Having Particular Key Generator Patents (Class 380/44)
  • Patent number: 10637645
    Abstract: In one example, the cryptlet binary and a cryptlet key pair are provided to an enclave. A cryptlet key pair for the first cryptlet includes a cryptlet private key and a cryptlet public key. A cryptlet binding associated with a first cryptlet includes at least one binding. Each binding includes a mapping between the first cryptlet and at least one of a smart contract or another cryptlet. A binding identification is associated with the cryptlet binding. An output is received from the first cryptlet, such that the output is at least one of encrypted or signed by the cryptlet private key, and such that the output is signed by an enclave private key. A cryptlet identity is generated for the first cryptlet, such that the cryptlet identification includes: the hash of the cryptlet binary, the cryptlet public key, and the binding identification.
    Type: Grant
    Filed: May 11, 2017
    Date of Patent: April 28, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: John Marley Gray
  • Patent number: 10630473
    Abstract: Provided is a method and a security module for determining or providing a device-specific private key for an asymmetrical cryptographic process. A device-specific private primary seed is reproducibly formed from a device-specific secret piece of data, and the device-specific private key is determined from the device-specific private primary seed.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: April 21, 2020
    Assignee: Siemens Aktiengesellschaft
    Inventors: Rainer Falk, Steffen Fries
  • Patent number: 10630466
    Abstract: A method implemented by computers includes exchanging a key between a first user and a second user. Ephemeral session keys are generated. The ephemeral session keys are generated by a first computer associated with the first user and a second computer associated with the second user. An encrypted key generation response is exchanged between the first computer and the second computer. A new session request is received. It is determined that there is a valid session state. It is confirmed that there is a valid user. It is determined that there is a valid session identification. Information between the first computer and the second computer is cryptographically exchanged in response to the valid session state, the valid user and the valid session identification.
    Type: Grant
    Filed: November 3, 2017
    Date of Patent: April 21, 2020
    Assignee: Hologram, Inc.
    Inventors: Patrick F. Wilbur, Brian Lindemann, Erik Larson
  • Patent number: 10623438
    Abstract: A technique for detecting malware uses hardware capabilities of the processing element of a programmable device to detect modification of executable code during execution. By monitoring a dirty bit in page tables, pages that have been modified can be detected, allowing analysis of those pages during execution. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: April 14, 2020
    Assignee: McAfee, LLC
    Inventors: Venkata Ramanan Sambandam, Carl D. Woodward, Dmitri Rubakha, Steven L. Grobman
  • Patent number: 10607033
    Abstract: According to one embodiment, a physical uncloneable function circuit for providing a protected output bit is described including at least one physical uncloneable function circuit element configured to output a bit of a physical uncloneable function value, a physical uncloneable function bit output terminal and a coupling circuit connected between the physical uncloneable function circuit element and the physical uncloneable function bit output terminal configured to receive a control signal, supply the bit to the physical uncloneable function bit output terminal for a first state of the control signal and supply the complement of the bit to the physical uncloneable function bit output terminal for a second state of the control signal.
    Type: Grant
    Filed: January 30, 2018
    Date of Patent: March 31, 2020
    Assignee: Infineon Technologies AG
    Inventors: Thomas Kuenemund, Berndt Gammel
  • Patent number: 10607025
    Abstract: A data structure includes data that allows specific users to access data items that are part of the data structure and allows the users to store data items in association with the data structure. The data structure includes a root node which is the genesis of the data structure. The data structure further includes an access node for each user granted access rights to the data structure. An access node granting a user access rights to the data structure is directly connected to the root node. For a user whose access rights to the data structure are revoked, the data structure includes an additional access node directly connected to the access node that gave the user access rights. The data structure also includes a record node for each data item that is part of the data structure. Each record node is connected to the root node directly or indirectly.
    Type: Grant
    Filed: September 15, 2016
    Date of Patent: March 31, 2020
    Assignee: PeerNova, Inc.
