is generated, when a dominant developer is found, determining a trust level for all files of the group in accordance with verdicts associated with the dominant developer, and when the dominant developer is not found, determining the trust level for all the files of the group based on verdicts of outside services that have been assigned to the files of the group.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: March 15, 2022
    Assignee: AO Kaspersky Lab
    Inventors: Sergey G. Zagorsky, Dmitry V. Shvetsov
  • Patent number: 11270006
    Abstract: A storage device can include processing and cryptographic capability enabling the device to function as a hardware security module (HSM). This includes the ability to encrypt and decrypt data using a cryptographic key, as well as to perform processing using such a key, independent of whether that processing involves data stored on the device. An internal key can be provided to the drive, whether provided before customer software access or received wrapped in another key, etc. That key enables the device to perform secure processing on behalf of a user or entity, where that key is not exposed to other components in the network or environment. A key may have specified tasks that can be performed using that key, and can be discarded after use. In some embodiments, firmware is provided that can cause a storage device to function as an HSM and/or processing device with cryptographic capability.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: March 8, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Eric Jason Brandwine
  • Patent number: 11271715
    Abstract: A system and method for encryption of data. The system and method utilizes a cryptographic function that provides asymmetric encryption/decryption and digital signing capabilities that are hardened against cyber attack from quantum computers.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: March 8, 2022
    Assignee: 01 Communique Laboratory Inc.
    Inventors: Sergey Bezzateev, Sergey Strakhov, Andrew Cheung
  • Patent number: 11265713
    Abstract: A system comprises a computer including a processor and a memory. The memory storing instructions executable by the processor to transmit an authentication request to a vehicle computer, receive, from the vehicle computer, a response including data proving that the vehicle computer includes confidential information, wherein the data does not convey the confidential information, determine whether the response is valid based on the authentication request, and transmit a warning to the vehicle computer when the response is not valid.
    Type: Grant
    Filed: October 14, 2019
    Date of Patent: March 1, 2022
    Assignee: Ford Global Technologies, LLC
    Inventors: Pramita Mitra, Amanuel Zeryihun, Eric H. Wingfield, Abhishek Sharma, James Fishelson, Yifan Chen
  • Patent number: 11263352
    Abstract: Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.
    Type: Grant
    Filed: July 23, 2020
    Date of Patent: March 1, 2022
    Assignee: Intel Corporation
    Inventors: Manoj R. Sastry, Alpa Narendra Trivedi, Men Long
  • Patent number: 11257076
    Abstract: Systems, methods and devices for validating and performing operations on homomorphically encrypted data are described herein. The methods include securely transmitting and extracting information from encrypted data without fully decrypting the data. A data request may include an encrypted portion including a set of confidential data. One or more sets of encrypted comparison data may be then retrieved from a database in response to the data request. The encrypted set of confidential data from the data request is then compared with each set of encrypted comparison data using one or more homomorphic operations to determine which set of encrypted comparison data matches the encrypted set of confidential data. If there is a match, this validates the set of confidential data. An encrypted indicator is then generated indicating success or failure in validating the set of confidential data, which may then be forwarded to a party associated with the data request.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: February 22, 2022
    Assignee: Shield Crypto Systems Inc.
    Inventors: Glenn Gulak, Alhassan Khedr
  • Patent number: 11258614
    Abstract: This disclosure relates to anonymous transactions based on ring signatures. In one aspect, a method includes receiving a remittance transaction. The remittance transaction is generated by a client device of a remitter by assembling unspent assets in an account corresponding to the remitter and masked assets in an account corresponding to a masked participant. Key images are obtained from a linkable spontaneous anonymous group (LSAG) signature of the remittance transaction. Values of the key-images are based on a private key, a public key, and unspent assets of the remitter. The LSAG signature is verified. The LSAG signature is generated by the client device of the remitter based on the private key and the public key of the remitter, and a second public key of the masked participant. The remittance transaction is executed when a transaction execution condition is met.
    Type: Grant
    Filed: May 27, 2021
    Date of Patent: February 22, 2022
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Wenbin Zhang
  • Patent number: 11256796
    Abstract: The invention relates to a method for ensuring the authenticity of at least one value of a device property wherein the device property is a characteristic of a device (6). According to the invention, at least one operating value (14, 16) of at least one dynamic device property is signed using a digital key (20), wherein an operating-dependent digital signature (2) is generated.
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: February 22, 2022
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Oliver Drumm, Anna Palmin
  • Patent number: 11249724
    Abstract: A computational apparatus includes a memory unit and Read-Modify-Write (RMW) logic. The memory unit is configured to hold a data value. The RMW logic, which is coupled to the memory unit, is configured to perform an atomic RMW operation on the data value stored in the memory unit.
    Type: Grant
    Filed: August 28, 2019
    Date of Patent: February 15, 2022
    Assignee: HABANA LABS LTD.
