Block/data Stream Enciphering Patents (Class 380/37)
-
Patent number: 12242661Abstract: Systems and methods for protecting intellectual property of a circuit via obfuscation of logic through encryption. The methods comprise: analyzing a combinational circuit (CC) to identify first logic gates that perform first function(s) which is(are) implementable by LUT(s); dividing CC a first portion comprising the first logic gates and a second portion comprising remaining logic gates; protecting gate logic of the first portion by at least storing information implementing the first function(s) in an encrypted LUT format in a memory device of the circuit such that the first function(s) is(are) obfuscated when the circuit is in an at-rest state; and interfacing the remaining logic gates with the memory device such that the circuit is configured to generate an output in accordance with operations of the combinational circuit using the information stored in the encrypted LUT format.Type: GrantFiled: July 15, 2022Date of Patent: March 4, 2025Assignee: L3Harris Global Communications, Inc.Inventors: Michael T. Kurdziel, Steven M. Farris, Marcin Lukowiak, Stanislaw Radziszowski
-
Patent number: 12231709Abstract: A content controller system to render frames on demand comprises a rendering server system that includes a plurality of graphics processing units (GPUs). The GPUs in the rendering server system render a set of media content item segments using a media content identification and a main user identification. Rendering the set of media content item segments includes retrieving metadata from a metadata database associated with the media content identification, rendering the set of media content item segments using the metadata, generating a main user avatar based on the main user identification, and incorporating the main user avatar into the set of media content item segments. The rendering server system then uploads the set of media content item segments to a segment database; and updates segment states in a segment state database to indicate that the set of media content item segments are available. Other embodiments are disclosed herein.Type: GrantFiled: November 27, 2023Date of Patent: February 18, 2025Assignee: Snap Inc.Inventors: Bradley Kotsopoulos, Eli Semory, Rahul Bhupendra Sheth
-
Patent number: 12212670Abstract: Disclosed herein are an apparatus and method for calculating a multiplicative inverse. The apparatus for calculating a multiplicative inverse includes a data input unit for receiving input data, a multiplicative inverse calculation unit for dividing an input degree-8 finite field corresponding to the input data into two first degree-4 finite fields so as to perform Advanced Encryption Standard (AES) encryption on the input data, and for performing a multiplicative inverse calculation on the first degree-4 finite fields in consideration of a circuit depth value (T-Depth) and qubit consumption of quantum gates in a quantum circuit, and a data output unit for outputting result data obtained by performing the multiplicative inverse calculation.Type: GrantFiled: March 26, 2021Date of Patent: January 28, 2025Assignee: Electronics and Telecommunications Research InstituteInventors: Do-Young Chung, Doo-Ho Choi, Sok-Joon Lee, Seung-Kwang Lee
-
Patent number: 12206919Abstract: In some implementations, a system is capable of dynamically associating content streams to improve a user's viewing experience while accessing primary content. To accomplish this, the CMS uses content association data assigning secondary content items to the primary content. Secondary content items can be assigned to designated frames of the primary content so that the secondary content items are presented to user at specified time points during the playback of the primary content. Secondary content items can represent content that is related to the subject matter of the primary content, or content that a user may be interested in accessing while viewing the primary content.Type: GrantFiled: July 24, 2023Date of Patent: January 21, 2025Assignee: Perfect Sense, Inc.Inventors: David Gang, Bryan Morgan
-
Patent number: 12177346Abstract: An encryption device (30) generates a session key K and a ciphertext ctS in which the session key K is encrypted that are generated by an encryption algorithm using as input attribute information S. A re-encryption key generation device (40) generates a re-encryption key rk including a converted decryption key sk?˜ generated by setting a random number r in a decryption key sk? with which the ciphertext ctS can be decrypted, a session key K? and a ciphertext ctS? that are generated by the encryption algorithm using as input attribute information S?, and conversion information generated from the random number r. A re-encryption device (50) outputs a re-encrypted ciphertext rctS? including the ciphertext ctS? and a cipher element K˜ generated by deleting an element related to the random number r by the conversion information from decryption information K{circumflex over (?)} obtained by decrypting the ciphertext ctS with the converted decryption key sk?˜ and setting the session key K?.Type: GrantFiled: October 19, 2022Date of Patent: December 24, 2024Assignee: MITSUBISHI ELECTRIC CORPORATIONInventor: Yutaka Kawai
-