    Inventor: Andrew James Rasmussen
  • Patent number: 10607031
    Abstract: A cryptographic ASIC and method for autonomously storing data into a one-time programmable memory in isolation. Internal circuitry provides programming pulses of a given voltage magnitude and duration for changing the state of selected memory elements. Use of internal circuitry reduces pin count and increases reliability and security over devices relying on external circuitry to provide programming pulses. In one embodiment, the stored data comprises cryptographic data for enforcing a derivative key hierarchy for managing an information stream, such as a blockchain.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: March 31, 2020
    Assignee: Blockchain ASICs LLC
    Inventor: Edward L. Rodriguez De Castro
  • Patent number: 10592699
    Abstract: Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as FPGAs, have two stages of operation; a configuration stage and a user mode stage. To prevent tampering and/or reverse engineering of a programmable device, various anti-tampering techniques may be employed during either stage of operation to disable the device and/or erase sensitive information stored on the device once tampering is suspected. One type of tampering involves bombarding the device with a number of false configuration attempts in order to decipher encrypted data. By utilizing a dirty bit and a sticky error counter, the device can keep track of the number of failed configuration attempts that have occurred and initiate anti-tampering operations when tampering is suspected while the device is still in the configuration stage of operation.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: March 17, 2020
    Assignee: Altera Corporation
    Inventor: Bruce B. Pedersen
  • Patent number: 10594492
    Abstract: A computing module is described herein, wherein the computing module is configured to perform acts including generating a digital signature for a printed circuit board (PCB), wherein the digital signature is based upon a sensor signal generated by a sensor that is electrically coupled to at least one of a trace of the PCB or an electrical component of the PCB. The acts further include determining that the PCB is authentic and is free of tampering based upon the digital signature. The acts additionally include outputting an indication that the PCB is authentic and is free of tampering responsive to determining that the PCB is authentic and is free of tampering.
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: March 17, 2020
    Assignee: National Technology & Engineering Solutions of Sandia, LLC
    Inventors: Nathan J. Edwards, Jason Hamlet, Mitchell Tyler Martin
  • Patent number: 10586037
    Abstract: A technique communicates a password to a user. The technique involves receiving, by processing circuitry, a request for a password. The technique further involves generating, by the processing circuitry, a password in response to the request. The password includes a series of alphanumeric digits which contains at least one number and at least one letter. The technique further involves displaying, by the processing circuitry, the password on a display screen. Each number displayed on the display screen has a first visual characteristic, and each letter displayed on the display screen has a visual characteristic that is different from the first visual characteristic. Such a technique enables disambiguation of an alphanumeric security code to a user.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: March 10, 2020
    Assignee: EMC IP Holding Company LLC
    Inventors: Bharath Krishnappa, Netravati V. Hegadi, Daniel Hassan
  • Patent number: 10581588
    Abstract: A method for executing by a circuit a substitution operation such that an output data may be selected in a substitution table using an input data as an index. The substitution operation may be performed using a new masked substitution table. The input data may be combined by XOR operations with a new value of a first mask parameter, and the output data may be combined by XOR operations with a new value of a second mask parameter. The new masked substitution table may be generated by computing the new value of the first mask parameter by applying XOR operations to a previous value of the first mask parameter and to a first input mask, computing the new value of the second mask parameter by applying XOR operations to a previous value of the second mask parameter and to a second input mask, and generating the new masked substitution table using a previous masked substitution table and the first and second input masks.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: March 3, 2020
    Assignee: ESHARD
    Inventors: Antoine Wurcker, Christophe Clavier
  • Patent number: 10581983
    Abstract: A method for operating a u-MANO inside a user domain that ensures deployment and service integrity of end-to-end network services in collaboration with a p-MANO includes receiving a request for a network service instance; and initiating a discovery operation to discover the p-MANO if the request's scope is determined to extend beyond the user domain. The discovery operation includes: determining an identity and/or an address of the p-MANO; sending a solicitation message to the p-MANO to discover its reachability and availability; sending a service request specifying network service requirements to the p-MANO in response to receiving a solicitation response from the p-MANO; and receiving a service acceptance from the p-MANO. The method further includes instantiating and deploying the network service instance that is at least partially within the user domain and partially outside the user domain.
