Key Sequence Signal Combined With Data Signal Patents (Class 380/43)
  • Patent number: 10346619
    Abstract: A method for providing an update of code on a memory-constrained device includes a) determining a minimum necessary compressed code space (MNCCS) of the update of code, b) dividing the update of code into a plurality of chunks, c) applying an All-Or-Nothing Encryption scheme (AONE) on each chunk, d) providing integrity information of least one intermediate ciphertext block of each AONE encrypted chunk, e) verifying integrity of the one or more intermediate ciphertext blocks based on the provided integrity information, f) providing the encryption key of the AONE for decryption of the update of code if integrity was verified, and g) decrypting the intermediate ciphertext blocks using the provided encryption key and updating the code.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: July 9, 2019
    Assignee: NEC CORPORATION
    Inventors: Ghassan Karame, Wenting Li
  • Patent number: 10341085
    Abstract: An encryption module and method for performing an encryption/decryption process executes two cryptographic operations in parallel in multiple stages. The two cryptographic operations are executed such that different rounds of the two cryptographic operations are performed in parallel by the same instruction or the same finite state machine (FSM) state for hardware implementation.
    Type: Grant
    Filed: September 6, 2016
    Date of Patent: July 2, 2019
    Assignee: NXP B.V.
    Inventor: Sebastien Riou
  • Patent number: 10313223
    Abstract: A computer-implemented method, in a content delivery (CD) network, wherein said CD network delivers content on behalf of multiple content providers. The method includes, at a client, requesting one or more parts of a randomly generated test object; in response to said requesting, receiving one or more response objects; generating one or more portions of said randomly generated test object, and comparing the one or more response objects received to at least some of the one or more portions of the object generated. Based on said comparing, when said one or more response objects received do not match said at least some of the one or more portions of the object generated, reporting and logging an error.
    Type: Grant
    Filed: December 14, 2016
    Date of Patent: June 4, 2019
    Assignee: Level 3 Communications, LLC
    Inventor: William Crowder
  • Patent number: 10270590
    Abstract: A pre-encryption process for symmetric encryption processes that inputs a bit stream into any existing or future encryption standard to increase encryption complexity with a disproportionate increase in processing time. The first encoding step is the two-stage generation of two strong keys based on a seed strong crypto key and known information from the Source Data bit stream. The second step is to split and encode the bit stream based on entropy levels. After entropy coding, the aligned bit streams are multiplexed in a cyclic fashion to generate one resulting bit stream. The third step is to slice the resulting bit stream into blocks, encrypting each block and adding each block to a coded output bit stream. Each new strong crypto key is derived from the previous crypto key and the previous pre-processed bit stream data. The decoding process is provided that is a simplified inverse of the encoding process.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: April 23, 2019
    Assignee: McAfee, LLC
    Inventor: Richard Bruno
  • Patent number: 10212486
    Abstract: Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
    Type: Grant
    Filed: June 6, 2017
    Date of Patent: February 19, 2019
    Assignee: DIVX, LLC
    Inventors: Francis Yee-Dug Chan, Kourosh Soroushian, Andrew Jeffrey Wood
  • Patent number: 10057218
    Abstract: A system for encrypting data and transferring or storing data securely may include a computing device including an encryptor configured to generate an encryption key from a network resource and encrypt data using the encryption key to generate encrypted data, and a decryptor configured to generate a decryption key from the network resource and decrypt the encrypted data to generate the non-encrypted data.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: August 21, 2018
    Assignee: The Boeing Company
    Inventor: Wayne R. Howe
  • Patent number: 10014934
    Abstract: A method for providing eavesdropping detection of an optic fiber communication between two users includes the steps of exchanging both data and probe signals through at least two channels (400, 500) between the users, exchanging probe signals (143) on one channel (500 or 400) between quantum probe signal terminals, extracting a key for authentication from the probe signals, and exchanging data signals (142) between transmission units on another channel (400 or 500). A first portion of the key generated by the quantum probe signal terminals is used to authenticate the terminals, wherein a second portion of the key is dedicated to define commutation occurrences of commutation devices adapted to commutate the use of the channels (400, 500) for data (142) and probe (143) signals, thus detecting an eavesdropping event (300) which triggers an alarm (750). A further portion of the key can be used to encrypt the messages.