Patent number: 12174973Abstract: A master device issues memory burst transaction requests via an interconnection bus to fetch data from a slave device. A cipher engine is coupled to the interconnection bus and decrypts the fetched data to produce plaintext data for the master device. The cipher engine selectively operates according to a stream cipher operation mode, or a block cipher operation mode. The cipher engine is configured to stall a read data channel of the interconnection bus between the slave device and the master device in response to the cipher engine switching from the block cipher operation mode to the stream cipher operation mode. The read data channel is reactivated in response to a last beat of a read burst of the plaintext data produced by the cryptographic engine.Type: GrantFiled: May 5, 2022Date of Patent: December 24, 2024Assignee: STMICROELECTRONICS S.r.l.Inventor: Rosalino Critelli
-
Patent number: 12143468Abstract: Operational n-state digital circuits and n-state switching operations with n and integer greater than 2 execute Finite Lab-transformed (FLT) n-state switching functions to process n-state signals provided on at least 2 inputs to generate an n-state signal on an output. The FLT is an enhancement of a computer architecture. Cryptographic apparatus and methods apply circuits that are characterized by FLT-ed addition and/or multiplication over finite field GF(n) or by addition and/or multiplication modulo-n that are modified in accordance with reversible n-state inverters, and are no longer known operations. Cryptographic methods processed on FLT modified machine instructions include encryption/decryption, public key generation, and digital signature methods including Post-Quantum methods. They include modification of isogeny based, NTRU based and McEliece based cryptographic machines.Type: GrantFiled: August 16, 2021Date of Patent: November 12, 2024Assignee: LCIP JVInventor: Peter Lablans
-
Patent number: 12135647Abstract: An encoding device and a decoding device use linear and nonlinear codes for encoding and decoding system data for a storage device. The encoding device includes a linear encoder for encoding first data to generate encoded data and a nonlinear transformer for transforming the encoded data with second data to generate output data. The first data includes data on a physical address corresponding to a logical address. The second data includes the logical address and a timestamp value indicating a version of map data mapping between the logical address and the physical address.Type: GrantFiled: December 23, 2022Date of Patent: November 5, 2024Assignee: SK hynix Inc.Inventors: Sergei Musin, Teodor Vlasov
-
Patent number: 12106303Abstract: A general purpose blockchain (GPB) platform for creating, maintaining, and managing a distributed ledger. The GPB comprises multiple nodes, each configured to host a GPB for storing GPB arbitrary objects. Each GPB arbitrary object comprises an object data, wherein the object data being a structured or unstructured data; a basic data structure implemented in a data markup language that provides self-description of the object data with at least fields for storing the object's origin, the object's owner, the object's transfer history, object's modification/transformation history, the object type, and the object data; and a universal interface for providing an encapsulation or reference to the object data for accessing the object data and an transformation function to allow interoperability of object data of different formats. A plurality of GPB s collectively maintain consensus of changes of the stored GPB arbitrary objects with a plurality of other GPBs.Type: GrantFiled: May 22, 2023Date of Patent: October 1, 2024Inventors: David Bernard Thaw, Hyung Kyu Kang
-
Patent number: 12081648Abstract: A block cipher method and apparatus using round repetition for providing, from a plaintext message (10), a ciphertext message (50) and a global tag (52) is disclosed. The plaintext message is converted into a plurality of ordered plaintext blocks (11) which are successively processed during a round for computing:—a cryptogram (30) by encrypting input data (20) using a single cryptographic key, said cryptogram comprising a first segment (31) and a second segment (32)—a ciphertext block (51) by performing a first operation (41) using, as operands: said first segment (31) said current plaintext block (11) and said second segment (32). At each next round said input data is newly determined based on the current ciphertext block and an updated reproducible data. The ciphertext message is determined by concatenating the ciphertext blocks and the global tag by a second operation (42) using computed authentication local tags as operands.Type: GrantFiled: July 6, 2022Date of Patent: September 3, 2024Assignee: NAGRAVISION SARLInventor: Brecht Wyseur
-
Patent number: 12079489Abstract: Systems and methods herein secure computer memory from potential hacks. In one embodiment, a system includes a computer memory, and a memory protection module communicatively coupled to the computer memory. The memory protection module is operable to assign a counter value to a write Input/Output (I/O) request, to encrypt data of the write I/O request based on the counter value, and to write the encrypted data to a location of the computer memory. The counter value comprises a version number of the write I/O request and, for example, the location of the computer memory to where the data of the write I/O request is being written in the computer memory. The memory protection module is further operable to compute the version number based on memory access patterns of an application writing to the computer memory.Type: GrantFiled: March 8, 2021Date of Patent: September 3, 2024Assignee: CORNELL UNIVERSITYInventors: Gookwon Suh, Weizhe Hua
-