    Type: Grant
    Filed: July 9, 2018
    Date of Patent: March 3, 2020
    Assignee: NEC CORPORATION
    Inventors: Faqir Zarrar Yousaf, Xi Li
  • Patent number: 10580240
    Abstract: Methods, devices, and systems are provided for configuring a reading device and/or a lock using a mobile device. The mobile device, running a configuration application, communicates with the reading device, determines a configuration of the reading device, and makes a determination for configuring the reading device based at least partially on configuration information provided by the reading device.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: March 3, 2020
    Assignee: ASSA ABLOY AB
    Inventors: Mark Anthony Caterino, Fredrik Carl Stefan Einberg, Philip Hoyer, Daniel Berg
  • Patent number: 10575109
    Abstract: A sound distribution apparatus is connected to a sound reproduction terminal that detachably holds an authentication device storing decoding information, the sound distribution apparatus including a sound distribution unit that streaming-distributes sound information, which has been encrypted with a decodable code on the basis of the decoding information, to the sound reproduction terminal.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: February 25, 2020
    Assignee: SONY CORPORATION
    Inventors: Yasuhide Hosoda, Shigeki Ohno, Tetsuro Tsuji, Takashi Nakanishi
  • Patent number: 10567454
    Abstract: A non-transitory computer-readable recording medium stores computer-executable instructions that, when executed by one or more processors, causes the one or more processors to perform operations including receiving, at a first electronic device, high quality live stream data through a high quality channel; playing back the high quality live stream data; receiving low quality live stream data through a low quality channel as the electronic device is set as a seed device in response to creation of the high quality channel; and sharing the received low quality live stream data by transmitting the received low quality live stream data.
    Type: Grant
    Filed: January 10, 2017
    Date of Patent: February 18, 2020
    Assignee: NAVER CORPORATION
    Inventors: Jaewon Oh, SeungKwan Yang
  • Patent number: 10567354
    Abstract: A system may include a communication device configured to communicate over a network, one or more processors, and one or more non-transitory computer-readable media containing instructions that, when executed by the one or more processors, cause the system to perform one or more operations. The operations may include performing a cryptographic operation on one or more packets to facilitate secure communication between the system and a computing device over the network, the cryptographic operation including probabilistic rounding. The operations may also include communicating, via the communication device, with the computing device over the network using the one or more packets.
    Type: Grant
    Filed: July 15, 2017
    Date of Patent: February 18, 2020
    Assignee: FUJITSU LIMITED
    Inventor: Hart Montgomery
  • Patent number: 10559229
    Abstract: Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.
    Type: Grant
    Filed: January 9, 2019
    Date of Patent: February 11, 2020
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Matti A. Hiltunen, Emiliano Miluzzo, Abhinav Srivastava
  • Patent number: 10558377
    Abstract: Providing data security includes: in response to a request to write data content to a storage, generating encrypted data content based on the data content; attempting to obtain a reference to the encrypted data content in the storage; in the event that the reference to the encrypted data content is obtained, modifying a translation line to refer to the reference to the encrypted data content in the storage; and in the event that the reference to the encrypted data content is not obtained: storing the encrypted data content at a new location; obtaining a reference to the encrypted data content stored at the new location; and modifying the translation line to refer to the reference to the encrypted data content stored at the new location.
    Type: Grant
    Filed: October 16, 2017
    Date of Patent: February 11, 2020
    Assignee: Intel Corporation
    Inventor: David R. Cheriton
  • Patent number: 10558589
    Abstract: Techniques are disclosed concerning secure access to data in a computing device. In one embodiment, a computing device includes a communication interface, a memory, a memory controller, and a security processor. The communication interface may communicate with a different computing device. The security processor may generate a host key in response to a successful authentication of the different computing device, and then encrypt a memory key using the host key. The security processor may also send the encrypted memory key to the memory controller, and send the host key to the different computing device. The host key may be included by the different computing device in a subsequent memory request to access data in the memory. The memory controller may, in response to the subsequent memory request, use the included host key to decrypt the encrypted memory key and use the decrypted memory key to access the data.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: February 11, 2020
    Assignee: Apple Inc.