    Type: Grant
    Filed: May 11, 2016
    Date of Patent: July 3, 2018
    Assignee: id Quantique SA
    Inventors: Simon Johnson, Grégoire Ribordy
  • Patent number: 10008132
    Abstract: A method and apparatus for embedding a data message in a carrier object using steganography. The method provides a secret key and determines an indicator channel from a plurality of color channels in the carrier object, wherein the indicator channel is the color channel in the carrier object that has a maximum number of different pixel values in the carrier object. The method generates a sorted indicator channel value array based on the channel values and the frequency of occurrence of each value of the indicator channel in the carrier object. For each indicator channel value in the sorted indicator channel value array, the method iterates through the carrier object to determine the pixel in the carrier object whose indicator channel value is the same as the current indicator channel value in the sorted indicator channel value array.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: June 26, 2018
    Assignee: Unisys Corporation
    Inventors: Anand Ankit, Rajnish Chandra
  • Patent number: 9900149
    Abstract: A method of improving the efficiency of an encryption/decryption process implementing the NIST FIPS 197 standard which includes a substitution box (S-box) and an inverse substitution (inverse S-box), comprises concatenating the S-box and inverse S-box to form a combined lookup table, and folding the concatenated table to generate a folded lookup table. The folded lookup table may be indexed for an encryption operation and for a decryption operation using a signal indicative of whether encryption or decryption is used.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: February 20, 2018
    Assignee: Synopsys, Inc.
    Inventors: A. A. Jithra Adikari, Michael Borza
  • Patent number: 9847980
    Abstract: To protect customer data and provide increased workflow security for processing requested by a customer, a secure communicational channel can be established between a customer and one or more hardware accelerators such that even processes executing on a host computing device hosting such hardware accelerators are excluded from the secure communicational channel. An encrypted bitstream is provided to hardware accelerators and the hardware accelerators obtain therefrom cryptographic information supporting the secure communicational channel with the customer. Such cryptographic information is stored and used exclusively from within the hardware accelerator, rendering it inaccessible to processes executing on a host computing device. The cryptographic information can be a shared secret, an appropriate one of a pair of cryptographic keys, or other like cryptographic information.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: December 19, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Douglas Christopher Burger, Eric S. Chung, Kenneth Eguro
  • Patent number: 9819657
    Abstract: An apparatus includes an interface and logic circuitry. The interface is configured to communicate over a communication link. The logic circuitry is configured to convert between a first stream of plaintext bits and a second stream of ciphered bits that are exchanged over the communication link, by applying a cascade of a stream ciphering operation and a mixing operation that cryptographically maps input bits to output bits.
    Type: Grant
    Filed: June 14, 2016
    Date of Patent: November 14, 2017
    Assignee: WINBOND ELECTRONICS CORPORATION
    Inventors: Nir Tasher, Moshe Alon, Valery Teper, Ziv Hershman, Uri Kaluzhny
  • Patent number: 9762082
    Abstract: A wireless charging apparatus and a wireless charging method are provided. The method includes selecting at least one of a wireless power reception mode and a wireless power transmission mode by a wireless charging apparatus, wirelessly receiving electric power when the wireless power reception mode is selected, and wirelessly transmitting electric power when the wireless power transmission mode is selected.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: September 12, 2017
    Assignee: Samsung Electronics Co., Ltd
    Inventor: Sung-Bum Park
  • Patent number: 9706259
    Abstract: Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the cryptographic information, extracting the at least partially encrypted video data from the container file to create an elementary bitstream, enciphering the cryptographic information, inserting the cryptographic information in the elementary bitstream, providing the elementary bitstream to a video decoder, extracting the cryptographic information from the elementary bitstream at the video decoder, deciphering the cryptographic information, decrypting the elementary bitstream with the cryptographic information and decoding the elementary bitstream for rendering on a display device using the video decoder.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: July 11, 2017
    Assignee: Sonic IP, Inc.
