Public Key Patents (Class 380/30)
  • Patent number: 9881182
    Abstract: A method may be executed by a secure processor having secure cryptography hardware implemented thereon. The method may be executed in a security kernel of a secure on-chip non-volatile (NV) memory coupled to the secure processor. The method may include: storing a rewritable state and a device private key based at least in part on a programmed secret seed and the rewritable state, the device private key being part of a cryptographic key pair comprising a public key associated with the device private key, and the rewritable state being a state of a secure application encrypted with the public key; providing one or more instructions to gather the device private key and from the private key datastore; and using the device private key to generate a device certificate, the device certificate providing the device with access to the secure application.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: January 30, 2018
    Assignee: Acer Cloud Technology, Inc.
    Inventors: Pramila Srinivasan, John Princen
  • Patent number: 9876820
    Abstract: An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. To provide the forward secrecy for this particular leg, the edge server selects an ephemeral value, and applies a cryptographic hash the value to compute a server random value, which is then transmitted back to the requesting client. That server random value is later re-generated at the cryptographic server to enable the cryptographic server to compute a master secret. The forward secrecy is enabled by ensuring that the ephemeral value does not travel on the wire.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: January 23, 2018
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Philip A. Lisiecki
  • Patent number: 9876769
    Abstract: The present invention provides a system and method for providing certified voice and/or multimedia mail messages in a broadband signed communication system which uses packetized digital information. Cryptography is used to authenticate a message that has been compiled from streaming voice or multimedia packets. A certificate of the originator's identity and electronic signature authenticates the message. A broadband communication system user may be provisioned for certified voice and/or multimedia mail by registering with a certified mail service provider and thereby receiving certification. The called system user's CPE electronically signs the bits in received communication packets and returns the message with an electronic signature of the called system user to the calling party, along with the system user's certificate obtained from the service provider/certifying authority during registration. The electronic signature is a cryptographic key of the called party.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: January 23, 2018
    Assignee: AT&T INTELLECTUAL PROPERTY II, L.P.
    Inventor: Aviel D. Rubin
  • Patent number: 9871663
    Abstract: Various embodiments are directed to a system for accessing a self-encrypting drive (SED) based on a blind challenge authentication response mechanism (BCRAM). An SED may be authenticated within a system, for example, upon resuming from a sleep state, based on a challenge generated within the SED, signed using a private key by a trusted execution environment (TEE) and authenticated using a corresponding public key within the SED.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: January 16, 2018
    Assignee: INTEL CORPORATION
    Inventors: Adrian R. Pearson, Jason R. Cox, James Chu
  • Patent number: 9870166
    Abstract: Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the protected cache using a UUID that is cryptographically derived from the image data. Any process with access to the UUID may retrieve the image data. Because the UUID is uniquely derived from the actual data of the generated file, a process will only be able to retrieve image data that could have been generated by a process associated with the user account, or from a process associated with a user account that could have generated the image data, or that otherwise has a record of the image data.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: January 16, 2018
    Assignee: Apple Inc.
    Inventors: David A. Carter, Keith Stattenfield, David P. Remahl, Jr., Christopher S. Linn
  • Patent number: 9866373
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: July 7, 2017
    Date of Patent: January 9, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John B. Geagan, III, Dulce B. Ponceleon
  • Patent number: 9854025
    Abstract: A method for soliciting and creating collaborative content items is disclosed. The method includes identifying contacts of a target user, the contacts each having an affinity score with the target user that exceeds an affinity score threshold value, soliciting, from each of the identified contacts, a content item curated by the identified contact to convey a personalized message to the target user corresponding to an event unique to the target user, receiving the content items from at least a subset of the identified contacts, and providing a collaborative content product comprising the received content items to the target user.
    Type: Grant
    Filed: May 16, 2014
    Date of Patent: December 26, 2017
    Assignee: Google Inc.
    Inventor: David Kosslyn
  • Patent number: 9853949
    Abstract: Methods and apparatus for a secure time service are disclosed. A time server including a time source, a cryptographic key and a cryptographic engine is instantiated within a provider network. A time service endpoint receives a timestamp request from a client. The endpoint transmits a representation of the request to the time server, and receives, from the time server, an encryption of at least a timestamp generated using the time source. A response comprising the encryption of at least the timestamp is transmitted to the requesting client.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: December 26, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Thomas Charles Stickle, Eric Jason Brandwine
  • Patent number: 9847880
    Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: December 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
  • Patent number: 9842018
    Abstract: In a method for verifying the integrity of first to Nth binaries (N is a natural number greater than or equal to 2), the method may comprise: loading the first to Nth binaries into a main memory in order to execute the binaries; verifying a self hash to verify, by the Kth binary (K=1, . . . , N?1) which has been loaded into the main memory, the integrity thereof by using a hash; and verifying a link hash by setting any one of the first to Kth binaries as a verification binary and setting a (K+1)th binary to be loaded into the main memory as a binary to be verified so that the verification binary verifies the integrity of the binary to be verified by using a hash.
    Type: Grant
    Filed: September 3, 2014
    Date of Patent: December 12, 2017
    Assignee: INKA ENTWORKS, INC.
    Inventors: Jae Min Nam, Jung Geun Park, Jun Ho Hong, Jun Seok Oh, Jung Soo Kim
  • Patent number: 9843587
    Abstract: A computer system manages role-based digital rights by creating a chain of trust that originates with a user who purports to act as a registration authority whose status can be verified to ascertain that the user is licensed to act as the registration authority. The registration authority creates an organization account and a first member whose status is verified by consulting a status verification server. Derivative authorities granted to members are predicated on the first member and ultimately the registration authority to ensure that there is a chain of trust linking each member of an organization back to the registration authority.
    Type: Grant
    Filed: July 17, 2013
    Date of Patent: December 12, 2017
    Assignee: Clawd Technologies Inc.
    Inventors: Sebastien Meunier, Pierre Belisle, Guy Dartigues
  • Patent number: 9838363
    Abstract: A method comprising generating an updated security key upon expiration of a key exchange timer, transferring the updated security key to a Coaxial Network Unit (CNU), retaining an original key, wherein the updated security key comprises a different key identification number than the original key, accepting and decrypting upstream traffic that employs either the original key or the updated key, after transferring the updated security key to the CNU, creating a key switchover timer, before the key switchover timer expires, verify that upstream traffic transferred from the CNU on a logical link uses the updated security key, and when upstream traffic is encrypted using the updated security key, begin using the updated security key to encrypt downstream traffic and clear the key switchover timer.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: December 5, 2017
    Assignee: Futurewei Technologies, Inc.
    Inventors: Yanbin Sun, Guangsheng Wu, Li Zhang, Jim Chen
  • Patent number: 9838203
    Abstract: Embodiments are directed to a computer-implemented method, computer system, and computer program product for creating a public key token. A public key and private key are generated, using a master key. A set of permissions is received for the public key and private key that note the allowable uses for the public key and private key. Thereafter, the set of permissions, encrypted public key, and other associated information is placed in a public key token.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: December 5, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard V. Kisley, Michael J. Miele
  • Patent number: 9832027
    Abstract: Embodiments of the invention prevent unauthorized access to electronic systems by providing an enclosure with improved intrusion detection around sensitive areas of a secured electronic system. Certain embodiments eliminate the need for constant battery power and yet provide uninterrupted high-security supervision at the device perimeter such that even following a power down event it is possible to determine whether a device has been tampered with, so that appropriate action can be taken. This is especially useful in applications in which batteries are not acceptable.
    Type: Grant
    Filed: September 9, 2015
    Date of Patent: November 28, 2017
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Yann Yves Rene Loisel, Frank Lhermet, Alain-Christophe Rollet
  • Patent number: 9832018
    Abstract: A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key 103 based on a private key and a unique identifier associated with the electronic device 200.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: November 28, 2017
    Assignee: NXP B.V.
    Inventors: Heike Neumann, Paul Hubmer
  • Patent number: 9817977
    Abstract: One embodiment of the present invention provides a system for stable selection of collaborating partners for exchanging security data. During operation, the system receives vectors of collaboration values from a plurality of entities. A collaboration value is a measure of an expected benefit of collaborating with a respective entity. The system sorts each of the vectors by the collaboration values of the respective vector. The system then determines matching entities given a number of partners wanted by each organization in N. The system may add matching entities to lists of collaborating partners given the number of partners wanted by each organization in N. Subsequently, the system sends the lists of collaborating partners to facilitate exchanging security data with partners in the list of collaborating partners.
    Type: Grant
    Filed: April 4, 2014
    Date of Patent: November 14, 2017
    Assignee: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Julien F. Freudiger, Emiliano De Cristofaro, Alejandro E. Brito, Marshall W. Bern, Ersin Uzun
  • Patent number: 9811547
    Abstract: The invention relates to a client computer for updating a database stored on a server via a network, the server being coupled to the client computer via the network, wherein the database comprises first data items and suffix items, wherein each suffix item describes a suffix of at least one first data item of the first data items, wherein for each suffix item a first referential connection exists in the database assigning said suffix item to the at least one first data item comprising the suffix of said suffix item, wherein each suffix item is encrypted with a suffix cryptographic key in the database, wherein each first data item is encrypted with a first cryptographic key in the database, wherein the client computer has installed thereon an application program, the application program being operational to: receiving a search request, the search request specifying a postfix search on a search criterion, determining the suffix item matching the search criterion, providing to the database a request for provi
    Type: Grant
    Filed: June 1, 2016
    Date of Patent: November 7, 2017
    Assignee: COMPUGROUP MEDICAL SE
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Patent number: 9811823
    Abstract: A method and system for payments for mobile phone payments with a disabling feature is disclosed. The method includes activating a mobile phone containing contactless payment systems, and having a timeout feature disable the contactless payment systems after a set period of time.
    Type: Grant
    Filed: March 16, 2017
    Date of Patent: November 7, 2017
    Assignee: Visa U.S.A. Inc.
    Inventors: Gavin Shenker, David Wentker, Douglas Deibert, Erick Wong
  • Patent number: 9813400
    Abstract: Systems and computer-implemented methods for authorizing respective access by each of a plurality of Internet users to a respective one or more Internet services provided by each of a plurality of Internet service providers. A system includes a processor, and non-transient computer readable storage media, at a single identity provider.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: November 7, 2017
    Assignee: Probaris Technologies, Inc.
    Inventors: Brian G. Ross, Benjamin P. Hollin, Charles J. Durkin, Harry D. Anuszewski, Joseph A. Fischetti
  • Patent number: 9800568
    Abstract: Methods, non-transitory computer readable media, and network traffic management apparatuses that receive a request from a client device to access an application. The request comprises an original certificate. A determination is made when the certificate is valid. Data is extracted from one or more fields of the certificate, when the determining indicates that the user certificate is valid. A delegate certificate comprising the data and signed by a certificate authority trusted by a server device hosting the application is generated. The delegate certificate is sent to the server device. With this technology, network traffic management apparatuses can secure SSL connections using PFS-capable ciphers, while also inspecting payload data in network traffic exchanged between client and server devices in order to provide intelligent services in the network.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: October 24, 2017
    Assignee: F5 Networks, Inc.
    Inventors: Joel Moses, Kevin Stewart, William Church
  • Patent number: 9798710
    Abstract: Systems and methods for facilitating version control over an electronic document, the electronic document being subject to a distribution sequence among at least first and second reviewing parties over a network. The method includes receiving an instruction set from a source client. Based on the instruction set, at least one editable field populated with content is embedded in the electronic document. The progress of the electronic document through the distribution sequence is monitored over the network. The content of the editable field being edited by the first reviewing party is determined. In response to determining that the content has been edited by the first reviewing party, the edited electronic document is provided to the second reviewing party. The electronic document being electronically signed by the first and second reviewing parties is validated. The editable field is locked from further electronic editing.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: October 24, 2017
    Assignee: DocuSign, Inc.
    Inventors: Andrew David McCabe, Thomas H. Gonser, Jr.
  • Patent number: 9800416
    Abstract: Systems and methods are presented for distributed validation of a digitally signed electronic document. A computing device accesses both a representation of the electronic document and a digital signature for the electronic document that includes a digest generated by the digital signature's creator by applying a one-way function to the electronic document. The computing device applies the same one-way function to the accessed representation of the electronic document to generate a new digest, and includes both the digital signature and the new digest in a request sent to a separate validation server. The request does not include the electronic document. The validation server generates validation results that depend on comparing the digest from the digital signature with the new digest, and that do not depend on having the electronic document available to the validation server. The computing device receives the validation results from the separate validation server.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: October 24, 2017
    Assignee: ADOBE SYSTEMS INCORPORATED
    Inventors: Isak Tenenboym, Philip G. Levy, Marc T. Kaufman, John T. Landwehr
  • Patent number: 9800407
    Abstract: One feature pertains to a method for generating a prime number by repeatedly generating a random number seed S having k bits, generating a random number R having n bits based on the seed S, where k is less than n, and determining whether the random number R is prime. The steps are repeated until it is determined that the random number R generated is prime, upon which the random number seed S used to generate the random number R is stored in a memory circuit. Later, the stored random number seed S may be retrieved from the memory circuit, and the prime number is regenerated based on the random number seed S. In one example, the random number R generated is further based on a secret key kS that may be stored in a secure memory circuit.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: October 24, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Bijan Ansari, Lu Xiao
  • Patent number: 9779261
    Abstract: Techniques are described for managing access to a repository system storing information (e.g., metadata) about objects (e.g., an application, a process, or a service) in a computing environment. The repository system can store a data structure (an “entity”) that includes information about an object. An entity can have an association with one or more collections of entities (“assets”) that classify a collection of entities. Access to perform actions (e.g., create, read, update, or delete) an entity can be managed based on an entitlement, which grants a right to access information in the entity and/or at least one asset having an association with the entity. The repository system can manage access to one or more entities based on rights implied by an entitlement to access one or more assets associated with those entities.
    Type: Grant
    Filed: September 3, 2014
    Date of Patent: October 3, 2017
    Assignee: Oracle International Corporation
    Inventors: David Keyes, Muthukumar Palanisamy, David Edward DiFranco, Dennis M. Chin
  • Patent number: 9781078
    Abstract: A method for managing unlinkable database user identifiers includes distributing to a first database a first encrypted user identifier, a first database identifier, and a first database user identifier; distributing to a second database a second encrypted user identifier, a second database identifier, and a second database user identifier; receiving from the first database a third encryption and a fourth encryption, the third encryption being formed from the first encrypted user identifier, the second database identifier, and a message comprised in the fourth encryption; decrypting the third encryption thereby obtaining a decrypted value; deriving a blinded user identifier from the decrypted value; and sending the encrypted blinded user identifier and the fourth encrypted value to the second server thereby enabling the second server to compute the second database user identifier from the encrypted blinded database user identifier and the decrypted fourth encrypted value.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: October 3, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jan L. Camenisch, Anja Lehmann
  • Patent number: 9774576
    Abstract: The present invention concerns a mutual authentication method in a communication system. According to the method, a first communication device (1), such as an RFID reader, authenticates a second communication device (3), such as an RFID tag, by using an asymmetric authentication protocol based on a generated a session key. The tag authenticates the reader by using a symmetric communication protocol based on a generated other session key. At least a portion of the session key is used to generate the other session key.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: September 26, 2017
    Assignee: EM Microelectronic-Marin S.A.
    Inventors: James J. Springer, Stephanie Salgado
  • Patent number: 9772821
    Abstract: A cryptographic data processing method, implemented in an electronic device including a processor, the method including steps of providing a point of an elliptic curve in a Galois field, and a whole number, and of calculating a scalar product of the point by the number, the coordinates of the point and the number having a size greater than the size of words that may be processed directly by the processor, the scalar multiplication of the point by the number including steps of: storing scalar multiples of the point multiplied-by the number 2 raised to a power belonging to a series of whole numbers, setting a resulting point for each non-zero bit of the first number, adding the resulting point and one of the stored multiple points, and providing at the output of the processor the resulting point as result of the scalar product.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: September 26, 2017
    Assignee: Inside Secure
    Inventors: Benoît Feix, Vincent Verneuil, Christophe Clavier
  • Patent number: 9769506
    Abstract: Techniques for generating an encrypted video bitstream include encrypting media data using a plurality of encryption keys and generating metadata associated with the encrypted media data. The metadata includes a first list based on the plurality of encryption keys and a second list based on initialization vector/feedback vector (IV/FV) information to facilitate independent decryption of at least one encrypted video frame included in the encrypted media data.
    Type: Grant
    Filed: March 15, 2012
    Date of Patent: September 19, 2017
    Assignee: ZTE (USA) Inc.
    Inventor: Gerard M. X. Fernando
  • Patent number: 9769163
    Abstract: A combination includes a user-portable computing device, and an identity selector adapted for interoperable use with the user device. The user computing device includes a security token service that issues security tokens in reference to a portfolio of user identities stored as information cards on the user device. The issuance of security tokens employs user attribute information that is stored onboard the user device. The identity selector exports the information cards from the user device and determines which user identity satisfies a security policy promulgated by a relying party as part of an authentication process within the context of an online interaction. The identity selector generates a token request based on one of the eligible user identities, and forwards the token request to the user device to invoke the token issuance operation. The identity selector presents the issued security token to the relying party to comply with the security policy.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: September 19, 2017
    Assignee: Open Invention Network LLC
    Inventor: Gail-Joon Ahn
  • Patent number: 9760697
    Abstract: Disclosed herein is a system for enabling secure data storage into a third party managed electronic vault. The electronic vault provides users with a secure location to store important documents, information, and data including but not limited to various forms of personal identifiable information (PII). The system features an interface that dynamically secures, encrypts, and protects data related to transmission, storage, and retrieval, as well as management components that regulate and authenticate access to the contents of the electronic safe deposit boxes (and subdivisions thereof) in the electronic vault.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: September 12, 2017
    Assignee: InteracVAULT Inc.
    Inventor: Laura Sibley Walker
  • Patent number: 9753725
    Abstract: A processor includes a hash register and a hash generating circuit. The hash generating circuit includes a novel programmable nonlinearizing function circuit as well as a modulo-2 multiplier, a first modulo-2 summer, a modulor-2 divider, and a second modulo-2 summer. The nonlinearizing function circuit receives a hash value from the hash register and performs a programmable nonlinearizing function, thereby generating a modified version of the hash value. In one example, the nonlinearizing function circuit includes a plurality of separately enableable S-box circuits. The multiplier multiplies the input data by a programmable multiplier value, thereby generating a product value. The first summer sums a first portion of the product value with the modified hash value. The divider divides the resulting sum by a fixed divisor value, thereby generating a remainder value. The second summer sums the remainder value and the second portion of the input data, thereby generating a hash result.
    Type: Grant
    Filed: July 31, 2014
    Date of Patent: September 5, 2017
    Assignee: Netronome Systems, Inc.
    Inventor: Gavin J. Stark
  • Patent number: 9747469
    Abstract: A method for locking out a remote terminal unit includes: receiving a lockout request, wherein the lockout request includes at least a public key associated with a user, a user identifier, and a terminal identifier; identifying a user profile associated with the user based on the user identifier included in the received lockout request; verifying the public key included in the received lockout request and permission for the user to lockout a remote terminal unit associated with the terminal identifier included in the received lockout request based on data included in the identified user profile; generating a lockout permit, wherein the lockout permit includes at least the public key included in the received lockout request; and transmitting at least a lockout request and the generated lockout permit, wherein the lockout request includes an instruction to place a lockout on the remote terminal unit.
    Type: Grant
    Filed: July 1, 2014
    Date of Patent: August 29, 2017
    Assignee: SILVER SPRING NETWORKS, INC.
    Inventors: Aditi Hilbert, Michael St. Johns
  • Patent number: 9747220
    Abstract: A secure demand paging system includes a secure internal memory having a table relating physical addresses to virtual addresses, a non-volatile memory, a decryption module and a hash module between the secure memory and the non-volatile memory to allow for decryption and integrity verification of data stored in the non-volatile memory during a transfer to said secure memory and means for connecting the secure memory to a volatile page swap memory such that the non-volatile memory is bypassable during a page swap.
    Type: Grant
    Filed: April 14, 2016
    Date of Patent: August 29, 2017
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Steven C. Goss, Gregory Remy Philippe Conti, Narendar M. Shankar, Mehdi-Laurent Akkar, Aymeric Vial
  • Patent number: 9747491
    Abstract: Handwriting verification methods and related computer systems, and handwriting-based user authentication methods and related computer systems are disclosed. A handwriting verification method comprises obtaining a handwriting test sample containing a plurality of available parameters, extracting geometric parameters, deriving geometric features comprising an x-position value and a y-position value for each of a plurality of feature points in the test sample, performing feature matching between geometric features of the test sample and a reference sample, determining a handwriting verification result based at least in part on the feature matching, and outputting the handwriting verification result. The geometric features may further comprise values derived from the geometric parameters, such as direction and curvature values. The handwriting verification result can be further based on a count of unlinked feature points.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: August 29, 2017
    Assignee: Wacom Co., Ltd.
    Inventors: Nicholas Mettyear, Yoshitaka Nakayama, Jin Kon Ryu
  • Patent number: 9747458
    Abstract: Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length shaving positions i=1, 2, . . . s each having a corresponding value vi associated therewith, wherein the value vi is given by vi=h (vi+1), for a given hash function or other one-way function h. An initial distribution of helper values may be stored for the one-way chain of length s, e.g., at positions given by i=2j for 0?j?log2 s. A given one of the output values vi at a current position in the one-way chain may be computed utilizing a first helper value previously stored for another position in the one-way chain between the current position and an endpoint of the chain. After computation of the given output value, the positions of the helper values are adjusted so as to facilitate computation of subsequent output values.
    Type: Grant
    Filed: November 1, 2016
    Date of Patent: August 29, 2017
    Assignee: Crypto Research, LLC
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 9742643
    Abstract: Methods, systems, and products describe a robust solution for the dictionary problem of data structures. A hash function based on tabulation is twisted to utilize an additional xoring operation and a shift. This twisted tabulation offers strong robustness guarantees over a set of queries in both linear probing and chaining.
    Type: Grant
    Filed: July 7, 2016
    Date of Patent: August 22, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Mikkel Thorup, Mihai Patrascu
  • Patent number: 9742566
    Abstract: Homomorphic evaluation of a function is performed on input ciphertext(s), which were encrypted using a public key of an encryption scheme that also includes multiple secret keys and multiple integer moduli. The homomorphic evaluation of the function includes performing operations(s) on the input ciphertexts. The function includes operation(s) including one or more of addition, multiplication, and automorphism. A key-switching transformation is performed on selected input ciphertext(s), and includes converting a first version of a selected ciphertext with respect to a first of the multiple secret keys and a first modulus to a second version of the selected ciphertext with respect to a second of the multiple secret keys and a second modulus, where the second modulus is an integer factor p times the first modulus, p>1. Each of the key switching transformations is performed prior to or after the operation(s) are evaluated. Results of the operation(s) are output.
    Type: Grant
    Filed: January 28, 2016
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: Craig B. Gentry, Shai Halevi, Nigel P. Smart
  • Patent number: 9740716
    Abstract: A system and method for dynamically selecting a garbage collection algorithm based on the contents of heap regions. In accordance with an embodiment, a software application can be instrumented so that the system can place software objects allocated by the application, or by different parts of the application, into different regions of the heap. When garbage collection is invoked, the system can scan the heap, examine object statistics to determine if particular objects are, e.g., short-lived, long-lived, or some other type of object, and then use this information to determine which garbage collection algorithm to use with particular heap regions. In accordance with an embodiment, the system can identify regions as containing particular object types, for example, movable or non-movable object types, or object liveness, and use different garbage collection algorithms accordingly. Different garbage collection algorithms can be used with different regions, based on their content at a particular time.
    Type: Grant
    Filed: August 21, 2013
    Date of Patent: August 22, 2017
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventor: Jesper Wilhelmsson
  • Patent number: 9742556
    Abstract: Searching for desired data within an encrypted set of data (using a fully homomorphic encryption) without decrypting the set of data. A lookup key is compared against a set of encrypted data, employing characteristics of the fully homomorphic encryption, to locate and return desired data correlated to the lookup key.
    Type: Grant
    Filed: August 25, 2015
    Date of Patent: August 22, 2017
    Assignee: International Business Machines Corporation
    Inventors: David F. Bacon, Graham A. Bent, Flavio A. Bergamaschi
  • Patent number: 9734324
    Abstract: A computer implemented method for managing a password is disclosed. The method can include generating a first hash value corresponding to a first password. The method can also include determining whether the first hash value corresponds with a second hash value included in the set of hash values. Further, the method can include suppressing storage of the first password in the set of passwords in response to determining that the first hash value corresponds with a second hash value included in the set of hash values.
    Type: Grant
    Filed: December 8, 2016
    Date of Patent: August 15, 2017
    Assignee: International Business Machines Corporation
    Inventors: Andreas Arning, Jens Engelke
  • Patent number: 9729333
    Abstract: The invention relates to a device for validating data using a root certificate, wherein a plurality of root certificates is stored in the device, each root certificate having a rank. The device is configured to receive revocation information indicating at least one revoked root certificate, to validate the revocation information using one of the root certificates stored in the device and to block the use of the revoked root certificate if the revocation information is successfully validated using a root certificate having a higher rank than the revoked root certificate. Moreover, the invention relates to a method for revoking a root certificate stored in a device.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: August 8, 2017
    Assignee: Vodafonic GmbH
    Inventors: Marnix Vlot, Christoph Schaaf
  • Patent number: 9727893
    Abstract: The invention consists of a set of methods and systems, which comprise a unified approach for an identification and/or searching for information and/or content in data bases and/or the Internet on the basis of direct or indirect characteristic features of the users of the information and the content which are being searched for and/or used as well as an automatic generation of electronic content conforming to the characteristics of its future users.
    Type: Grant
    Filed: August 2, 2012
    Date of Patent: August 8, 2017
    Inventor: Krasimir Popov
  • Patent number: 9721101
    Abstract: A processing device searches executing at least one of a boot loader or a kernel for the operating system searches for an extensible firmware interface (EFI) binary object. Responsive to finding a first EFI binary object, the processing device verifies that a first signature associated with the first EFI binary object is valid using a platform key. Responsive to verifying that the first signature for the first EFI binary object is valid, the processing device performs the following operations: identifying a first public key encapsulated in the first EFI binary object, wherein the first public key is associated with a non-EFI certificate authority; extracting the first public key from the first EFI binary object; and performing at least one of a) passing the first public key to a kernel of an operating system (OS) or b) exposing the first public key to a user space of the OS.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: August 1, 2017
    Assignee: Red Hat, Inc.
    Inventors: Peter M. Jones, Adam D. Jackson
  • Patent number: 9716584
    Abstract: Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as sample power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem.
    Type: Grant
    Filed: June 19, 2015
    Date of Patent: July 25, 2017
    Assignee: Maxim Integrated Products, Inc.
    Inventors: Jeremy Dubeuf, Frank Lhermet, Yann Yves Rene Loisel
  • Patent number: 9716590
    Abstract: In one exemplary embodiment of the invention, a method and computer program include: receiving first and second ciphertexts having first and second data encrypted per an encryption scheme, the encryption scheme has public/secret keys and encryption, decryption, operation and refresh functions, the encryption function encrypts data, the decryption decrypts ciphertext, the operation receives ciphertexts and performs operation(s) on them, the refresh operates to prevent growth of the magnitude of noise for a ciphertext while reducing the modulus of the ciphertext without using the secret key, utilizing a modulus switching technique that involves transforming a first ciphertext c modulo q into a second ciphertext c? modulo p while preserving correctness, the technique includes scaling by p/q and rounding, p<q; using the operation function(s), performing operation(s) on them to obtain a third ciphertext; and reducing a noise level of the third ciphertext using the refresh function.
    Type: Grant
    Filed: June 16, 2015
    Date of Patent: July 25, 2017
    Assignee: International Business Machines Corporation
    Inventor: Craig B. Gentry
  • Patent number: 9703981
    Abstract: Mobile device data encryption is disclosed. A file is divided into a plurality of data blocks. The data blocks are encrypted. An authentication value is generated for each encrypted data block. The encrypted data blocks are stored in a tree data structure including the encrypted data blocks and a header block. The header block includes a set of authentication values and an aggregate authentication value. Each authentication value in the set of authentication values is derived from one or more of the encrypted data blocks. The aggregate authentication value is generated based at least in part on the set of authentication values. In various embodiments, the tree data structure may include one or more levels of internal nodes including authentication blocks.
    Type: Grant
    Filed: November 4, 2014
    Date of Patent: July 11, 2017
    Assignee: MOBILE IRON, INC.
    Inventor: Eric M. Marion
  • Patent number: 9705859
    Abstract: Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust a cryptography service to perform some cryptographic operations and access some cryptographic resources while simultaneously not trusting the cryptography service to perform other operations and access other resources. Two or more clients may utilize a cryptography service to perform certain authentication and verification operations to establish a secure communication session, while simultaneously denying the cryptography service access to the secure communication session.
    Type: Grant
    Filed: December 11, 2015
    Date of Patent: July 11, 2017
    Assignee: Amazon Technologies, Inc.
    Inventor: Matthew John Campagna
  • Patent number: 9698984
    Abstract: In a decryption apparatus according to an embodiment, a holding device pre-holds a verification formula. A determination device performs a calculation based on the verification formula read from the holding device by substituting, into the verification formula, the part of the re-encrypted data received from a re-encryption apparatus and the public key of a re-encryption key generation apparatus and the private key of the decryption apparatus, to determine whether or not the verification formula holds true. An output device outputs verification success when a result of the determination indicates that the verification formula holds true.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: July 4, 2017
    Assignees: KABUSHIKI KAISHA TOSHIBA, TOSHIBA SOLUTIONS CORPORATION
    Inventors: Yoshihiro Fujii, Takuya Yoshida, Koji Okada
  • Patent number: 9679147
    Abstract: According to some embodiments, a list of files comprising each file in a data repository that is associated with the website is determined. A list of user roles comprising each user role in the data repository that is associated with the website is determined. Each file in the list of files based on each user role in the list of user roles is attempted to be accessed and a report indicating the success or failure of the attempt to access each file in the list of files based on each user role in the list of user roles is created.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: June 13, 2017
    Assignee: SAP SE
    Inventors: Keqin Li, Cedric Hebert, Holger Mack, Tom Schröer
  • Patent number: 9672347
    Abstract: Methods, systems, and computer-readable storage media for storing event data in an audit log file. Implementations include actions of receiving event data, determining a first signature based on the event data and an end marker, and appending the event data and the first signature to the audit log file, the first signature comprising at least a portion of a signature chain associated with the audit log file.
    Type: Grant
    Filed: December 11, 2014
    Date of Patent: June 6, 2017
    Assignee: SAP SE
    Inventors: Uwe Bauer, Juergen Kremp