    Inventors: Josh P. de Cesare, Wade Benson, Fabrice L. Gautier, Kaiehu Kaahaaina
  • Patent number: 10546136
    Abstract: According to an embodiment, a data processor includes a storage unit that stores a set of character strings that is a set of character string elements of which magnitude correlation is uniquely identifiable; a data converter that encrypts numerical data included in data to be managed, generates an index value corresponding to the numerical data using the character string elements included in the set of character strings, and generates converted data including the encrypted numerical data and the index value; a first transmitting unit transmits the converted data to a server; a query expression converter that converts a condition part including a numerical value of a query expression into a condition part including the character string elements to generate a converted query expression; a second transmitting unit that transmits the converted query expression to the server; and a receiving unit that receives, from the server, a result of query.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: January 28, 2020
    Assignees: KABUSHIKI KAISHA TOSHIBA, TOSHIBA SOLUTIONS CORPORATION
    Inventor: Takuya Kanawa
  • Patent number: 10546138
    Abstract: First data from a user device is received on an electronic computing device. The first data is encrypted to generate second data. The second data is fragmented and stored in a plurality of data stores.
    Type: Grant
    Filed: April 1, 2016
    Date of Patent: January 28, 2020
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Rameshchandra Bhaskar Ketharaju, Ravi Babu Bandla, Hem Shankar Karlapalem, Sarath Chava, Rama Rao Yadlapalli, Ajay Kumar Rentala, Vamsi Krishna Geda
  • Patent number: 10541979
    Abstract: A method for ciphering protected content communicated between a first device and a plurality of devices over a plurality of channels comprises performing authentication between the first device and each of the plurality of devices to create two or more shared key and initialization vector pairs allowing the ciphering of the protected content; generating a key stream for each of the channels based on a selected one of the two or more of shared key and initialization vector pairs; maintaining a buffer for each channel, each of the buffer containing the key stream generated for the corresponding channel; and ciphering data incoming on a selected channel using the selected key stream from the buffer corresponding to the selected channel.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: January 21, 2020
    Assignee: Synopsys, Inc.
    Inventors: Neil Farquhar Hamilton, Michael James Lewis, Michael Borza, Andrew A. Elias, A. A. Jithra Adikari
  • Patent number: 10541815
    Abstract: A method of maintaining ongoing authentication of a user of an application without the need to enter and re-enter a username and a corresponding password for each session initiated between a client side application residing on a client side platform and a server; and wherein the password is not stored on the server; the method comprising utilising an unbroken chain of one-time pass codes; each pass code in the chain being unique to the username and client side application; each pass code renewed periodically and preferably at least once during each said session.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: January 21, 2020
    Assignee: HAVENTEC PTY LTD
    Inventor: Ric B. Richardson
  • Patent number: 10530570
    Abstract: A transmission apparatus and a transmission data protection method thereof are provided. The transmission apparatus stores a data table, a bloom filter, a first randomization array, a plurality of second randomization arrays and an identifier of each of the second randomization arrays. The bloom filter has a plurality of independent hash functions. The transmission apparatus generates a current original datum according to the data table; inputs the current original datum to the bloom filter as a current input datum of the bloom filter to output a current bloom datum; randomizes the current bloom datum according to the first randomization array to generate a current first randomized datum; randomizes the current first randomized datum according to one of the second randomization arrays to generate a current second randomized datum; and transmits a data signal carrying the current second randomized datum and an identification datum to another transmission apparatus.