    Inventors: Francis Yee-Dug Chan, Kourosh Soroushian, Andrew Jeffrey Wood
  • Patent number: 9679153
    Abstract: An efficient data deduplication method for use in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether a substantially identical data object has previously been encrypted and stored. The determination may be made, for example, by comparing an encryption key reference value relating to the data object to key reference information stored in DSN memory. If not detected, the data object is encrypted using an encryption key based on the data object. The encrypted data object is then compressed and stored. The encryption key and a key reference value are also stored as encoded key slices in DSN memory. If the data object was previously stored, it is encrypted using a retrieved encryption key that is substantially identical to the data object. The data object may then be compressed for storage using a pattern based data compression function.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: June 13, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary W. Grube, Timothy W. Markison, S. Christopher Gladwin, Jason K. Resch, Wesley Leggette, Andrew Baptist
  • Patent number: 9681296
    Abstract: A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU) with a connectivity identifier, such as a Provisional Connectivity Identifier (PCID), which may be used to establish an initial network connection to an Initial Connectivity Operator (ICO) for initial secure remote registration, provisioning, and activation. A connection to the ICO may be used to remotely provision the WTRU with credentials associated with the Selected Home Operator (SHO). A credential, such as a cryptographic keyset, which may be included in the Trusted Physical Unit (TPU), may be allocated to the SHO and may be activated. The WTRU may establish a network connection to the SHO and may receive services using the remotely managed credentials. Secure remote subscription management may be repeated to associate the WTRU with another SHO.
    Type: Grant
    Filed: August 15, 2014
    Date of Patent: June 13, 2017
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Michael V Meyerstein, Yogendra C. Shah, Inhyok Cha, Andreas Leicher, Andreas Schmidt
  • Patent number: 9674170
    Abstract: Secret information, such as seeds, codes, and keys, can be automatically renegotiated between at least one sender and at least one recipient. Various mechanisms, such as counters, events, or challenges, can be used to trigger automatic renegotiations through various requests or communications. These changes can cause the current secret information to diverge from older copies of the secret information that might have been obtained by unintended third parties. In some embodiments, a secret can be configured to “decay” over time, or have small changes periodically introduced that can be determined to be valid by an authorized party, but can reduce the effectiveness of prior versions of the secret information.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: June 6, 2017
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Cristian M. Ilac
  • Patent number: 9588748
    Abstract: An information processing apparatus includes connection means, reception means, and installation means. The connection means automatically connects to a server. The reception means automatically performs processes of receiving one or more programs from the server. The installation means automatically performs processes of installing the programs on the information processing apparatus.
    Type: Grant
    Filed: February 15, 2011
    Date of Patent: March 7, 2017
    Assignee: Nintendo Co., Ltd.
    Inventors: Kazuhiro Wabe, Eiji Tokunaga, Takahiro Yamazaki
  • Patent number: 9578617
    Abstract: A system for measuring in an anonymous manner one or more spatial positions of one or more user devices within a region, wherein the system includes a wireless arrangement for receiving signals from the one or more user devices for determining the one or more spatial positions of the one or more user devices, wherein the wireless arrangement is operable to receive one or more user identification codes from the one or more user devices, wherein the one or more user identification codes include N bits; the system is operable to apply a mapping function to map the one or more user identification codes to form one or more corresponding secondary identification codes by decreasing an entropy of the one or more user identification codes by K bits; and the system is operable to modify the one or more corresponding secondary identification codes by increasing entropy of the one or more corresponding secondary identification codes by M bits.
    Type: Grant
    Filed: August 19, 2014
    Date of Patent: February 21, 2017
    Assignee: Walkbase Oy
    Inventors: Gabriel Nyman, Björn Sjölund, Niclas Jern
  • Patent number: 9559844
    Abstract: A non-linear processor, which subjects an input value from a feedback shift register storing an internal state of a stream cipher to non-linear processing to output a key stream, is connected to internal registers, which store output values from a non-linear substitution circuit which subjects the input value to non-linear substitution processing. The non-linear processor is provided with an exclusive-OR unit, which is at an input end of each of the internal registers and carries out an operation of a random number generated from part of values stored in the feedback shift register and the output value of the non-linear substitution circuit to mask the output value of the non-linear substitution circuit, and another exclusive-OR unit, which is provided at an output end of the internal register and performs an operation to unmask the value stored in the internal register.