Patent number: 12081649Abstract: An apparatus of an aspect includes an encryption unit to receive unencrypted data. The encryption unit is to encrypt the unencrypted data to generate encrypted data. The apparatus also includes circuitry coupled with the encryption unit. The circuitry is to generate a first checksum for a copy of the unencrypted data, generate a second checksum for a copy of the encrypted data, and combine the first and second checksums to generate a first value.Type: GrantFiled: September 2, 2020Date of Patent: September 3, 2024Assignee: Intel CorporationInventors: Vinodh Gopal, Kirk Yap
-
Patent number: 12072994Abstract: A method and system for encrypting and reconstructing data files, including related metadata, is disclosed. The method involves separately encrypting data and metadata as chaining processes and integrating a plurality of encryption/encoding techniques together with strategic storage distribution techniques and parsing techniques which results in the integrated benefits of the collection of techniques. As disclosed, the content data is separated from its metadata, encryption keys may be embedded in the metadata, and in a content data encryption chaining process, the method chunks, encrypts, shards, and stores content data and separately shards and stores metadata, and stored in a flexible, distributed, and efficient manner, at least in part to assure improved resiliency In addition, the processes are preferably implemented locally, including at the site of the content data or a proxy server.Type: GrantFiled: September 3, 2021Date of Patent: August 27, 2024Assignee: MYOTA, INC.Inventor: Jaeyoon Chung
-
Patent number: 12061705Abstract: A non-transitory storage medium stores instructions readable and executable by a first computer (14) to perform an image processing method (100, 200, 400). The method includes: encrypting image data portions to generate encrypted image data portions; transmitting the encrypted image data portions from the first computer to a second server (16) different from the first computer; decrypting encrypted processed image data portions received at the first computer from the second server to produce processed image data portions and generating a processed image from the processed image data portions; and controlling a display device (24) to display the processed image or storing the processed image in a database (30).Type: GrantFiled: June 11, 2019Date of Patent: August 13, 2024Assignee: Koninklijke Philips N.V.Inventor: Thomas Erik Amthor
-
Patent number: 12063304Abstract: Non-transitory computer readable storage mediums have instructions executed by processors to access a first random data element at a first computing device. A first vector and a second vector are generated at a second computing device. A communication channel is utilized to execute a secure multiparty computation protocol between the first computing device and the second computing device. The first computing device alternately identifies a polynomial relations satisfied state and a polynomial relations unsatisfied state. A first selected instruction set is executed at the first computing device in response to the polynomial relations satisfied state. A second selected instruction set is executed at the first computing device in response to the polynomial relations unsatisfied state.Type: GrantFiled: November 17, 2021Date of Patent: August 13, 2024Assignee: Stealth Software Technologies, Inc.Inventor: Samuel Dittmer
-
Patent number: 12061807Abstract: In some aspects, an apparatus for encoding data for delivery to or for decoding data retrieved from a storage medium comprises a memory device and at least one hardware processor. The memory device is configured to store at least one parameter associated with at least one cryptographic protocol, the at least one parameter comprising one or more of a first cryptographic scheme, a first cryptographic key operation, a first cryptographic key length, and first cipher directives. The hardware processor is configured to generate a first frame comprising a first field for one parameter selected from the first cryptographic scheme, the first cryptographic key operation, the first cryptographic key length, and the first cipher directives and excluding fields for non-selected parameters, wherein the first frame is associated with the data delivered to or retrieved from the storage medium.Type: GrantFiled: April 14, 2023Date of Patent: August 13, 2024Assignee: SEAPORT, INC.Inventors: William F. Van Duyne, William Spazante, Gwain Bayley
-
Patent number: 12061869Abstract: A text correction method and apparatus can take advantage of a greatly reduced number of error-ground truth pairs to train a deep learning model. To generate these error-ground truth pairs, different characters in a ground truth word are replaced with a symbol, not appearing in any ground truth words, to generate error words which are paired with that ground truth word to provide error-ground truth word pairs. This process may be repeated for all ground truth words for which training is to be performed. In embodiments, pairs of characters in a ground truth word may be replaced with a symbol to generate the error words which are paired with that ground truth word to provide error-ground truth word pairs. Again, this process may be repeated for all ground truth words for which training is to be performed.Type: GrantFiled: October 29, 2021Date of Patent: August 13, 2024Assignee: KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC.Inventor: Junchao Wei
-