    Inventors: Shlomo Raikin, Ron Shalev, Sergei Gofman, Ran Halutz, Nadav Klein
  • Patent number: 11251973
    Abstract: A computer system module(s) substitutes a double scalar multiplication, used for signature verification in an encryption/decryption system, for two single scalar multiplications. The modules verify a group equation defined by [S]B=R+[k]A? of the encryption/decryption system, where S is an integer characterized by the signature, K is an integer generated by a message being encrypted, B is a base point on the elliptic curve, R is a point on the elliptic curve and characterized by the signature, and A? is a public key. The modules optionally rearrange the group equation to [S]B+[?k]A?=R, and convert it to [S]B+[n?k]A?=R, where n is the order of the base point. The modules determine a joint sparse form for the integers S and n?k and apply the Shamir's algorithm to the joint sparse form to verify the group equation.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: February 15, 2022
    Assignee: Synopsys, Inc.
    Inventor: Jithra Adikari
  • Patent number: 11251935
    Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may blinded by multiplying the value based on an exponentiation of a random number raised to an exponent value that is associated with a public key. A cryptographic operation may be performed based on the blinded value.
    Type: Grant
    Filed: March 12, 2020
    Date of Patent: February 15, 2022
    Assignee: Cryptography Research, Inc.
    Inventor: Michael Tunstall
  • Patent number: 11250423
    Abstract: Functional data for use in one or more digital transactions are secured by using an encapsulated security token (EST). In certain embodiments, the EST is created by encapsulating digital data including the functional data using at least two cryptographic systems of two parties. The encapsulation and subsequent de-encapsulation can utilize cryptographic systems of the parties that involve a private key for signing and decryption and a public key for encryption and signature verification. If constructed carefully over a series of rigorous events, the resulting EST can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: February 15, 2022
    Assignee: INSTITUTIONAL CASH DISTRIBUTORS TECHNOLOGY, LLC
    Inventor: Mark A. Heyner
  • Patent number: 11243929
    Abstract: A data system may dynamically prioritize and ingest data so that, regardless of the memory size of the dataset hosted by the data system, it may process and analyze the hosted dataset in constant time. The system and method may implement a first space-efficient probabilistic data structure on the dataset, wherein the dataset includes a plurality of profile data. It may then receive update data corresponding to some of the plurality of profile data and implement a second space-efficient probabilistic data structure on the dataset including the update data. The system and method may then determine a set of non-shared profile data of the second space-efficient probabilistic data structure and prioritize the set of non-shared profile data of the second space-efficient probabilistic data structure over other profile data of the dataset for caching.
    Type: Grant
    Filed: August 8, 2018
    Date of Patent: February 8, 2022
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Peijie Li, Yu Gu, Hongqin Song
  • Patent number: 11233660
    Abstract: A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.
    Type: Grant
    Filed: August 2, 2021
    Date of Patent: January 25, 2022
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Wenbin Zhang
  • Patent number: 11228429
    Abstract: A communication device for communication with a network device during EAP-AKA?. The communication device is operative to receive a first Perfect Forward Secrecy, PFS, parameter value and at least one attribute value indicating a choice of a Diffie-Hellman group from the network device. The communication device is also operative to receive a cipher key, CK, and an integrity key, IK. Generate a modified cipher key, CK?, and a modified integrity key, IK? based on CK, IK and an access network identity. Operations include calculating a second PFS parameter value. Send the second PFS parameter value to the network device. Calculate a third PFS parameter value. Derive, using a Pseudo-random function, a key based on the third PFS parameter value, CK?, IK? and an identity associated with the communication device. A network device, methods, further communication devices, a server, computer programs and a computer program product are also disclosed.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: January 18, 2022
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Jari Arkko, Karl Norrman, Vesa Torvinen
  • Patent number: 11228447
    Abstract: Embodiments of the invention provide enhanced security solutions which are enforced through the use of cryptographic techniques. It is suited for, but not limited to, use with blockchain technologies such as the Bitcoin blockchain. Methods and devices for generating an elliptic curve digital signature algorithm signature (r, w) are described.
    Type: Grant
    Filed: April 26, 2018
    Date of Patent: January 18, 2022
    Assignee: nChain Licensing AG
    Inventor: Thomas Trevethan
  • Patent number: 11228583
    Abstract: Embodiments described include systems and methods for slogan based sharing of network application objects. The method may include executing a network application on behalf of a client application executed by a first client device. The client application may include an embedded browser. The method may include receiving from the client application a selection of an object of the network application to be shared with a second client device. The method may include selecting a unique sequence of words from a pre-defined list of words, associating the unique sequence of words with the selected object of the network application, transmitting the unique sequence of words to the first client device, and receiving the unique sequence of words from the second client device. The method may include, responsive to receipt of the unique sequence of words from the second client device, accessing the selected object of the network application.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: January 18, 2022
    Assignee: CITRIX SYSTEMS, INC.
    Inventor: Abhishek Chauhan
  • Patent number: 11218290
    Abstract: A server receives a corresponding data value encrypted using a common threshold public key from each of a plurality of clients. The server distributes the received data values to the clients for evaluating comparison of values. The server receives the encrypted comparison results from each of the clients in response to the distribution of the received encrypted data values. The comparison results are encrypted using the common key. The server homomorphically determines a ciphertext encrypting the rank of each client's data value using the comparison results. Further, the server can compute a ciphertext encrypting the median of the datasets. Thereafter, the server can initiate a threshold decryption to generate a final result.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: January 4, 2022
    Assignee: SAP SE
    Inventors: Anselme Kemgne Tueno, Florian Kerschbaum
  • Patent number: 11206128
    Abstract: According to one or more embodiments of the present invention, a computer implemented method includes computing a hash value of a page of memory of a computer system and comparing the hash value with a previously computed hash value of the page. A per-encryption value per page can be used in encrypting the page based on determining that the hash value matches the previously computed hash value. A modified value of the per-encryption value per page can be used in encrypting the page based on determining that the hash value mismatches the previously computed hash value.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: December 21, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan D. Bradbury, Christian Borntraeger, Heiko Carstens, Martin Schwidefsky, Reinhard Theodor Buendgen
  • Patent number: 11201731
    Abstract: Methods and apparatus for code-based asymmetric cryptosystem using Quasi-Cyclic Moderate-Density Parity-Check (QC-MDPC) error correcting codes. Specifically, the method and apparatus generalizes the framework of (QC-MDPC) Code-Based (CB) cryptography from the binary domain (Galois Field of two elements) to an arbitrary size of Galois Field and provides an apparatus for implementing the cryptosystem with a simplified computational complexity of key generation, encryption, and decryption components of the cryptosystems and reduced sizes of the public and private security keys.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: December 14, 2021
    Assignee: Zenith Electronics LLC
    Inventors: Kyle Xingkai Bao, Nejib Ammar
  • Patent number: 11195124
    Abstract: Provide herein is a method and system capable of authenticating transactions involving at least one service provider and one or more users who are each in electronic communication. This electronic communication can be, for example, SMS, MMS, e-mail, or online account messaging. It is an aspect of certain embodiments where the transaction is an authentication and/or verification of an entity. Examples of such entities are products, actions and users.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: December 7, 2021
    Inventor: Jukka Salonen
  • Patent number: 11196556
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: December 7, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Yao Wang, Hao Lei, Li Lin
  • Patent number: 11184152
    Abstract: Disclosed is an electronic device for performing code-based encryption supporting integrity verification of a message and an operating method thereof. When a data transmission side encrypts a message through code-based encryption and transmits the encrypted message to a data reception apparatus, the data transmission side is allowed to use a hash value generated based on a part of the message as an error in code-based encryption to support the data reception apparatus to verify an integrity of a received message by using the hash value.
    Type: Grant
    Filed: November 5, 2019
    Date of Patent: November 23, 2021
    Assignees: DONGGUK UNIVERSITY INDUSTRY-ACADEMIC COOPERATION FOUNDATION, Industry-Academic Cooperation Foundation, Chosun University
    Inventors: Dae Woon Lim, Young Sik Kim, Ki Soon Yu
  • Patent number: 11184148
    Abstract: A system, method and elliptic curve cryptography scheme using an Edwards-form elliptic curve. The elliptic curve cryptography scheme having a blinding protocol resistant to differential side channel attacks. The elliptic curve defined over field F and having a point P with coordinates located on the elliptic curve. The blinding protocol including: randomly selecting a random element I; and determining coordinates of a blinded point PB by performing a multiplication of a random element I by at least one of the coordinates of point P.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: November 23, 2021
    Assignee: INFOSEC GLOBAL INC.
    Inventors: Vladimir Soukharev, Basil Hess
  • Patent number: 11182783
    Abstract: Provided are an electronic payment method and an electronic device using identity-based public key cryptography. The electronic payment method includes receiving, from a key management service (KMS) server that stores personal information of a user, a private key of the user generated according to an Identity-based public key cryptography (IDPKC) protocol; encrypting payment information by using a public key of a payment device being generated according to the IDPKC protocol, and encrypting order information by using a public key of a seller device being generated according to the IDPKC protocol; producing, according to the IDPKC protocol, a dual signature of the encrypted payment information and the encrypted order information by using the private key; transmitting a transaction request including the dual-signed payment information and the dual-signed order information to the seller device; and receiving a response to the transaction request from the seller device.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: November 23, 2021
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Parashuram Chawan, Paulo Sergio Alves Martins