    Type: Grant
    Filed: October 3, 2012
    Date of Patent: January 31, 2017
    Assignee: KDDI Corporation
    Inventors: Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake
  • Patent number: 9497021
    Abstract: Device for generating a message authentication code for authenticating a message, wherein the message is divided in blocks (M) with a specified block length, the device comprising a generating unit for generating the message authentication code based on a message by using a block cipher algorithm, and an encrypting unit for performing an exclusive disjunction on the last block with a first key (K1, K2) and for performing an exclusive disjunction on the first and/or the last block additionally with a second key (K3, K4) for generating the message authentication code.
    Type: Grant
    Filed: August 27, 2010
    Date of Patent: November 15, 2016
    Assignee: NXP B.V.
    Inventors: Bruce Murray, Pieter Janssens
  • Patent number: 9489533
    Abstract: A method for improving memory utilization in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether a substantially identical data portion of the data object has previously been encrypted and stored. The determination may be made, for example, by comparing a portion reference value relating to the data object to portion reference information stored in DSN memory. If not detected, the data object is encrypted using an encryption pattern sequence and encryption key, at least one of which substantially identical to at least a portion of the data portion. The encrypted data object is then compressed using a pattern based data compression function, and the compressed data object is stored. The portion reference value is also stored in DSN memory.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: November 8, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary W. Grube, Timothy W. Markison, S. Christopher Gladwin, Jason K. Resch, Wesley Leggette, Andrew Baptist
  • Patent number: 9197599
    Abstract: The specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise.
    Type: Grant
    Filed: September 24, 1998
    Date of Patent: November 24, 2015
    Assignee: VERIZON PATENT AND LICENSING INC.
    Inventors: B. Reilly Barry, Mark A. Chodoronek, Eric DeRose, Carol Y. Devine, Mark N. Studness, Angela R. James, Michael Tusa
  • Patent number: 9191251
    Abstract: A multilevel signal transmitting apparatus determines a voltage level indicating an original data signal, and generates a multilevel data signal including a plurality of unit time intervals each having the determined voltage level. The multilevel signal transmitting apparatus assigns an even number of voltage levels to each unit time interval, assigns a smaller number of voltage levels than a maximum number of voltage levels, to a unit time interval next to a unit time interval to which the maximum number of voltage levels are assigned, and determines one of the assigned voltage levels, as the voltage level indicating the original data signal. A multilevel signal receiving apparatus detects the voltage level of the multilevel data signal, and reproduces the original data signal, based on the assigned voltage levels and the detected voltage level.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: November 17, 2015
    Assignee: Panasonic Intellectual Property Management Co., Ltd.
    Inventor: Osamu Shibata
  • Patent number: 9042551
    Abstract: A semiconductor structure including a device configured to receive an input data-word. The device including a logic structure configured to generate an encrypted data-word by encrypting the input data-word through an encrypting operation. The device further including an eFuse storage device configured to store the encrypted data-word as eFuse data by blowing fuses in accordance with the encrypted data-word.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: May 26, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John A. Fifield, Gerald P. Pomichter, Jr.
  • Patent number: 8989379
    Abstract: Systems and methods for authenticating key rotation communications. Key rotation communications can include a key counter known to both a headend device and a station. Comparison between a local key counter and the key counter included in the key rotation communication can be used to authenticate the key rotation communication.