    Type: Grant
    Filed: October 23, 2017
    Date of Patent: January 7, 2020
    Assignee: Institute For Information Industry
    Inventors: Chih-Ta Lin, Chuan-Kai Kao
  • Patent number: 10530588
    Abstract: An apparatus is provided which comprises: a first stage of physically unclonable function (PUF) circuits to receive an n-bit challenge, wherein the first stage of PUF circuits comprise a subset of ā€˜nā€™ PUF cells each of which is to generate an output bit; and a first stage of cipher blocks to receive the output bits from the subset of ā€˜nā€™ PUF cells, wherein the first stage of cipher blocks is to generate a plurality of bits.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: January 7, 2020
    Assignee: Intel Corporation
    Inventors: Vikram B. Suresh, Sanu K. Mathew, Sudhir K. Satpathy
  • Patent number: 10523437
    Abstract: An Authentication Of Things (AOT) system includes a cloud server configured to control a cloud domain connected with a plurality of devices, a home server configured to control a home server connected with a plurality of devices, a first device corresponding to a new device, and a second device of a root user connected with the home domain while authentication is completed in the home server. In this case, the first device loads cryptographic material of the cloud server from the cloud server in a pre-deployment stage, the cryptographic material includes at least one selected from the group consisting of an identifier of the first device in the cloud server, a first private key of an ID-based cryptography system of the first device in the cloud server, a first pairwise key of the first device in the cloud server, and a counter of the first device, and if the first device is shipped to a trader, the cloud server deletes the first private key from the cloud server.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: December 31, 2019
    Assignees: LG ELECTRONICS INC., Universidade Federal de Minas Gerais
    Inventors: Leonardo Barbosa E Oliveira, Antonio Alfredo Ferreira Loureiro, Antonio Lemos Maia Neto, Harsh Kupwade Patil, Michele Nogueira Lima, Italo Fernando Scota Cunha, Artur Luis Fernandes De Souza, Leonardo De Abreu Cotta, Luiz Felipe Zafra Saggioro, Lucas Goulart Grossi, Ivan De Oliveira Nunes, Ronaldo Resende Rocha Junior
  • Patent number: 10516534
    Abstract: A cryptographic system implements a functional encryption scheme that is based on the lattice theory. In the cryptographic system, a key generation apparatus generates, as a secret key skv for a predicate vector v, a secret key skv including a matrix e as a key element, wherein a product of the matrix e and a matrix AY determined by the predicate vector v being input parameter Y forms a matrix uj for a value j in a set [N] including a plurality of values, the matrix uj being among a plurality of matrices u obtained from public parameters PP.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: December 24, 2019
    Assignee: MITSUBISHI ELECTRIC CORPORATION
    Inventor: Katsuyuki Takashima
  • Patent number: 10511592
    Abstract: A system and method provides access to one or more web services requested from a web site by using an app on a smart device, such as a smart phone or tablet, or the smart device itself.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: December 17, 2019
    Assignee: Charles Schwab & Co., Inc.
    Inventors: Suwat Phruksawan, Toby R. Kendall, Patrick C. McGraw, Dominic E. Caudell, Valery Zubovsky, Charles E. Gotlieb
  • Patent number: 10502619
    Abstract: Operational parameters of a single-photon detector are determined with a continuous wave laser source. At a fixed trigger, a dark count probability and a series of count probabilities at different optical powers are determined. A particular optical power is selected by using a wide-range variable attenuator to attenuate the optical power of the continuous wave laser. The dark count probability and the count probabilities are determined for different trigger rates. The operational parameters include efficiency, afterpulsing constant, and detrap time. The operational parameters are computed by fitting the computed dark count probabilities and count probabilities to a user-defined relationship.
    Type: Grant
    Filed: August 29, 2017
    Date of Patent: December 10, 2019
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Michael Brodsky, Cristian Antonelli, Jungmi Oh
  • Patent number: 10496327
    Abstract: A data storage system implements aggregation, bifurcation, and/or reduction techniques to improve the efficiency of processing data storage requests. Data storage requests and/or their associated payloads may be aggregated based on one or more parameters. Data to be the stored and the associated commands may be separated so as to optimize a system's throughput and latency for each. Furthermore, extraneous commands and requests may be reduced or eliminated based on heuristics associated with the requests and the data.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: December 3, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Frank Charles Paterra, Eric Neilsen, Andrew Portnoy, Firat Basarir
  • Patent number: 10474454
    Abstract: A system and method can support device management. A trusted operating system (OS) in a trusted execution environment can store a digest for one or more binary files, which are associated with a trusted application that is deployed in the trusted execution environment. Then, the system can update the trusted application based on one or more updates received from a service provider. Furthermore, the system allows the trusted OS to derive at least one secret bound to the updated trusted application using the digest stored by the trusted OS in the trusted execution environment.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: November 12, 2019
    Assignee: Oracle International Corporation
    Inventor: Nicolas Ponsini
  • Patent number: 10468104
    Abstract: The present disclosure relates to a structure which includes a pair of non-volatile storage devices in a memory array which are sensed to determine an initial data state and reinforced by a write operation of the initial data state to the pair of non-volatile storage devices. The structure can be used for a robust and error free physical unclonable function.