Patent number: 12052343Abstract: Systems and methods are for content security may comprise transmitting a request for authorization to access secured content. A content key for the secured content may be received and stored to a restricted region of a memory. A device security module may have access to the restricted region and may decrypt, based on satisfaction of a use condition and using the content key, the secured content. An encryption key associated with a secure media system authorized to access the secured content may be received. The device security module may encrypt, using the encryption key, the secured content and route the secured content to the secure media system.Type: GrantFiled: May 31, 2023Date of Patent: July 30, 2024Assignee: COMCAST CABLE COMMUNICATIONS, LLCInventor: Kyong Park
-
Patent number: 12047490Abstract: Embodiments are directed to encrypting data of a database table. Embodiments receive the database table, the database table including a plurality of rows, each row including a unique primary key and at least one column of unencrypted data. Embodiments convert each unique primary key into a unique initialization vector (“IV”). For a current row, embodiments encrypt the unencrypted data using a corresponding unique IV for the row, the encrypting including length-preserving encryption. Within each column, embodiments replace the unencrypted data with the encrypted data.Type: GrantFiled: October 25, 2021Date of Patent: July 23, 2024Assignee: Oracle International CorporationInventors: Dharmalingam Ganesan, David M. Clifton
-
Patent number: 12047488Abstract: A method provides for receiving multiple different segment tags generated based on different segments of a data record, where each segment is encrypted during a separate encryption process. Upon receipt, each of the multiple different segment tags is adjusted by an end-of-segment operation that induces a segment-specific error rendering the segment tag invalid for authentication of the data record as a whole. The method provides for accumulating together the multiple different segment tags to form a combined multi-segment tag, computing a correction effective to reverse a cumulative effect of the segment-specific error for each of the multiple different segment tags on the combined multi-segment tag; and generating a complete authentication tag by adjusting the combined multi-segment tag based on the computed correction. The complete authentication tag is usable to authenticate aspects of the data record as a whole.Type: GrantFiled: April 23, 2021Date of Patent: July 23, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Yevgeny Yankilevich, Oren Ish-Am, Michael Milkov
-
Patent number: 12039537Abstract: A method for linking blockchain transactions to privately verified identities includes: storing account profiles, each profile including data related to a transaction account including an account identifier and account data; receiving a transaction message, the message including a first data element configured to store a personal account number, a second data element configured to store a merchant identifier, and a third data element configured to store a blockchain network identifier; identifying a first account profile that includes the personal account number; identifying a second account profile that includes the merchant identifier; receiving a transaction notification, the notification indicating a transaction processed using a blockchain network associated with the blockchain network identifier and including a transaction identifier and an address identifier associated with the first or second account profile; and storing a linkage between the transaction identifier and the address identifier, the persType: GrantFiled: March 2, 2021Date of Patent: July 16, 2024Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventor: Steven C. Davis
-
Patent number: 12021986Abstract: A neural network (NN) processing method is provided. An AI (artificial intelligence) compiler code of an AI compiler is transformed to a garbled circuit code by performing following steps. A circuit graph of a garbled circuit having logic gates corresponding to the garbled circuit code is sent to an electrical device by a server. Key codebooks for candidate gates corresponding to each logic gate are creating by the electrical device. Garbled truth tables for the candidate gates corresponding to each logic pate are generated and transmitted to the server by the electrical device through using OT (Oblivious Transfer) protocol. A target garbled truth table of each logic gate is generated by the server. Afterward, an NN model is encrypted according to the key codebooks by the electrical device and a compiled NN model of an encrypted NN model are generated by the server.Type: GrantFiled: December 27, 2021Date of Patent: June 25, 2024Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Ming-Chih Tung, Hsin-Lung Wu, Juin-Ming Lu, Bo-Xuan Zhu
-
Patent number: 12015832Abstract: The present invention provides a media player configurable to provide the user with a seamless way of conducting transactions from within a window of the media player itself. All intermediate steps relating to the required transaction are carried out by calling up relevant modules/applications from within the application libraries from within an e-commerce platform. In preferred embodiments, the media player is configured to retrieve an encoded media file from a server or other content delivery network (CDN). The media player is further configured to display predefined overlays to the user during playback of the media file in response to identifying cues encoded into the media file by the content owner. The content owner can upload the media files to a server or other CDN via a dashboard/user interface. The cues can be encoded with a plurality of fields to enable the desired functionality to be achieved.Type: GrantFiled: February 6, 2023Date of Patent: June 18, 2024Assignee: Glui Inc.Inventors: Glen Dormieux, Richard Mason
-
Patent number: 12003637Abstract: A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In some examples, the plaintext and cryptographic key are input into an effectively one-way function, such as a cryptographic hash function, the output of which is usable as an initialization vector. Cryptographic keys may be rotated probabilistically based at least in part on probabilities of output collisions of the effectively one-way function to ensure a low probability of two different plaintexts resulting in calculation of the same initialization vector for use with the same cryptographic key.Type: GrantFiled: July 17, 2023Date of Patent: June 4, 2024Assignee: Amazon Technologies, Inc.Inventor: Matthew John Campagna
-
Patent number: 12002311Abstract: A system includes a processor, a storage medium, a data file, blockchain application, a lock assembly, and a digital key. The data file is stored in the storage medium, and is applied by the blockchain application. The data file includes a plurality of linked blocks, each including a respective transaction data of a plurality of transaction data. Each one of the plurality of transaction data includes a respective event and a time stamp. The blockchain application is stored in the storage medium, executed by the processor, and is configured to output an authorization based on a current grant event of a transaction data of the plurality of transaction data. The digital key is adapted to operate the lock assembly, wherein at least one of the lock assembly and the digital key is configured to receive the authorization in order for the digital key to operate the lock assembly.Type: GrantFiled: December 5, 2019Date of Patent: June 4, 2024Assignee: CARRIER CORPORATIONInventors: Devu Manikantan Shila, Adriaan Larmuseau, Adam Kuenzi, Yuri Novozhenets
-
Patent number: 11979412Abstract: Techniques to facilitate verification of in-situ network telemetry data of data packet of data traffic of packet-switched networks are described herein. A technique described herein includes a network node obtaining a data packet of data traffic of a packet-switched network. The data packet includes an in-situ network telemetry block. The network node obtains telemetry data and cryptographic key. The cryptographic key confidentially identifies the network node. The node encrypts at least a portion of the telemetry data based on the cryptographic key to produce signed telemetry data and updates telemetry-data entry of the in-situ network telemetry block. The telemetry data and signed telemetry data is inserted into the telemetry-data entry. The node forwards the data packet with the updated telemetry-data entry to another network node of the packet-switched network.Type: GrantFiled: May 9, 2023Date of Patent: May 7, 2024Assignee: Cisco Technology, Inc.Inventors: Shwetha Subray Bhandari, Santhosh N, Rakesh Reddy Kandula, Saiprasad Reddy Muchala, Frank Brockners
-
Patent number: 11973754Abstract: An encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.Type: GrantFiled: July 25, 2023Date of Patent: April 30, 2024Assignee: Qwyit LLCInventor: R Paul McGough
-
Patent number: 11934434Abstract: Disambiguation of search keywords to expert systems is performed through the application of a semantic ranking function to determine a classification category with confidence for a given query. The semantic ranking function is executed through an application of a semantic distance distribution profile score through analysis of user problem statement (UPS) with nodes in the taxonomy in the same vector space to create a search that combines a user problem statement and a taxonomical node in the search engine index. The distribution profile score calculation is provenance influenced to derive geographic, cultural, and demographic provenance for a user problem statement.Type: GrantFiled: August 16, 2019Date of Patent: March 19, 2024Assignee: International Business Machines CorporationInventors: Craig M. Trim, Michael Bender, Mauro Marzorati, Martin G. Keen
-
Patent number: 11924327Abstract: Systems and methods of protecting data in a message for communication from a sender to a receiver, the sender and receiver sharing a secret including splitting the message into a number of ordered message blocks, the order being a proper order such that an aggregation of the blocks in the proper order constitutes the message; generating an encoded indication of a position of the block in the proper order of blocks, the encoding being reversible and based on at least a hash value for the block, a secret shared between the sender and the receiver, and a position of the block in the proper order; communicating the blocks and the encoded indications to the receiver, the blocks being communicated in an order different to the proper order so as to obfuscate the message, such that the blocks can be reassembled by the receiver in the proper order on the basis of the shared secret.Type: GrantFiled: December 18, 2019Date of Patent: March 5, 2024Assignee: British Telecommunications Public Limited CompanyInventors: Fadi El-Moussa, Fabio Giubilo
-
Patent number: 11902419Abstract: A data transmitter is disclosed. The data transmitter includes a digest generator configured in response to receiving a set of data from a data source to generate a digest from the set of data using a cryptographic primitive. The data transmitter further includes a packet generator configured to generate a series of one or more packets carrying the set of data for transmission, wherein each packet in the series includes a header, the set of data, a footer and the digest.Type: GrantFiled: February 10, 2021Date of Patent: February 13, 2024Assignee: Renesas Electronics America Inc.Inventors: Alberto Troia, Serge Di Matteo
-
Patent number: 11902412Abstract: Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.Type: GrantFiled: May 26, 2022Date of Patent: February 13, 2024Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Yann Yves Rene Loisel, Frank Lhermet
-
Patent number: 11902429Abstract: A computer-implemented method for providing a distributed data processing service for performing a secure multiparty computation of a function on at least first and second items of private input data using at least a first and a second computing engine communicatively coupled via a communication network.Type: GrantFiled: January 27, 2022Date of Patent: February 13, 2024Assignee: ROBERT BOSCH GMBHInventors: Hanna Modica, Sebastian Becker, Sven Trieflinger, Vadim Raskin, Volker Suschke
-
Patent number: 11888964Abstract: A scheduler is used to control a target data processing unit among a plurality of data processing units in order to receive a target data block that is to be encrypted. Each of the plurality of data processing units is able to independently complete an encryption operation associated with Advanced Encryption Standard (AES) for a data block. A ciphertext data block corresponding to the target data block is generated, including by performing the encryption operation associated with AES on the target data block using the target data processing unit.Type: GrantFiled: December 14, 2022Date of Patent: January 30, 2024Inventors: Xiaojun Ding, Zhikai Chen
-
Patent number: 11863670Abstract: Disclosed are memory encryption systems and methods that rotate encryption keys for robust resistance against side-channel-analysis (SCA)-based attacks on communication paths between an encryption engine within a trust boundary and an external memory component. A key data structure has a plurality of keys that are used to encrypt a plurality of memory blocks in the external memory. The memory blocks encrypted with the oldest key of the key data structure are identified. Encrypted data is read from the identified memory blocks. The encrypted data is decrypted from the identified memory blocks. The data is then re-encrypted using the selected key that is newer than the oldest key, and re-written to the identified memory blocks.Type: GrantFiled: April 4, 2020Date of Patent: January 2, 2024Assignee: Cryptography Research, Inc.Inventors: Mark Evan Marson, Michael Hutter, Bart Stevens
-
Patent number: 11843584Abstract: Computer implemented systems and methods are provided for securing data. In some embodiments, a system for securing data may comprise one or more processors configured to receive a request for data over a network. The one or more processors may be configured to identify one or more confidential portions of data within the requested data. The one or more processors may be further configured to transmit the confidential portions of data to a hardware device configured to secure the confidential portions of data, and receive the secured data from the hardware device.Type: GrantFiled: October 18, 2021Date of Patent: December 12, 2023Assignee: Capital One Services, LLCInventors: Attaullah Baig, Vishal Parikh
-
Patent number: 11838411Abstract: Technologies for secure data transfer of MMIO data between a processor and an accelerator. A MIMO security engine includes a first permutation cipher pipeline to defuse a count and a key into a permutation state; a first exclusive-OR (XOR) to generate ciphertext data from 64-bits of the new permutation state; and plaintext data; a concatenator to concatenate the plaintext data and additional authenticated data (AAD) to produce a concatenation result; a second XOR to generate an XOR result from the concatenation result and the latest permutation state; and a second permutation pipeline to generate an authentication tag of the XOR result and the key.Type: GrantFiled: December 20, 2022Date of Patent: December 5, 2023Assignee: INTEL CORPORATIONInventors: Santosh Ghosh, Luis Kida, Reshma Lal
-
Patent number: 11831937Abstract: A content controller system to render frames on demand comprises a rendering server system that includes a plurality of graphics processing units (GPUs). The GPUs in the rendering server system render a set of media content item segments using a media content identification and a main user identification. Rendering the set of media content item segments includes retrieving metadata from a metadata database associated with the media content identification, rendering the set of media content item segments using the metadata, generating a main user avatar based on the main user identification, and incorporating the main user avatar into the set of media content item segments. The rendering server system then uploads the set of media content item segments to a segment database; and updates segment states in a segment state database to indicate that the set of media content item segments are available. Other embodiments are disclosed herein.Type: GrantFiled: March 3, 2022Date of Patent: November 28, 2023Assignee: Snap Inc.Inventors: Bradley Kotsopoulos, Eli Semory, Rahul Bhupendra Sheth
-
Patent number: 11822903Abstract: Aspects of the disclosure relate to instinctive cipher compilation and implementation in a continuous integration and delivery environment. In some embodiments, a computing platform may receive, via the communication interface, a requirements document for an application. The computing platform may extract context data from the requirements document. The computing platform may scan a repository of code to identify code to be modified based on the context data. The computing platform may identify modifications to the code based on the context data and generate updated code based on the identified modifications. The computing platform may deploy and test the updated code in a test environment. The computing platform may determine a variance between the updated code and the requirements document and generate a variance report. In some embodiments, the computing platform may compare the variance to a predetermined threshold, and accept or redeploy the updated code based on the comparison.Type: GrantFiled: April 5, 2022Date of Patent: November 21, 2023Assignee: Bank of America CorporationInventor: Saurabh Gupta
-
Patent number: 11811938Abstract: A computing device includes a processor and a machine-readable storage storing instructions. The instructions are executable by the processor to: receive a bit vector representing input data to be tokenized; divide the bit vector into two vector portions; and perform a plurality of rounds of a Feistel network on the two vector portions, each round including converting one vector portion using a table-based hash function that combines multiple tokens retrieved from at least one token table.Type: GrantFiled: December 20, 2019Date of Patent: November 7, 2023Assignee: Micro Focus LLCInventor: Thomas Wu
-
Patent number: 11809493Abstract: A non-tokenized string is received. For example, a non-tokenized string could be a credit card number. The non-tokenized string is partitioned into a plurality of non-tokenized substrings. For example, if the credit card number is 16 digits long, it may be partitioned into substrings that are three, six, and seven digits in length. The non-tokenized substrings are used as an index into a plurality of lookup tables. As a result of the indexing, a plurality of tokenized substrings are retrieved. The plurality of tokenized substrings are combined into a tokenized string. The tokenized string is used as a token that represents the credit card number without disclosing the actual credit card number. The reverse of the above process can also occur.Type: GrantFiled: January 19, 2021Date of Patent: November 7, 2023Assignee: Micro Focus LLCInventors: Luther Martin, Timothy Roake
-
Patent number: 11805122Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for authenticating a user using biometric data without distributing unencrypted biometric data or decrypting biometric data during authentication, including selecting, based on a first set of data points representing a biometric characteristic of a user, an encryption parameter of an encryption function, generating first encrypted challenge data by encrypting, by applying the encryption parameter to the encryption function, challenge data to create encrypted authentication data, receiving, from a network based authentication device, during an authentication process, second encrypted challenge data for authenticating the user, and determining whether to authenticate the user using a comparison of the first encrypted challenge data to the second encrypted challenge data.Type: GrantFiled: June 10, 2020Date of Patent: October 31, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Edward C. Giaimo, III
-
Patent number: 11791978Abstract: Disclosed herein is a method of accessing a cache, the method comprising: mapping respective physical line addresses (PLAs) of a plurality of PLAs to respective cache locations of a plurality of cache locations in a cache, each PLA of the plurality of PLAs having an associated memory line; encrypting, with a block cipher using a first key, a first PLA of the plurality of PLAs to provide a first encrypted line address (ELA), the first ELA having an associated first encrypted cache location; upon receiving a request to access a first memory line associated with the first PLA, encrypting, using the first key, the first PLA into the first ELA to determine the associated first encrypted cache location; and accessing the first encrypted cache location. Also disclosed herein are systems for implementing the same.Type: GrantFiled: August 29, 2019Date of Patent: October 17, 2023Assignee: Georgia Tech Research CorporationInventor: Moinuddin Qureshi
-
Patent number: 11764945Abstract: A data processing apparatus includes a processing circuit configured to segment an original bit sequence into a plurality of input blocks each having a first block length, create a random bit sequence, encrypt respective ones of the plurality of input blocks with a block cipher scheme using a key (having a key length larger than the first block length) based on the random bit sequence to derive intermediate blocks, concatenate every predetermined number of intermediate blocks to form one or more output blocks, compute an invertible transformation function on the one or more output blocks and the random bit sequence to derive a further output block, and output an encrypted bit sequence including those output blocks.Type: GrantFiled: May 24, 2019Date of Patent: September 19, 2023Assignee: ZENMUTECH, INCInventors: Yusuke Ishida, Atsushi Kunii, Jun-ichi Oketani, Shimpei Kunii