    Type: Grant
    Filed: January 9, 2008
    Date of Patent: March 24, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Srinivas Katar, Lawrence W. Yonge, Manjunath Krishnam
  • Patent number: 8949625
    Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Encryption and decryption engines may include embedded-format-preserving encryption and decryption engines. Embedded-format-preserving encryption engines may be used to encrypt data strings and embed information in data strings. Information corresponding to a format-preserving encryption operation of a data string may be embedded in an associated data string. The associated data string may be encrypted before or after embedding the information in the associated data string. The embedded information may include key management data that corresponds to a managed encryption key that was used to encrypt the data string.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: February 3, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Philip Hillyer Smith, III
  • Patent number: 8886960
    Abstract: A microprocessor includes an architected register having a bit. The microprocessor sets the bit. The microprocessor also includes a fetch unit that fetches encrypted instructions from an instruction cache and decrypts them prior to executing them, in response to the microprocessor setting the bit. The microprocessor saves the value of the bit to a stack in memory and then clears the bit, in response to receiving an interrupt. The fetch unit fetches unencrypted instructions from the instruction cache and executes them without decrypting them, after the microprocessor clears the bit. The microprocessor restores the saved value from the stack in memory to the bit in the architected register, in response to executing a return from interrupt instruction. The fetch unit resumes fetching and decrypting the encrypted instructions, in response to determining that the restored value of the bit is set.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: November 11, 2014
    Assignee: VIA Technologies, Inc.
    Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
  • Patent number: 8880902
    Abstract: A microprocessor is provided with a method for decrypting encrypted instruction data into plain text instruction data and securely executing the same. The microprocessor includes a master key register file comprising a plurality of master keys. Selection logic circuitry in the microprocessor selects a combination of at least two of the plurality of master keys. Key expansion circuitry in the microprocessor performs mathematical operations on the selected master keys to generate a decryption key having a long effective key length. Instruction decryption circuitry performs an efficient mathematical operation on the encrypted instruction data and the decryption key to decrypt the encrypted instruction data into plain text instruction data.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: November 4, 2014
    Assignee: VIA Technologies, Inc.
    Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
  • Patent number: 8837719
    Abstract: The invention relates to the general field of digital security and more particularly cryptography. In particular it proposes a device and a method of encrypting a sequence of data. The invention also relates to a cryptographic device (1) and a cryptographic method of generating a pseudo-random data sequence (13) and their favored use in the field of digital security, in particular for encrypting and decrypting data and for cryptographically hashing messages.
    Type: Grant
    Filed: June 4, 2008
    Date of Patent: September 16, 2014
    Assignee: Oridao
    Inventor: Nicolas Reffe
  • Patent number: 8825928
    Abstract: A device or “dongle” (30) is provided for controlling communications between a Subscriber Identity Module (or SIM) (12), such as of the type used in a GSM cellular telephone system, and a computer, such as a WINDOWS® operating system-based PC (10). The SIM (12) can be authenticated by the telephone network, in the same way as for authenticating SIMs of telephone handset users in the network, and can in this way authenticate the user of the PC (10) or the PC (10) itself. Such authentication can, for example, permit use of the PC (10) for a time-limited session in relation to a particular application which is released to the PC (10) after the authentication is satisfactorily completed. The application may be released to the PC (10) by a third party after and in response to the satisfactory completion of the authentication process. A charge for the session can be debited to the user by the telecommunications network and then passed on to the third party.
    Type: Grant
    Filed: October 9, 2003
    Date of Patent: September 2, 2014
    Assignee: Vodafone Group PLC
    Inventors: David Jeal, George Stronach Mudie
  • Patent number: 8811609
    Abstract: An information protection system includes a mobile terminal and an encryption module. The mobile terminal requests a key sequence by transmitting a message including a Personal Identification Number (PIN) number input by a user, and encrypts or decrypts one or more communication signals, including voice signals and data signals, based on the key sequence when the key sequence is received. The encryption module is connected to the mobile terminal. The encryption module encrypts a security key using the identifier and the PIN number of the mobile terminal, decrypts the encrypted security when requested by the mobile terminal, and transmits the key sequence generated based on the decrypted security key to the mobile terminal.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: August 19, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Sang-Hyun Park, Jun-Ho Lee, Haeng-Seok Ko, Myung-Won Seo, In-Jung Kim, Jang-Hong Yoon
  • Patent number: 8788811
    Abstract: A method and system for server-side key generation for non-token clients is described.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: July 22, 2014
    Assignee: Red Hat, Inc.