    Type: Grant
    Filed: June 13, 2018
    Date of Patent: November 5, 2019
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Darren L. Anand, William Roy John Corbin
  • Patent number: 10469258
    Abstract: Disclosed are an encryption apparatus and method. The encryption apparatus includes a storage configured to store a static key table, and at least one processor configured to implement an authenticator configured to perform authentication with an external apparatus and acquire authentication information and a key table generator configured to generate a dynamic key table using authentication information acquired through the authentication.
    Type: Grant
    Filed: June 1, 2017
    Date of Patent: November 5, 2019
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Duk-Jae Moon, Kyu-Young Choi, Ji-Hoon Cho
  • Patent number: 10461929
    Abstract: Examples relate to updating login credentials of an iSCSI client in a Storage Area Network (SAN). In an example, an iSNS server may send a target notification to an iSCSI target device, the target notification including an instruction for the target device to update a target-side record of login credentials for an iSCSI client. iSNS server may receive a first target response message from iSCSI target device. In response, iSNS server may provide updated login credentials for the iSCSI client to the iSCSI target device. iSNS server may receive a second target response message. In response, iSNS server may send a client notification to iSCSI client to update a client-side record of login credentials. iSNS server may receive a first client response message. In response, iSNS server may provide the updated login credentials to the iSCSI client.
    Type: Grant
    Filed: September 25, 2017
    Date of Patent: October 29, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Krishna Puttagunta, Vivek Agarwal, Rupin T Mohan
  • Patent number: 10460234
    Abstract: Systems and methods for private deep neural network training are disclosed. Method includes storing first private values at first machine and second private values at second machine; providing, to third machine, first share of first private values and first share of second private values; providing, to fourth machine, second share of first private values and second share of second private values; computing, at third machine, third machine-value based on first share of first private values and first share of second private values; computing, at fourth machine, fourth machine-value based on second share of first private values and second share of second private values; providing, to first machine and second machine, third machine-value and fourth machine-value; and computing, at first machine, a mathematical function of first private values and second private values, mathematical function being computed based on first private values stored at first machine, third machine-value, and fourth machine-value.
    Type: Grant
    Filed: March 9, 2018
    Date of Patent: October 29, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Nishanth Chandran, Divya Gupta, Sameer Wagh
  • Patent number: 10460119
    Abstract: A method and system provides access control encryption for a file system. A resource management module manages access to data on a storage container and hosts a virtual file system including files representing the data on the storage container. An access control and encryption module encrypts each of the files with a respective file encryption key. The access control module generates a plurality of application containers each associated with a respective user and that include respective lists of files that the respective user is authorized to access. The access control and encryption module generates decrypts the files and allows access to files based on the lists of files in the application containers.
    Type: Grant
    Filed: February 26, 2016
    Date of Patent: October 29, 2019
    Assignee: Intuit Inc.
    Inventors: Yaron Levy, Yaron Sheffer, Eugene Golovinsky, Luis Felipe Cabrera
  • Patent number: 10454682
    Abstract: A first apparatus performs a pairing providing process of displaying a provision string on the first apparatus and transmitting the provision string to a server apparatus, the provision string being of a given number of digits that changes every given amount of time in such a manner that, every given amount of time, the provision string is subjected to carrying and a new character is added to the rightmost digit of the provision string. A second apparatus transmits an acceptance string to the server apparatus, the acceptance string being input from the second apparatus based on the provision string displayed on the first apparatus. The server apparatus compares the provision string with the acceptance string, and determines that pairing is established between the first apparatus and the second apparatus when the provision string and the acceptance string match each other.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: October 22, 2019
    Assignee: PLATFIELD INC.
    Inventor: Takeshi Mizuta
  • Patent number: 10452320
    Abstract: According to one embodiment, a system includes one or more memory units and one or more processors. The processors are configured to receive a plurality of data elements. The processors are also configured to, for a first data element of the plurality of data elements, generate a first token for the first data element, and transmit the first token to a device. The processors are further configured to individually encrypt the first data element, and break the first encrypted data element into a plurality of encrypted data portions including a first encrypted data portion and a second encrypted data portion. The processors are further configured to transmit the first encrypted data portion of the first encrypted data element for storage in a first data storage device, and transmit the second encrypted data portion of the first encrypted data element for storage in a second data storage device.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: October 22, 2019
    Assignee: Secure Cloud Systems, Inc.
    Inventors: David Schoenberger, Timothy Reynolds
  • Patent number: 10452357
    Abstract: Aspects of the disclosure are directed to solutions for generating a distinctive value in a computing device. A captured data gathering module is to interface with the plurality of data capture devices and to read data output from each of them. The data output has a randomness characteristic. A captured data aggregation module is to combine the data output from at least two different data capture devices to produce an aggregated output. A transformation module is to compute a transformation of the aggregated output to produce a distinctive value that is based on the randomness characteristic.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: October 22, 2019
    Assignee: Intel Corporation
    Inventors: Tat Kin Tan, Usman Sarwar
  • Patent number: 10454688
    Abstract: A method for managing certificates includes the steps of transmitting, over an electronic network by an electronic device of a client, a certificate request to a certificate management portal separate from the client, establishing an interaction with an electronic interface of a certificate authority by the certificate management portal; generating, by the certificate authority, a certificate package, delivering the generated certificate package to the certificate management portal, and downloading from the certificate management portal, by the client, at least one certificate of the delivered certificate package.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: October 22, 2019
    Assignee: Cable Television Laboratories, Inc.
    Inventor: Brian Alexander Scriber
  • Patent number: 10447725
    Abstract: This disclosure relates to techniques for performing secure ranging wireless communication. A first wireless device may receive a ranging packet from a second wireless device in a wireless manner. The ranging packet may include a first random sequence portion and a second random sequence portion. The first wireless device may perform one or more channel and noise estimations for the ranging packet. The first wireless device may perform one or more security checks for the ranging packet based on any or all of the first random sequence portion, the second random sequence portion, or the channel and noise estimation(s).
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: October 15, 2019
    Assignee: Apple Inc.
    Inventors: Mingguang Xu, Mithat C. Dogan, Yakun Sun, Rohit U. Nabar
  • Patent number: 10447474
    Abstract: A computing system retrieves securely stored encrypted and encoded data from a dispersed data storage system. The computing system includes a processing module and a plurality of storage units. The processing module includes an error decoder and a decryptor and to decode and decrypt the encrypted and encoded data retrieved from the dispersed data storage system utilizing a read command to the storage units. The storage units retrieve the encrypted and encoded data and send the encrypted and encoded data to the processing module when receiving the read command.
    Type: Grant
    Filed: August 31, 2009
    Date of Patent: October 15, 2019
    Assignee: PURE STORAGE, INC.
    Inventors: Wesley Leggette, Jason K. Resch
  • Patent number: 10425412
    Abstract: In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a service processor. The service processor generates a first encryption key at runtime based on unique device data of the service processor and a first logic. The service processor refrains from storing the first encryption key in the storage device. The service processor further encrypts target data based on the encryption key and an encryption algorithm to obtain first encrypted data. The service processor then stores the first encrypted data in a storage device of the service processor.
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: September 24, 2019
    Assignee: AMERICAN MEGATRENDS INTERNATIONAL, LLC
    Inventors: Anurag Bhatia, Samvinesh Christopher, Winston Thangapandian
  • Patent number: 10425404
    Abstract: A reminder terminal creates a table having random letter strings in elements. A user views the created table and registers, at a resource server, a password obtained by arranging first letter strings contained in first elements extracted from the viewed table in accordance with a selection sequence. The created table is stored at the reminder terminal. When the user accesses the resource server, the reminder terminal presents the stored table to the user and transmits information indicative that the stored table is presented. The user obtains a password for the resource server by arranging second letter strings contained in second elements extracted from the presented table in accordance with the selection sequence. Unless the information is received by a management server, the resource server does not permit the user to access contents of the resource server.
