Public Key Patents (Class 380/30)
  • Patent number: 11966380
    Abstract: A secure storage module of a client device interacts with a set of secure storage servers to securely store data items of the client on the servers, such that no individual server has the data in readable (non-obfuscated) form. Additionally, the client secure storage module and the servers interact to allow the client device to read a given portion of the original data items from the servers, such that none of the servers can determine which portion of the original data is being requested. Similarly, the interactions of the client secure storage module and the servers allows the client device to update a given portion of the original data on the servers to a new value, such that none of the servers can determine which portion is being updated and that none of the servers can determine either the prior value or new value or the difference between the new value and the prior value.
    Type: Grant
    Filed: July 21, 2021
    Date of Patent: April 23, 2024
    Assignee: SYMPHONY COMMUNICATION SERVICES HOLDINGS LLC
    Inventors: Christian Tschudin, David M′Raihi
  • Patent number: 11968304
    Abstract: At least one proof transaction for recording on a blockchain comprises at least an s-part for an Elliptic Curve Digital Signature Algorithm, ECDSA, signature. The s-part is computed from a set of signature components, each provided by a participant of a signing subset of a set of keyshare participants. Each of keyshare participant holds an ephemeral keyshare of an unknown ephemeral key, and each of the signing components is provided by the participant of the signing subset based on their ephemeral keyshare. The at least one proof transaction indicates an r-challenge of at least one challenge transaction, and a node of a blockchain network applies signature verification to: (i) the s-part of the at least one proof transaction, and (ii) one of: (iia) an r-part of the r-challenge, (iib) an r-part of the at least one proof transaction, and in that event checks that that r-part satisfies the r-challenge.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: April 23, 2024
    Assignee: nChain Licensing AG
    Inventors: Craig Wright, Daniel Joseph
  • Patent number: 11949784
    Abstract: A system for auditing event data includes an interface and a processor. The interface is configured to receive an audit query request and a client key. The processor is configured to determine whether the audit query request is valid; determine whether a chain of events is stored in an audit store, wherein the chain of events is associated with the audit query request; and in response to determining that the chain of events is stored in the audit store, provide data for the audit query request.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: April 2, 2024
    Assignee: Ridgeline, Inc.
    Inventors: George Michael Barrameda, Joan Hyewon Hong, Hayden Ray Hudgins, Nathan Matthew Macfarlane
  • Patent number: 11936768
    Abstract: An obfuscation process is described for obfuscating a cryptographic parameter of cryptographic operations such as calculations used in elliptical curve cryptography and elliptical curve point multiplication. Such obfuscation processes may be used for obfuscating device characteristics that might otherwise disclose information about the cryptographic parameter, cryptographic operations or cryptographic operations more generally, such as information sometimes gleaned from side channel attacks and lattice attacks.
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: March 19, 2024
    Assignee: Microchip Technology Incorporated
    Inventor: Huiming Chen
  • Patent number: 11924346
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for masked sampling of polynomials for lattice-based cryptography in a processor, the instructions, including: determining a number m of random bits to be sampled based upon a sample bound parameter ?; producing a plurality of Boolean masked shares of a polynomial coefficient each having the determined number m of random bits using a uniform random function; determining that the polynomial coefficient is within a range of values based upon the sample bound parameter ?; converting the plurality of Boolean masked shares of the polynomial coefficient to a plurality of arithmetic masked shares of the polynomial coefficient; and shifting the plurality of arithmetic masked shares based upon the sample bound parameter ?.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: March 5, 2024
    Assignee: NXP B.V.
    Inventors: Markus Schoenauer, Tobias Schneider, Joost Roland Renes, Melissa Azouaoui
  • Patent number: 11909647
    Abstract: A first device transmits a first random number to a second device through a first quantum channel, and receives a second random number from the second device through a second quantum channel. The first device generates a first encryption key based on the first random number and the second random number. The second device transmits the second random number to the first device through the second quantum channel, and receives the first random number from the first device through the first quantum channel. The second device generates a second encryption key based on the first random number and the second random number.
    Type: Grant
    Filed: July 9, 2020
    Date of Patent: February 20, 2024
    Assignee: NEC CORPORATION
    Inventors: Takao Ochi, Ken-ichiro Yoshino, Akio Tajima
  • Patent number: 11909864
    Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: February 20, 2024
    Assignee: GOOGLE LLC
    Inventors: Craig Wright, Benjamin R. Kreuter, James Robert Koehler, Evgeny Skvortsov, Arthur Asuncion, Laura Grace Book, Sheng Ma, Jiayu Peng, Xichen Huang
  • Patent number: 11895240
    Abstract: In IaaS (Infrastructure as a Service), when it is desirable to delegate the authority to a user outside a system, a recipient of an access token is designated, thereby preventing illegal distribution of the access token. There is provided an access token system including a generator and a verifier. The generator generates, using secret information of a recipient, a recipient-designated access token for which the recipient is designated, and provides the recipient-designated access token to a user. The verifier verifies that the user who makes access using the recipient-designated access token is the designated recipient.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: February 6, 2024
    Assignee: NEC CORPORATION
    Inventors: Hikaru Tsuchida, Kengo Mori, Toshiyuki Isshiki
  • Patent number: 11888995
    Abstract: A system, method, and apparatus for carrying out a value transfer is provided. A method includes receiving, by a computing system of a financial institution, a de-signcrypted value transfer message including terms of a value transfer from an account of a sending party to an account of a merchant, wherein a receiving party desires to make a purchase from the merchant and the value transfer is a payment from the sending party account to the merchant account; and one or more spending limitations on the desired purchase, wherein the payment is contingent on the desired purchase meeting the spending limitations. The method then includes verifying the authenticity of the de-signcrypted message using a public key of the sending party and a private key of the financial institution; and dispersing funds according to the terms of the value transfer.
    Type: Grant
    Filed: October 17, 2022
    Date of Patent: January 30, 2024
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Jal Daruwalla, Phillip H. Griffin, Ashia D. Kennon, Michael Knorr, Lynnel J. Kresse, Catherine Wangari Mwangi, Joanne Strobel-Cort
  • Patent number: 11870889
    Abstract: A processor-implemented method with homomorphic encryption includes: receiving a first ciphertext corresponding to a first modulus; generating a second ciphertext corresponding to a second modulus by performing modulus raising on the first ciphertext; and performing bootstrapping by encoding the second ciphertext using a commutative property and an associative property of operations included in a rotation operation.
    Type: Grant
    Filed: November 2, 2021
    Date of Patent: January 9, 2024
    Assignees: Samsung Electronics Co., Ltd., Seoul National University R & DB Foundation, Industry Academic Cooperation Foundation, Chosun University
    Inventors: Jong-Seon No, Yongwoo Lee, Young-Sik Kim
  • Patent number: 11870900
    Abstract: Techniques for determining whether a public encryption key is vulnerable as the result of deficiencies in pseudorandom number generation algorithms are provided. In some embodiments, a system may compile a database of cryptographic information received from a plurality of sources, including databases, and network traffic monitoring tools. RSA public keys extracted from the cryptographic information may be stored in an organized database in association with corresponding metadata. The system may construct a product tree from all unique collected RSA keys, and may then construct a remainder tree from the product tree, wherein each output remainder may be determined to be a greatest common divisor of one of the RSA keys against all other unique RSA keys in the database. The system may then use the greatest common divisors to factor one or more of the RSA keys and to determine that the factored keys are vulnerable to being compromised.
    Type: Grant
    Filed: November 21, 2022
    Date of Patent: January 9, 2024
    Assignee: NOBLIS, INC.
    Inventor: Samuel S. Gross
  • Patent number: 11853445
    Abstract: In one embodiment, data at rest is securely stored. A data safe performing data plane processing operations in response to requests of received read data requests, received write data requests, and received read information responses, with the data safe being immutable to processing-related modifications resulting from said performing data plane processing operations. Performing these data plane processing operations does not expose any pilot keys outside the data safe in plaintext form nor in encrypted form. The pilot keys are used to encrypt information that is subsequently stored in a storage system. In one embodiment, the information encrypted and decrypted by the data safe includes data structure instances including feature-preserving encrypted entries generated using feature-preserving encryption on corresponding plaintext data items.
    Type: Grant
    Filed: January 4, 2022
    Date of Patent: December 26, 2023
    Assignee: Q-Net Security, Inc.
    Inventors: Jerome R. Cox, Jr., Ronald S. Indeck, William Berndt Parkinson
  • Patent number: 11856083
    Abstract: In response to identifying that a Single Instruction, Multiple Data (SIMD) operation has been instructed to be performed or has been performed by a Fully-Homomorphic Encryption (FHE) software on one or more original ciphertexts, performing the following steps: Performing the same operation on one or more original plaintexts, respectively, that are each a decrypted version of one of the one or more original ciphertexts. Decrypting a ciphertext resulting from the operation performed on the one or more original ciphertexts. Comparing the decrypted ciphertext with a plaintext resulting from the same operation performed on the one or more original plaintexts. Based on said comparison, performing at least one of: (a) determining an amount of noise caused by the operation, (b) determining whether unencrypted data underlying the one or more original ciphertexts has become corrupt by the operation, and (c) determining correctness of an algorithm which includes the operation.
    Type: Grant
    Filed: January 6, 2022
    Date of Patent: December 26, 2023
    Assignee: International Business Machines Corporation
    Inventors: Ehud Aharoni, Omri Soceanu, Allon Adir, Gilad Ezov, Hayim Shaul
  • Patent number: 11853160
    Abstract: A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured to receive key value (KV) pair data, determine an entropy value of the received KV pair data, select an error correction code (ECC) code rate based on the determined entropy value, and program the KV pair data to a codeword (CW). The KV pair data includes a key and a value. The programming includes encoding the KV pair data using the selected ECC code rate. The controller is further configured to aggregate a portion of another KV pair data and the KV pair data and program the aggregated KV pair data to the CW using a selected ECC code rate.
    Type: Grant
    Filed: May 27, 2022
    Date of Patent: December 26, 2023
    Assignee: Western Digital Technologies, Inc.
    Inventors: David Avraham, Alexander Bazarsky, Ran Zamir
  • Patent number: 11836468
    Abstract: Provided is a method and system for building a compliance software service using reusable and configurable components. In one example, the method may include receiving a request to build a software in association with an identified jurisdiction from among a plurality of jurisdictions, retrieving a plurality of configurable software components which comprise built-in functionality that is generic across the plurality of jurisdictions, dynamically configuring non-generic functionality for the identified jurisdiction within the plurality of configurable software components based on inputs received from a user, and creating a software program for the identified jurisdiction based on the dynamically configured software components and storing a file including the created software program in a storage device.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: December 5, 2023
    Assignee: SAP SE
    Inventors: Karthik Thiru, Ravi Natarajan, Prateek Tripathi, Soumya Ranjan Das, Ankit Jain, Kishan Rao Ramesh Yaradi, Vijayalakshmi Mohandoss, Avinash Bhaskar, Kartik Chandra, Pavithra Thiagarajan, Yatendra Kumar Tiwari
  • Patent number: 11792012
    Abstract: A method is disclosed. An authentication node may receive a plurality of encrypted match values, wherein the plurality of encrypted match values were formed by a plurality of worker nodes that compare a plurality of encrypted second biometric template parts derived from a second biometric template to a plurality of encrypted first biometric template parts derived from a first biometric template. The authentication node may decrypt the plurality of encrypted match values resulting in a plurality of decrypted match values. The authentication node may then determine if a first biometric template matches the second biometric template using the plurality of decrypted match values. An enrollment node may be capable of enrolling a biometric template and storing encrypted biometric template parts at worker nodes.
    Type: Grant
    Filed: March 1, 2022
    Date of Patent: October 17, 2023
    Assignee: Visa International Service Association
    Inventors: Sunpreet Singh Arora, Lacey Best-Rowden, Kim Wagner
  • Patent number: 11784800
    Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.
    Type: Grant
    Filed: July 7, 2020
    Date of Patent: October 10, 2023
    Assignee: GOOGLE LLC
    Inventors: Craig Wright, Benjamin Kreuter, James Robert Koehler, Arthur Asuncion, Evgeny Skvortsov, Laura Grace Book, Sheng Ma, Jiayu Peng, Xichen Huang
  • Patent number: 11785005
    Abstract: The disclosed technology provides for establishment of a secure tunnel with implicit device identification. The implicit device identification can be provided during establishment of a secure tunnel with a server by performing a mutual authentication with the server using a device-specific private key of the device. The device-specific private key may be provisioned during manufacturing of the device and stored by a secure hardware component of the device. Establishing the secure tunnel using implicit device identification can be helpful for operations in which a server is configured to only establish secure communications with one or more particular types of device, and can be performed without the use additional device identification communications.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: October 10, 2023
    Assignee: Apple Inc.
    Inventors: Srinivas Vedula, Joel N. Kerr
  • Patent number: 11777729
    Abstract: Provided are methods and systems for performing secure analytics using term generations and a homomorphic encryption. An example method includes receiving, by at least one server from a client, a term generation function, a hash function, a public key of a homomorphic encryption scheme, and a homomorphically encrypted list of indices, wherein the list of indices is generated using the term generation function and the hash function, applying, by the server, the term generation function, the hash function, and the public key to a data set to determine a further homomorphically encrypted list of indices, extracting, by the server and using the homomorphically encrypted list of indices and the further homomorphically encrypted list of indices, data from the encrypted data set to obtain an encrypted result, and sending the encrypted result to the client to decrypt the encrypted result using a private key of the homomorphic encryption scheme.
    Type: Grant
    Filed: September 17, 2021
    Date of Patent: October 3, 2023
    Assignee: Enveil, Inc.
    Inventors: Ellison Anne Williams, Ryan Carr
  • Patent number: 11768964
    Abstract: Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.
    Type: Grant
    Filed: February 23, 2022
    Date of Patent: September 26, 2023
    Assignee: INTEL CORPORATION
    Inventors: Manoj R. Sastry, Alpa Narendra Trivedi, Men Long
  • Patent number: 11758401
    Abstract: A method including receiving, by a first device from a second device in a mesh network, message data to be transmitted to a communication device, the message data being received via a first meshnet connection between the first device and the second device; and transmitting, by the first device to the second device, response data based at least in part on transmitting the message data to the communication device, the response data being transmitted via the first meshnet connection. Various other aspects are contemplated.
    Type: Grant
    Filed: February 6, 2022
    Date of Patent: September 12, 2023
    Assignee: UAB 360 IT
    Inventors: Vykintas Maknickas, Emanuelis Norbutas
  • Patent number: 11728988
    Abstract: An electronic key pre-distribution device for configuring multiple network nodes with local key information is provided. The key pre-distribution device applies at least a first hash function and a second hash function to a digital identifier of a network node. The first and second hash functions map the digital identifier to a first public point and a second public point on a first elliptic curve and second elliptic curve. A first and second secret isogeny are applied to the first and second public elliptic curve points, to obtain a first private elliptic curve point and second private elliptic curve point that are part of private key material for the network node.
    Type: Grant
    Filed: February 12, 2018
    Date of Patent: August 15, 2023
    Assignee: Koninklijke Philips N.V.
    Inventors: Oscar Garcia Morchon, Sauvik Bhattacharya, Ludovicus Marinus Gerardus Maria Tolhuizen, Ronald Rietman
  • Patent number: 11722305
    Abstract: Embodiments disclosed herein are directed to methods and systems of password-based threshold authentication, which distributes the role of an authentication server among multiple servers. Any t servers can collectively verify passwords and generate authentication tokens, while no t?1 servers can forge a valid token or mount offline dictionary attacks.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: August 8, 2023
    Assignee: Visa International Service Association
    Inventors: Payman Mohassel, Shashank Agrawal, Pratyay Mukherjee, Peihan Miao
  • Patent number: 11722312
    Abstract: Signing data so that a signature can be verified by a verifier while preserving the privacy of a signer, the method including: generating a signature nonce; encrypting the signature nonce with a public key of the verifier to produce an encrypted signature nonce; and calculating a signature of the data of the signer by signing the data concatenated with the signature nonce using a private key of the signer.
    Type: Grant
    Filed: March 9, 2020
    Date of Patent: August 8, 2023
    Assignees: Sony Group Corporation, Sony Pictures Entertainment Inc.
    Inventor: Eric Diehl
  • Patent number: 11722499
    Abstract: A method including determining, by a first device in communication with a second device in a mesh network, an instant message to be transmitted to the second device; first encrypting, by the first device, the instant message based at least in part on utilizing a symmetric key negotiated between the first device and the second device; second encrypting, by the first device, the first encrypted instant message based at least in part on utilizing a public key associated with the second device; and selectively transmitting, by the first device, the second encrypted instant message to the second device. Various other aspects are contemplated.
    Type: Grant
    Filed: February 5, 2022
    Date of Patent: August 8, 2023
    Assignee: UAB 360 IT
    Inventors: Vykintas Maknickas, Emanuelis Norbutas
  • Patent number: 11722468
    Abstract: A method including determining, by a first device in communication with a second device and a third device in a mesh network, a first instant message to be transmitted to the second device and a second instant message to be transmitted to the third device, the first instant message and the second instant message including instant messaging (IM) information; encrypting, by the first device, the first instant message based at least in part on utilizing a symmetric key negotiated between the first device and the second device and the second instant message based at least in part on utilizing a symmetric key negotiated between the first device and the third device; and selectively transmitting, by the first device, the encrypted first instant message over a first meshnet connection and the encrypted second instant message over a second meshnet connection. Various other aspects are contemplated.
    Type: Grant
    Filed: February 5, 2022
    Date of Patent: August 8, 2023
    Assignee: UAB 360 IT
    Inventors: Vykintas Maknickas, Emanuelis Norbutas
  • Patent number: 11711205
    Abstract: Systems and methods for provisioning secure terminals for secure transactions are disclosed herein. A disclosed method includes generating a key using a key generator element on a secure terminal and sending a key validation request for the key from the secure terminal to a provisioning device. The method also includes parsing the key validation request and generating a key validation for the key and a trusted time stamp on the provisioning device. The method also includes sending, from the provisioning device, the key validation and the trusted time stamp to the secure terminal. The method also includes setting a clock on the secure terminal using the trusted time stamp and storing the key validation at the secure terminal.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: July 25, 2023
    Assignee: CLOVER NETWORK, LLC.
    Inventors: Brian Jeremiah Murray, Jacob Whitaker Abrams, Arvin Carl Robert Haywood
  • Patent number: 11695567
    Abstract: Computer-implemented methods for locking a blockchain transaction based on undetermined data are described. The invention is implemented using a blockchain network. This may, for example, be the Bitcoin blockchain. A locking node may include a locking script in a blockchain transaction Node to lock a digital asset. The locking script includes a public key for a determined data source and instructions to cause a validating node executing the locking script to verify the source of data provided in an unlocking script by: a) generating a modified public key based on the public key for the determined data source and based on data defined in the unlocking script; and b) evaluating a cryptographic signature in the unlocking script based on the modified public key. The blockchain transaction containing the locking script is sent by the locking node to the blockchain network. The lock may be removed using a cryptographic signature generated from a private key modified based on the data.
    Type: Grant
    Filed: April 6, 2018
    Date of Patent: July 4, 2023
    Assignee: nChain Licensing AG
    Inventor: Ying Chan
  • Patent number: 11695549
    Abstract: Systems and methods for attesting an enclave in a network. A method includes receiving, by a first device, proof information from an application provider entity that the enclave is secure, wherein the proof information includes a public part, Ga, of information used by the enclave to derive a Diffie-Hellman key in a key generation process with the application provider entity, processing, by the first device, the proof information to verify that the enclave is secure and ensuring that Ga is authentic and/or valid, deriving, by the first device, a new Diffie-Hellman key, based on Ga and x, wherein x is a private part of information used by the first device to derive the new Diffie-Hellman key, and sending, by the first device, a message including Ga and a public part, Gx, of the information used by the first device to derive the new Diffie-Hellman key to the enclave.
    Type: Grant
    Filed: September 9, 2021
    Date of Patent: July 4, 2023
    Assignee: NEC CORPORATION
    Inventors: Ugo Damiano, Felix Klaedtke
  • Patent number: 11695545
    Abstract: A multi-scheme random selection of blockchain endorsers may preserve anonymity of nodes that participate in a blockchain network, and may assign each node an endorsement load that is proportionate to the utilization of the blockchain network by that node. Selection of one or more nodes to endorse data before recordation to the blockchain may include randomly selecting an active endorser selection scheme from a set of available endorser selection schemes, and randomly selecting one or more nodes as endorsers for the data based on the active endorser selection scheme. Each scheme may be derived based on the tracked utilization over different time scales. Exit criteria may determine when to switch the active endorser selection scheme. The exit criteria may be based on a number of times each node is selected as an endorser under the active endorser selection scheme, and utilization of the blockchain network by each node.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: July 4, 2023
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Pradeep Menon, Rahul Koneru
  • Patent number: 11695733
    Abstract: Systems and methods for automatic VPN establishment are provided.
    Type: Grant
    Filed: March 12, 2021
    Date of Patent: July 4, 2023
    Assignee: Fortinet, Inc.
    Inventor: Eric C. Hastings
  • Patent number: 11671239
    Abstract: An encryption method and apparatus based on homomorphic encryption using an odd function property. The encryption method includes generating a ciphertext by encrypting data, and bootstrapping the ciphertext by performing a modular reduction based on an odd function property for a modulus corresponding to the ciphertext.
    Type: Grant
    Filed: March 4, 2021
    Date of Patent: June 6, 2023
    Assignees: SAMSUNG ELECTRONICS CO., LTD., SNU R&DB FOUNDATION, Industry-Academic Cooperation Foundation, Chosun University
    Inventors: Jung-Seon No, Joonwoo Lee, Young-Sik Kim, Youngwoo Lee, Eunsang Lee
  • Patent number: 11662978
    Abstract: A modular operation circuit includes a controller, a modular multiplier and a modular adder. The controller divides a first number into K segments. The modular multiplier performs modular multiplication operations and the modular adder performs modular addition operations to the K segments in (K?1) iterations for deriving a remainder of a division of the first number by a second number.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: May 30, 2023
    Assignee: PUFsecurity Corporation
    Inventor: Wen-Ching Lin
  • Patent number: 11662702
    Abstract: Provided is a method for producing a product by a machine tool, wherein the control information and/or production data of a machine tool, such as a milling machine, injection molding machine, welding robot, laser cutter or 3D printer, is protected or cryptographically encrypted such that unauthorized copying or modifying is prevented, including the steps: producing product by the machine tool taking into consideration control information which controls the production of the product; generating production data by the machine tool during production of the product, wherein the production data describes the production of the product; providing protection information to the machine tool, which indicates which of the production data is to be protected, and defines a protection method for the production data which is protected; and protecting that production data which, according to the protection information, is to be protected, by the protection method defined by the protection information.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: May 30, 2023
    Inventors: Omar Belhachemi, Rainer Falk, Christian Peter Feist, Kai Fischer, Daniela Friedrich, Steffen Fries, Markus Heintel
  • Patent number: 11663208
    Abstract: Described are methods, systems and computer readable media for providing a current row position query language construct and array processing query language constructs and associated processing.
    Type: Grant
    Filed: January 21, 2019
    Date of Patent: May 30, 2023
    Assignee: Deephaven Data Labs LLC
    Inventors: David R. Kent, IV, Ryan Caudy, Charles Wright, Mark Zeldis, Radu Teodorescu
  • Patent number: 11658799
    Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: May 23, 2023
    Assignee: Cryptography Research, Inc.
    Inventor: Michael Tunstall
  • Patent number: 11658819
    Abstract: The computer-implemented method for generating a public key and a secret key of the present disclosure comprises determining, by a processor, the secret key (s) by sampling from a distribution over {?1, 0, 1}nd; determining, by a processor, a first error vector (e) by sampling from (D?qn)d and a second error value (e?) by sampling from D?qn; choosing, by a processor, a randomly uniform matrix A which satisfies A·s=e (mod q); choosing, by a processor, a random column vector b which satisfies ? b , s ? = ? q 2 ? + e ? ? ( mod ? ? q ) ; and determining, by a processor, the public key (pk) by (A?b)?Rqd×(d+1).
    Type: Grant
    Filed: June 18, 2020
    Date of Patent: May 23, 2023
    Assignees: ULSAN NATIONAL INSTITUTE OF SCIENCE AND TECHNOLOGY, SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION
    Inventors: Joohee Lee, Junghee Cheon, Duhyeong Kim, Aaram Yun
  • Patent number: 11658959
    Abstract: Techniques are disclosed relating to authenticating a user with a mobile device. In some embodiments, a computing device stores a first signed attestation indicating an ability of the computing device to securely perform a user authentication. The computing device receives a request to store credential information of an identification document issued by an issuing authority to a user for establishing an identity of the user. In response to the request, the computing device sends, to the issuing authority, a request to store the credential information, the sent request including the first signed attestation to indicate an ability to perform a user authentication prior to permitting access to the credential information. In response to an approval of the sent request based on the first signed attestation, the computing device stores the credential information in a secure element of the computing device.
    Type: Grant
    Filed: September 25, 2020
    Date of Patent: May 23, 2023
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Ahmer A. Khan, Martijn T. Haring
  • Patent number: 11652633
    Abstract: An embodiment of an automatic key delivery system is described, An automatic key delivery system comprises the following operations. Herein, a first token is generated and provided to a first network device. Thereafter, a first key value pair, including the first token and a first key segment of a cryptographic key, is received by a first relay server and a second key value pair, including the first token and a second key segment of the cryptographic key, is received from a second relay server. In response, a second token to be provided to the first relay server and the second relay server. Thereafter, the first and second key segment are returned from the first and second relay servers based on usage of the second token as a lookup in order to recover the cryptographic key for decryption of an encrypted content from the first network device.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: May 16, 2023
    Assignee: CHOL, Inc.
    Inventors: Michael R. Feinberg, Richard J. Blech
  • Patent number: 11626977
    Abstract: An example operation includes one or more of receiving, via a first communication channel between a sending device and a recipient device, a first partial encryption key from the receiving device, receiving, via a second communication channel between the sending device and the recipient device, a second partial encryption key from the receiving device, wherein the second communication channel comprises a different communication medium than the first communication channel, generating a transport key based on the first partial encryption key and the second partial encryption key received via the first and second channels, and encrypting data based on the generated transport key and transmitting the encrypted data to the receiving device.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: April 11, 2023
    Assignee: TOYOTA MOTOR NORTH AMERICA, INC.
    Inventors: Edward Allen Cain, Jr., Ismail Thanickel, Jonathan Burnham, Satyajit P. Patne, Neal Shen, Stephen Paul McFarland, Jr.
  • Patent number: 11621854
    Abstract: User-generated messages encapsulating selections from each of a plurality of entities for a selection task having a selection option are received via one or more interfaces presented by a selection processing system. For each selection, a different share of a signing key is obtained that has an identity associated with the selection task. For each selection, a different partial signature is generated by signing the messages using the associated share of the signing key. The partial signatures are combined into a threshold signature if a number of entities for a selection option specified by the task exceeds a pre-defined threshold. Data characterizing the results of the selection task can then be provided.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: April 4, 2023
    Assignee: SAP SE
    Inventors: Xun Sun, Xiaoxiao Gu, Yukching Leung
  • Patent number: 11601291
    Abstract: A method of encoding and/or decoding data is described, having the steps of: generating a challenge code, the challenge code being based on a pattern associated with at least one challenge arrangement having duplicated signs, encrypting the challenge code using a one-way hashing function to obtain a temporary encryption key, generating encoded data by encoding the data using a two-way transcoding function using the obtained temporary encryption key, wherein data is decoded using the two-way transcoding function and a subsequently obtained user temporary encryption key when the subsequently obtained user temporary encryption key matches the previously obtained temporary encryption key used to encode the data.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: March 7, 2023
    Assignee: V-Auth Limited
    Inventor: Steven Jonathan Brittan
  • Patent number: 11593797
    Abstract: Techniques are disclosed relating to authentication using public key encryption. In one embodiment, a computing device includes a secure circuit, a processor, and memory. The secure circuit is configured to generate a public key pair usable to authenticate a user of the computing device. The memory has program instructions stored therein that are executable by the processor to cause the computing device to perform operations including authenticating the user with a server system by sending authentication information supplied by the user. The operations further include, in response to the server system verifying the authentication information, receiving a first token usable to register the public key pair with the server system and sending, to the server system, a request to register the public key pair for authenticating the user. In such an embodiment, the request includes the first token and identifies a public key of the public key pair.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: February 28, 2023
    Assignee: Apple Inc.
    Inventors: Libor Sykora, Delfin J. Rojas, Paul J. Sholtz, Erika Misaki, Shiva Krovi, Lawrence Aung, Julien Lerouge
  • Patent number: 11575627
    Abstract: A method including determining, by a first device in communication with a second device in a mesh network, an instant message to be transmitted to the second device; and encrypting, by the first device, the instant message based at least in part on utilizing a symmetric key negotiated between the first device and the second device; and selectively transmitting, by the first device to the second device, the instant message over a meshnet connection between the first user device and the second user device in the mesh network. Various other aspects are contemplated.
    Type: Grant
    Filed: February 5, 2022
    Date of Patent: February 7, 2023
    Assignee: UAB 360 IT
    Inventors: Vykintas Maknickas, Emanuelis Norbutas
  • Patent number: 11575502
    Abstract: A homomorphic encryption processing device includes the processing circuitry is configured to generate ciphertext operation level information based on field information. The field information represents a technology field to which homomorphic encryption processing is applied. The ciphertext operation level information represents a maximum number of multiplication operations between homomorphic ciphertexts without a bootstrapping process. The processing circuitry is further configured to select and output a homomorphic encryption parameter based on the ciphertext operation level information. The processing circuitry is further configured to perform one of a homomorphic encryption, a homomorphic decryption and a homomorphic operation, based on the homomorphic encryption parameter.
    Type: Grant
    Filed: December 8, 2020
    Date of Patent: February 7, 2023
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Wijik Lee, Youngsik Moon, Hongrak Son, Jaehun Jang
  • Patent number: 11573769
    Abstract: A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and doubling operations are executed using atomic patterns that involve the same sequence and number of operation types, so that the noise consumption and electromagnetic emanation profile of circuitry performing the operations is identical regardless of operation. A subtraction operation using such an atomic pattern is also disclosed.
    Type: Grant
    Filed: March 20, 2020
    Date of Patent: February 7, 2023
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Eric Thierry Peeters
  • Patent number: 11568424
    Abstract: Methods and systems for product authentication include the storage of product authenticity data in integrated circuit (IC) chips of verification objects for physical association with authentic products. The IC chips are operable to determine verification data using the stored product authenticity data, and may include private key encryption, private algorithm and/or count processing functionality for verification data determination. A verification server(s) is utilized to receive an inbound message(s) from an electronic device(s) that includes test data obtained by the electronic device(s) from an integrated circuit chip at a product of interest, and in response thereto, to send an outbound message to the electronic device(s) indicative of verification or non-verification of authenticity of the product of interest, based upon identification or non-identification of an association between the test data and product authenticity data.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: January 31, 2023
    Assignee: CPI CARD GROUP—COLORADO, INC.
    Inventors: Keith H. North, Barry Mosteller
  • Patent number: 11570162
    Abstract: A key server network device may install, on the key server network device, a new decryption key based on a timer-based key rollover setting and may provide, to peer network devices, messages identifying the new decryption key. The key server network device may utilize an original encryption key, to encrypt traffic, until all of the peer network devices provide acknowledgements of installation of the new decryption key. The key server network device may be configured to utilize the original encryption key based on the timer-based key rollover setting. The key server network device may generate an alarm. The alarm may include information indicating that the key server network device is waiting for the acknowledgements from one or more peer network devices and information identifying the one or more peer network devices.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: January 31, 2023
    Assignee: Juniper Networks, Inc.
    Inventors: Sumeet Mundra, Guruprasad P N
  • Patent number: 11562345
    Abstract: Methods of performing transactions with a payment card comprising an integrated circuit are disclosed comprising interacting with an integrated circuit on a received payment card and inferring an application corresponding to a card brand and card type of the payment card, or retrieving a map of the integrated circuit to read records on the integrated circuit based on the map, are disclosed. Corresponding devices, such as PIN pads, and computer products are also disclosed.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: January 24, 2023
    Assignee: STRIPE, INC.
    Inventors: Jonathan Wall, Ross Favero, Eric Nelson Glass
  • Patent number: 11558381
    Abstract: Provided is a process that affords out-of-band authentication based on a secure channel to a trusted execution environment on a client device. The authentication process includes one or more authentication steps in addition to verifying any credentials provided by a client device. A notification may be transmitted by a server to a device other than the client device attempting to access the asset. That device may be a mobile device with a trusted execution environment storing user credential information, and the server may store representations of those credentials. The mobile device collects user input credentials and transmits representations for matching the previously stored representations and signed data for verification by the server that received data originated from the mobile device. The access attempt by the client is granted based in part on the result of authenticating the data received from the mobile device in a response to the notification.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: January 17, 2023
    Assignee: HYPR Corp.
    Inventors: George Avetisov, Bojan Simic, Roman Kadinsky