    Inventors: Christina Fu, Andrew Wnuk
  • Patent number: 8781114
    Abstract: An apparatus for recognizing a failure in a cryptographic unit, wherein the cryptographic unit includes a determinator for determining an input control signal and an output control signal, with the determinator being formed to determine the input control signal on the basis of an encryption of an input control signal parity of a group of input signals or an input signal of the group of input signals with an encryption number and to determine the output control signal on the basis of an encryption of an output control signal parity of a group of the output signals or an output signal of the group of output signals with the encryption number. Furthermore, the apparatus for recognizing includes an evaluator for evaluating the input control signal and the output control signal to recognize a failure of the cryptographic unit on the basis of a comparison between the input control signal and the output control signal.
    Type: Grant
    Filed: September 7, 2005
    Date of Patent: July 15, 2014
    Assignee: Infineon Technologies AG
    Inventors: Berndt Gammel, Michael Goessel, Rainer Goettfert
  • Patent number: 8769289
    Abstract: A user accessing a protected resource is authenticated using multiple channels, including a mobile device of the user. A user attempting to access a protected resource is authenticated by receiving a request from a mobile device of the user to access the protected resource; receiving a public key from the mobile device of the user; providing a provision token to the mobile device, wherein the provision token is used by the user to access the protected resource using a second device; and confirming the provision token to a provider of the protected resource to authorize the user to access the protected resource. The user then communicates with the provider using a second device to authorize the provisioning token. A transaction signing protocol is also provided.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: July 1, 2014
    Assignee: EMC Corporation
    Inventor: Boris Kronrod
  • Patent number: 8726123
    Abstract: A bit error corrector includes an aging bit pattern memory operable to store at least one aging bit pattern which conveys aging-related effects within a succession of uncorrected bit patterns, a bit pattern modifier operable to modify a current, uncorrected bit pattern using the at least one aging bit pattern and generate a modified bit pattern, and a bit pattern comparator operable to compare the current uncorrected bit pattern with a corrected bit pattern which is based on the modified bit pattern and determine a corresponding comparative bit pattern. An aging bit pattern determiner is operable to recursively determine a new aging bit pattern based on the at least one aging bit pattern and the comparative bit pattern, and store the new aging bit pattern in the aging bit pattern memory for use during modification of a subsequent uncorrected bit pattern by the bit pattern modifier.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: May 13, 2014
    Assignee: Infineon Technologies AG
    Inventors: Rainer Goettfert, Berndt Gammel, Thomas Kuenemund
  • Patent number: 8712050
    Abstract: A method of implementing dynamic pseudorandom keyboard remapping of a system including a keyboard in communication with an operating system of a computing device includes encrypting an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and decrypting the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard to the operating, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.
    Type: Grant
    Filed: September 11, 2007
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Wayne M. Delia, Edward E. Kelley, Franco Motika
  • Patent number: 8711751
    Abstract: Methods and apparatus that reduce user identification overhead for communications. In one aspect of the invention, a reciprocal transmission channel characteristic (e.g., the channel impulse response) is used to derive shared and anonymous user identification between two wireless devices. In one embodiment, subscription-less data transmissions are broadcast from a base station to multiple user equipment, each user equipment receiving its correspondingly identified subscription-less data. The use of quantization levels and/or levels of tolerance for compensating for non-ideal differences in recipient and transmitter channel characteristics are also disclosed.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: April 29, 2014
    Assignee: Apple Inc.
    Inventors: Markus Mueck, Andreas Schmidt
  • Patent number: 8712049
    Abstract: A system for implementing dynamic pseudorandom keyboard remapping includes a keyboard in communication with an operating system of a computing device; the keyboard configured to encrypt an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and the operating system configured to decrypt the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard thereto, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.