    Type: Grant
    Filed: September 8, 2015
    Date of Patent: September 24, 2019
    Assignee: PASSLOGY, CO., LTD.
    Inventor: Hideharu Ogawa
  • Patent number: 10423441
    Abstract: Embodiments generally relate to a computer-implemented method and system of automatically generating a task on a first messaging application at a first client device associated with a first user. The method includes: parsing, by the first client device, message content from an active field on the first messaging application of the first client device to identify at least one predefined character in the message content; and receiving, in relation to the message content, a selection of a user name associated with a second user. Task metadata may be automatically generated based on at least the first user, second user and a portion of the message content. The task metadata may then be attached, by the first client device, to the message content. First task data based on the task metadata may then be automatically generated at the first client device.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: September 24, 2019
    Inventor: James Cattermole
  • Patent number: 10412581
    Abstract: A vehicle includes: (i) a main telematics module, (ii) a connectivity module including antenna(s) and processor(s). The connectivity module is configured to: (a) authenticate a mobile device via a vehicle-access-key (VAK); (b), if (a), issue an ephemeral-session-key (DSK) to the mobile device; (c), if (b), establish an active session with the mobile device; (d) encrypt all messages to the mobile device with the VAK during (a) and with the DSK during (c). The connectivity module is configured to automatically revoke the DSK upon expiration of a predetermined time interval.
    Type: Grant
    Filed: February 14, 2017
    Date of Patent: September 10, 2019
    Assignee: Ford Global Technologies, LLC
    Inventors: Cameron Smyth, Robert James Southern, John Robert Van Wiemeersch, David Ray Erkkila, Mike Raymond Westra, Aldi Caushi, John William Turner, Bobak Shahidehpour, Vivekanandh Elangovan
  • Patent number: 10412054
    Abstract: A method of performing a cryptographic operation using a cryptographic implementation in a cryptographic system, including: receiving, by the cryptographic system, an identifying string value; receiving, by the cryptographic system, an input message; performing, by the cryptographic system, a keyed cryptographic operation mapping the input message into an output message wherein the output message is the correct result when the identifying string value is one of a set of binding string values, wherein the set includes a plurality of binding string values.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: September 10, 2019
    Assignee: NXP B.V.
    Inventors: Wil Michiels, Jan Hoogerbrugge
  • Patent number: 10372897
    Abstract: Example implementations relate to encrypted capabilities stored in global memory. For example, in an implementation, a capability protection system may store an encrypted capability into global memory, where the encrypted capability is encrypted based on a condition. The capability protection system may receive, from a node in communication with the global memory, a request to access the encrypted capability stored in the global memory. The capability protection system may provide to the node a decrypted form of the encrypted capability upon satisfaction of the condition by the node.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: August 6, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Chris I. Dalton, Dejan S. Milojicic
  • Patent number: 10374797
    Abstract: A key generation device (100) configured to generate a public key (126) for use in a public key encryption device and a corresponding private key (114) for use in a private key decryption device, the key generation device comprising a private key generator (110) configured for obtaining in electronic form a private random value (112, s), and generating the private key (114), the private key comprising the private random value (112), and a public key generator (120) configured for obtaining in electronic form a public set of bivariate polynomials (122, fi (,)), computing a public univariate polynomial (124) by summing over univariate polynomials obtained by substituting the private random value (112, s) into the polynomials of the public set (122, fi (s,)), and generating the public key (126), the public key comprising the public univariate polynomial (124) and the public set (122).
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: August 6, 2019
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Ronald Rietman, Oscar Garcia-Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Santos Merino Del Pozo
  • Patent number: 10362032
    Abstract: Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device to a network of the customer hosted by the computing resource provider. The computing resource provider reconfigures a set of computing resources so that the devices of the customer are able to communicate with the device as if the device was in the customer's own network.
    Type: Grant
    Filed: January 23, 2018
    Date of Patent: July 23, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Robert Eric Fitzgerald, Andrew J. Doane, Alexander Edward Schoof, Christopher Steven Helma, Rui Min, Matthew A. Estes, Anand Mishra