-
Patent number: 11757629Abstract: Embodiments provide methods, and computing devices for auto-submission of user authentication credential. A method includes initiating, by a first computing device of a user, a detection of a pre-paired second computing device of the user based at least on an application requiring a credential to be entered. The application is running on the first computing device and the credential is pre-stored in an encrypted form on a companion application running on the second computing device. The method includes generating a communication channel with the second computing device based at least on generating a mutual authentication key by the first and second computing devices. The method includes sending a request to receive the credential to the second computing device. The method includes receiving the credential in the encrypted form. The method includes decrypting the credential. The method includes facilitating the entering of the credential on the application without user intervention.Type: GrantFiled: July 22, 2020Date of Patent: September 12, 2023Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventors: Naveen Kumar Gupta, Bhargav Jagdishchandra Modi, Namod Chandrashekar Kunder
-
Patent number: 11727127Abstract: Methods, systems, and devices for secure storage device verification with multiple computing devices are described. A secure storage device may receive from a computing device a first command and a first public key of a first key pair associated with the computing device. The secure storage device may select a second key pair from a plurality of key pairs to associate with the computing device based on receiving the first command and the first public key. The secure storage device may also encrypt a second public key of the second key pair using the first public received from the computing device based on selecting the second key pair. The secure storage device may transmit to the computing device a message that includes the encrypted second public key.Type: GrantFiled: October 16, 2020Date of Patent: August 15, 2023Assignee: Micron Technology, Inc.Inventor: Zoltan Szubbocsev
-
Patent number: 11728968Abstract: An authenticated encryption device 10 includes: an encryption means 11 which encrypts a plaintext block by inputting, to an encryption function whereby data of a predetermined bit number is output when data of the predetermined bit number is input, a plaintext block of the predetermined bit number constituting the plaintext to be encrypted with a mask value, which is uniquely determined from an adjustment value including an initial vector not overlapping a past value and a secret key, being added; and a computation means 12 which computes, as a checksum, the exclusive OR of corresponding bits of a first bit string, a bit number of which is less than the predetermined bit number, of each of a plurality of plaintext blocks constituting the plaintext.Type: GrantFiled: November 7, 2018Date of Patent: August 15, 2023Assignee: NRC CORPORATIONInventors: Akiko Inoue, Kazuhiko Minematsu
-
Patent number: 11726829Abstract: An approach for an adaptive, performance-oriented, and compression-assisted encryption scheme implemented on a host computer to adaptively improve utilization of CPU resources is provided. The method comprises queueing a new data packet and determining a size of the new data packet. Based on historical data, a plurality of already encrypted data packets is determined. Based on information stored for the plurality of already encrypted data packets, an average ratio of compression for the plurality of already encrypted data packets is determined. Based on the average ratio of compression, a throughput of compression value and a throughput of encryption value, a prediction whether compressing the new data packet will reduce a CPU load is derived. If it is determined that compressing the new data packet will improve utilization of the CPU resources, then a compressed new data packet is generated by compressing the new data packet.Type: GrantFiled: September 3, 2020Date of Patent: August 15, 2023Assignee: Nicira, Inc.Inventors: Dexiang Wang, Calvin Qian, Dan Wing, Gang Xu, Bin Zan
-
Patent number: 11711556Abstract: In some implementations, a system is capable of dynamically associating content streams to improve a user's viewing experience while accessing primary content. To accomplish this, the CMS uses content association data assigning secondary content items to the primary content. Secondary content items can be assigned to designated frames of the primary content so that the secondary content items are presented to user at specified time points during the playback of the primary content. Secondary content items can represent content that is related to the subject matter of the primary content, or content that a user may be interested in accessing while viewing the primary content.Type: GrantFiled: August 30, 2021Date of Patent: July 25, 2023Assignee: Perfect Sense, Inc.Inventors: David Gang, Bryan Morgan
-
Patent number: 11711365Abstract: An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.Type: GrantFiled: April 23, 2021Date of Patent: July 25, 2023Assignee: Qwyit LLCInventor: R Paul McGough
-
Patent number: 11711364Abstract: An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.Type: GrantFiled: April 23, 2021Date of Patent: July 25, 2023Assignee: Qwyit LLCInventor: R Paul McGough