    Type: Grant
    Filed: September 11, 2007
    Date of Patent: April 29, 2014
    Assignee: International Business Machines Corporation
    Inventors: Wayne M. Delia, Edward E. Kelley, Franco Motika
  • Patent number: 8707224
    Abstract: A method of simplifying a combinational circuit establishes an initial combinational circuit operable to calculate a set of target signals. A quantity of multiplication operations performed in a first portion of the initial combinational circuit is reduced to create a first, simplified combinational circuit. The first portion includes only multiplication operations and addition operations. A quantity of addition operations performed in a second portion of the first, simplified combinational circuit is reduced to create a second, simplified combinational circuit. The second portion includes only addition operations. Also, the second, simplified combinational circuit is operable to calculate the target signals using fewer operations than the initial combinational circuit.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: April 22, 2014
    Assignees: The United States of America, as Represented by the Secretary of Commerce, The National Institute of Standards & Technology, University of Southern Denmark
    Inventors: Rene Caupolican Peralta, Joan Boyar
  • Patent number: 8699703
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating data via a pseudo-random polymorphic tree. A server, using a seed value shared with a client device, generates a tag stream according to a byte-string algorithm. The server passes the tag stream and the data to be transmitted to the client device through a pseudo-random polymorphic tree serializer to generate a pseudo-random polymorphic tree, which the server transmits to the client device. The client device, using the same seed and byte-string algorithm, generates the same tag stream as on the server. The client passes that tag stream and the received pseudo-random polymorphic tree through a pseudo-random polymorphic tree parser to extract the data. Data to be transmitted from the server to the client device is hidden in a block of seemingly random data, which changes for different seed values. This approach obfuscates data and has low processing overhead.
    Type: Grant
    Filed: October 19, 2011
    Date of Patent: April 15, 2014
    Assignee: Apple Inc.
    Inventors: Nicholas T. Sullivan, Bertrand Mollinier Toublet, Gianpaolo Fasoli, Jon McLachlan
  • Patent number: 8694789
    Abstract: A system and method for generating a non-repudiatable record of a communications data stream is provided, which is applicable to real-time and quasi-real-time data streams. A binary communication data stream is captured and segmented into defined frames. A key frame is generated for each of a number of data frames containing integrity and authentication information. The key frame is inserted into the data stream to provide an authenticated data stream.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: April 8, 2014
    Assignee: Avaya Inc.
    Inventor: Peter Chapman
  • Patent number: 8693682
    Abstract: A system for encryption, and subsequent decryption, of encoded data allows for transcoding of the encrypted data. The data is encoded in such a way that different packets have different importance levels, so that some or all of the packets at the lower importance levels can be discarded or truncated in order to reduce the data rate. This is achieved by introducing dependencies into the encoding process. The packets at the highest importance level are encoded with reference only to other packets at the highest importance level, while the encoding of packets at lower importance levels also depend on the encoding of the packets at the highest importance level. The encoded data is then encrypted in such a way that the encryption process has dependencies that correspond to the dependencies in the encoding process.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: April 8, 2014
    Assignee: SQR Systems Ltd
    Inventors: Nithin Mohan Thomas, David Roger Bull, David Wallace Redmill
  • Patent number: 8687799
    Abstract: When an encryption processing circuit encrypts data, a current flows in the encryption processing circuit. A noise current generated by a noise generation circuit is superimposed on the current consumed by the encryption processing circuit. The present invention is applicable to an IC chip that encrypts plaintext data using a key, thus preventing the key from being broken by DPA attacks based on analysis of the current consumption to provide high security.
    Type: Grant
    Filed: February 17, 2005
    Date of Patent: April 1, 2014
    Assignee: Sony Corporation
    Inventors: Shigeru Arisawa, Seiji Esaka
  • Patent number: 8683225
    Abstract: A microprocessor includes an architected register having a bit (may be x86 EFLAGS register reserved bit) set by the microprocessor. A fetch unit fetches encrypted instructions from an instruction cache and decrypts them (via XOR) prior to executing them, in response to the microprocessor setting the bit. The microprocessor saves the bit value to a stack in memory and then clears the bit in response to receiving an interrupt. The fetch unit fetches unencrypted instructions from the instruction cache and executes them without decrypting them after the microprocessor clears the bit. The microprocessor restores the saved value from the stack in memory to the bit in the architected register (and in one embodiment, also restores decryption key values) in response to executing a return from interrupt instruction. The fetch unit resumes fetching and decrypting the encrypted instructions in response to determining that the restored value of the bit is set.
    Type: Grant
    Filed: April 21, 2011
    Date of Patent: March 25, 2014
    Assignee: VIA Technologies, Inc.
    Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
  • Patent number: 8660261
    Abstract: An encryption-enabled entropy coder for a multimedia codec is disclosed. The entropy coder implements a randomized Huffman coding scheme without storing multiple sets of Huffman tables in a ROM. The entropy coder includes a ROM storing a single set of code tables, a table lookup section coupled to the ROM which converts symbols to original codewords and vice versa by performing table lookup, and a table randomizer section for converting original Huffman codewords to randomized Huffman codewords and vice versa using an isomorphic code generator algorithm. The table randomizer section performs the conversion based on a key hopping sequence generated by a pseudorandom bit generator using an encryption/decryption key.
    Type: Grant
    Filed: June 4, 2009
    Date of Patent: February 25, 2014
    Assignee: Mediatek Singapore Pte. Ltd.
    Inventors: Yu-Lin Chang, Wensheng Zhou
  • Patent number: 8638361
    Abstract: An endoscope apparatus has a transmission device of an endoscope and a reception device of a processor. The transmission device calculates a DC balance value of input data, compares the DC balance value and a cumulative value thereof, and compares the sign of the DC balance value and the sign of the cumulative value. When the signs are the same sign, the transmission device generates intermediate data by exchanging a first value and a second value with each other for all the bits of the input data, and generates predetermined information indicating that all the bits have been inverted. When the signs are different signs, the transmission device performs a process of setting the input data as the intermediate data and transmits the intermediate data by a serial signal.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: January 28, 2014
    Assignee: Olympus Medical Systems Corp.
    Inventors: Takahiro Tanabe, Susumu Kawata
  • Patent number: 8601598
    Abstract: A system that enables a cloud-based data repository to function as a secure ‘drop-box’ for data that corresponds to a user is provided. The ‘drop box’ can be facilitated through the use of cryptographic keying technologies. For instance, data that is ‘dropped’ by or on behalf of a particular user can be encrypted using a public key that corresponds to a user-specific private key. Thus, although the data resides within the large pool of ‘cloud-based’ data, it is protected since it can only be decrypted by using the private key, which is kept secret. The innovation can further facilitate user-centric secure storage by partitioning the cloud-based repository into multiple partitions, each of which corresponds to specific indexing criteria.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: December 3, 2013
    Assignee: Microsoft Corporation
    Inventors: Raymond E Ozzie, William H. Gates, III, Thomas F. Bergstraesser, Lili Cheng, Michael Connolly, Alexander G. Gounares, Henricus Johannes Maria Meijer, Debi P. Mishra, Ira L. Snyder, Jr., Melora Zaner-Godsey
  • Patent number: 8582779
    Abstract: A system and method for secure communications in a communication system, wherein the system programs a computer to perform the method, which includes: receiving at least one authentication key, without an encryption key, from a key-management server; receiving a packet, which is encrypted, from a source device; authenticating the packet, using the at least one authentication key, without cryptographically altering the packet; and forwarding the authenticated packet to a destination device of the packet.
    Type: Grant
    Filed: December 19, 2010
    Date of Patent: November 12, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Thomas S. Messerges, Adam C. Lewis
  • Patent number: 8577039
    Abstract: There is provided a cryptographic communication apparatus for conducting a key exchange procedure with another cryptographic communication apparatus that shares a password. The apparatus includes a first encryption unit that encrypts information that is based on a first random number using a public key of the another apparatus, a second encryption unit that encrypts the information that is based on the first random number encrypted by the first encryption unit using the password, a third encryption unit that encrypts information that is based on a second random number using the first random number, and transmits a first signal and a second signal to the another apparatus, the first signal including the information that is based on the first random number encrypted by the second encryption unit, and the second signal including information that is based on the second random number encrypted by the third encryption unit.
    Type: Grant
    Filed: April 25, 2012
    Date of Patent: November 5, 2013
    Assignee: Panasonic Corporation
    Inventor: Masakatsu Matsuo
  • Patent number: 8548163
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: October 1, 2013
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev