Having Particular Key Generator Patents (Class 380/44)
-
Patent number: 12287897Abstract: A request to search a database field in a database table for a query value may be received. The query value may be hashed with a designated hash function and a designated hash key to produce a designated keyed-hash value. A row in the database table may be identified based on the designated keyed-hash value. The identified row may include a keyed-hash field value that matches the designated keyed-hash value. The identified row may include an encrypted field value generated by encrypting an unencrypted field value matching the query value. One or more data values associated with the identified row may be transmitted in response to the request.Type: GrantFiled: May 20, 2021Date of Patent: April 29, 2025Assignee: Salesforce, Inc.Inventor: Freeman Parks
-
Patent number: 12289400Abstract: A system encrypts and decrypts e-mail, messages, and other digital data. By using quantum random number generators, the system has improved data security. Using a quantum random number, an agent (at a sender side) generates an encryption key which is used to automatically encrypt a message. The encryption key is stored at a key server. The encrypted message will be sent by an application using its standard transmission means such as SMTP, SMS, and others. The encrypted message can be automatically unencrypted by using an agent (at a recipient side) and retrieving the key from the key server. The system also provides an optional double encryption, where the message is encrypted with a user-generated password before being encrypted using the encryption key.Type: GrantFiled: June 2, 2022Date of Patent: April 29, 2025Assignee: XQ Message Inc.Inventors: Junaid Islam, Brian Wane
-
Patent number: 12279134Abstract: Methods, systems, and devices for wireless communications at a user equipment (UE) are described. Aspects of the described techniques may include the user equipment measuring signal aspects for a plurality of respective receive beams for receiving communications associated with a synchronization signal block transmitted by a base station on a transmit beam. From the measured signal aspects, the UE may determine that a receive beam from the plurality of receive beams is a preferred beam for receipt of communications from the base station transmitted on the transmit beam. With the determined preferred beam, the UE may initiate a beam-sweeping procedure to re-measure the plurality of UE receive beams, where the UE measures the first UE receive beam before measuring others of the plurality of UE receive beams.Type: GrantFiled: July 15, 2022Date of Patent: April 15, 2025Assignee: QUALCOMM IncorporatedInventors: Jun Zhu, Yong Li, Hongbo Yan, Raghu Narayan Challa
-
Patent number: 12277220Abstract: A method is provided for detecting a profiling attack in an electronic device. The method includes causing provisioning of the device with a key and causing key operations using the key. A total key provisions counter value of a total key provisions counter is updated in response to the key provisioning. Also, a counter value of a total operations counter corresponding to a total number of operations is updated using the detected provisioned keys. A predetermined relationship between the total key provisions counter value and the total operations counter value is detected. An indication of the profiling attack is provided in response to the relationship meeting a predetermined criterion. In another embodiment, an electronic device having a total key provisions counter value and a total key operations counter value is provided. A predetermined relationship between the counter values indicates a profiling attack of the electronic device.Type: GrantFiled: February 16, 2022Date of Patent: April 15, 2025Assignee: NXP B.V.Inventors: Nikita Veshchikov, Jack Connor
-
Patent number: 12250300Abstract: An authentication method for quantum communication between two nodes, the method comprising: applying a hash function to a message to obtain a hash code, wherein the hash function is a Poly1305; applying a one-time pad cipher to the hash code to obtain a message authentication code (MAC); and authenticating the message exchanged between the two nodes using the MAC.Type: GrantFiled: August 12, 2022Date of Patent: March 11, 2025Assignee: Kabushiki Kaisha ToshibaInventors: Robert Ian Woodward, Benjamin Marsh, Joseph Dolphin, James F. Dynes, Zhiliang Yuan, Andrew James Shields
-
Patent number: 12243057Abstract: A method for storing a cryptocurrency private key offline, including: encrypting the cryptocurrency private key using a primary encryption key; sharding the encrypted cryptocurrency private key into a plurality of alpha shards; generating beta shards by encrypting the alpha shards with secondary encryption keys; and storing representations of the beta shards offline. The method can additionally or alternatively include: retrieving the representations of the beta shards from the offline storage; decrypting the beta shards into the alpha shards based on the secondary encryption keys; reconstructing the encrypted cryptocurrency private key by recombining the alpha shards; and decrypting the encrypted cryptocurrency private key with the primary encryption key.Type: GrantFiled: April 17, 2019Date of Patent: March 4, 2025Assignee: Coinbase, Inc.Inventors: Philip Martin, Julian Borrey, Yolanda Liu, Zachary Blacher, Robert John Kearney
-
Patent number: 12231561Abstract: A method including receiving, by a user device, encrypted content and an encrypted assigned private key associated with the encrypted content; decrypting, by the user device, the encrypted assigned private key based at least in part on utilizing a master key to determine a decrypted assigned private key; determining, by the user device, a combination decryption key based at least in part on utilizing the decrypted assigned private key and an access public key associated with the encrypted content; decrypting, by the user device, an encrypted access private key associated with the access public key to determine a decrypted access private key; and decrypting, by the user device, the encrypted content based at least in part on utilizing the decrypted access private key is disclosed. Various other aspects are contemplated.Type: GrantFiled: June 29, 2023Date of Patent: February 18, 2025Assignee: UAB 360 ITInventor: Mindaugas Valkaitis
-
Patent number: 12231553Abstract: A key management device according to an embodiment is a key management device managing an application key for encrypting a communication in an application network including a plurality of applications. The key management device includes a hardware processor configured to function as a collection unit, a calculation unit, a determination unit, and a communication unit. The collection unit collects, using quantum key distribution (QKD), resource information indicating a resource of a link for which a link key is generated. The calculation unit calculates metric for a key relay route including the link on the basis of the resource information. The determination unit determines a key relay route from among a plurality of key relay routes on the basis of the metric. The communication unit uses the key relay route determined by the determination unit to send, to a destination, an application key encrypted with the link key.Type: GrantFiled: August 30, 2022Date of Patent: February 18, 2025Assignee: Kabushiki Kaisha ToshibaInventors: Yu Yu, Yasuhiro Katsube, Yoshimichi Tanizawa, Ririka Takahashi, Yasuhiro Fujiyoshi
-
Patent number: 12231563Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.Type: GrantFiled: April 7, 2023Date of Patent: February 18, 2025Assignee: Lemon Inc.Inventors: Haohao Qian, Jian Du, Qiang Yan
-
Patent number: 12200124Abstract: A method of establishing secure communication between a client and a server using a rotating key mechanism. The method comprises receiving a message requesting communication from a client, returning information for establishing communication to the client, including a set of cipher suites supported, receiving from the client one or more selected cipher suites from the set of cipher suites, sending rotation key mechanism attributes (RKM attributes) including a number of keys for rotation, a valid time period for each key, and a server criticality level and establishing communication between the client and server based on the rotation key mechanism attributes. The RKM attributes establish terms for key rotation when a valid time period of an active key elapses.Type: GrantFiled: September 19, 2022Date of Patent: January 14, 2025Assignee: SAUDI ARABIAN OIL COMPANYInventors: Mashael I Saleh, Abdullah N Aldossary, John A Gwilliams
-
Patent number: 12200117Abstract: Methods and devices that manage the secure distribution of credentials from a group of autonomous specialized nodes to a requesting node. The secure distribution of credentials may uses secret share and a group private key that none of the nodes reconstructs or possesses. The credentials include an identifier for the requesting node and a secret point that the node assembles from portions of the secret point provided by each of a plurality of the specialized nodes, where the secret point is based on the group private key and a map-to-point hash of the requesting node's identifier.Type: GrantFiled: June 4, 2018Date of Patent: January 14, 2025Assignee: NCHAIN LICENSING AGInventors: Giuseppe Destefanis, Simone Madeo, Patrick Motylinski, Stephane Vincent
-
Patent number: 12192348Abstract: A method for key management in a field-programmable integrated part of an integrated circuit is disclosed herein. According to the method, a hardware configuration for the field-programmable integrated part is loaded into the field-programmable integrated part. The hardware configuration includes a key derivation functionality. Further, using the key derivation functionality, a cryptographic key is derived based on information provided in the field-programmable integrated part.Type: GrantFiled: February 14, 2020Date of Patent: January 7, 2025Assignee: Siemens AktiengesellschaftInventors: Hans Aschauer, Rainer Falk, Christian Peter Feist, Steffen Fries, Aliza Maftun, Hermann Seuschek, Thomas Zeschg
-
Patent number: 12177337Abstract: In a method for cogenerating a shared cryptographic material implemented within a first electronic device, which is connected to a second electronic cogeneration device and to a third electronic cogeneration device, a shared encryption material (pkx) is determined, as a function of a set of cogeneration parameters ECG. The shared encryption material (pkx) is transmitted, and corresponding shared encryption materials (pky, pkz) are received from the other devices. A shared seed (mx) is computed as a function of the shared encryption materials (pkx, pky, pkz) and the set of cogeneration parameters ECG. A masked form (Ox) of said shared seed (mx) is transmitted, and masked forms (Oy, Oz) of corresponding shared seeds (my, mz) are received. A final seed (ad) is computed as a function of the masked forms (Ox, Oy, Oz) of the shared seeds (mx, my, mz) and the set of cogeneration parameters ECG.Type: GrantFiled: November 25, 2020Date of Patent: December 24, 2024Inventor: Rémi Geraud
-
Patent number: 12177336Abstract: A method of provenance verification comprises providing a plurality of security devices, each security device being provided with a key set comprising: a secret key, and a plurality of shared keys, each shared key being derived by generating a hash of the secret key and a salt value that is specific to a pair consisting of said security device and another of the plurality of security devices. The method also comprises configuring each security device to: generate and/or receive one or more messages; and perform at least one cryptographic operation on the message or messages, and/or on data derived therefrom, using a respective secret key of the security device and/or one of said shared keys.Type: GrantFiled: October 16, 2020Date of Patent: December 24, 2024Assignee: Illinois at Singapore Pte LtdInventors: Ertem Esiner, Binbin Chen, Daisuke Mashima, Zbigniew Kalbarczyk, David M. Nicol, Wei Lin
-
Patent number: 12166876Abstract: The disclosed embodiments relate to hardware security modules. In one embodiment, a method is disclosed comprising reading a random value from a physically unclonable function (PUF); generating a seed value from the random value; generating a cryptographic key using the seed value; and processing a cryptographic operation using the cryptographic key.Type: GrantFiled: July 30, 2021Date of Patent: December 10, 2024Assignee: Micron Technology, Inc.Inventor: Zhan Liu
-
Patent number: 12160434Abstract: The present invention concerns a method for processing system logs of a computer system. A system log generator (LG) transmits these system logs to a system log analyser (SIEM) after they have been encrypted by means of a symmetric encryption key and sends the symmetric encryption key in parallel with a homomorphic cryptosystem public key. The system log analyser carries out a transcryption of these logs then a processing thereof in the homomorphic domain. The result of the processing in the homomorphic domain is then transmitted to a security centre (SOC) or even directly to the system log generator to be decrypted there. The security centre can establish a security report or propose a countermeasure before sending it, in form encrypted by the symmetric key, to the system log generator.Type: GrantFiled: September 16, 2019Date of Patent: December 3, 2024Assignee: COMMISSARIAT A L'ENERGIE ATOMIQUE ET AUX ENERGIES ALTERNATIVESInventors: Aymen Boudguiga, Oana Stan, Renaud Sirdey
-
Patent number: 12159201Abstract: A method of constructing a procedural threshold in quotient algebra partition-based fault tolerance quantum computation, which is based on the framework of quotient algebra partition (QAP) applied in the fault tolerance quantum computation (FTQC), wherein an n-qubit fault tolerant encode of a k-qubit quantum gate M, is feasible to a threshold, wherein the method comprises: preparing a quantum code, with a stabilizer; creating an n-qubit encoding, in the quantum code, and obtaining an n-qubit fault tolerant encode of M; factorizing each encoded component, of this n-qubit fault tolerant encode; and producing a detection-correction operator by placing n-k ancilla qubits with the original system of n qubits, wherein the detection-correction operator comprises a conditional detection operator and a conditional correction operator to remove r-qubit spinor error.Type: GrantFiled: December 8, 2022Date of Patent: December 3, 2024Assignee: National Applied Research LaboratoriesInventors: Zheng-Yao Su, Ming-Chung Tsai
-
Patent number: 12149636Abstract: A computer-implemented method is disclosed. The method includes providing a blockchain transaction comprising a public key combination verification function. The blockchain transaction is configured to be redeemable to permit access to, or transfer control of, a resource by providing to the blockchain transaction an input comprising: a plurality of public keys; a gradient value (?) related to two of the plurality of public keys; and a group public key derived from a combination of the public keys and the gradient value (?). The blockchain transaction is configured to apply the public key verification function to the input to verify, upon successful redemption of the transaction, that the group public key is derived from the combination of the plurality of public keys.Type: GrantFiled: October 9, 2019Date of Patent: November 19, 2024Assignee: nChain Licensing AGInventors: Craig Steven Wright, Owen Vaughan
-
Patent number: 12143490Abstract: A decoding apparatus having a non-transient memory in which is stored an electromagnetic signal representative of data which were encrypted relying on the difficulty of computing discrete logarithms. The decoding apparatus has a computer in communication with the memory that decodes the encrypted data in the memory by computing the data's discrete logarithm. The decoding apparatus has a display on which the decoded encrypted data are displayed by the computer. A method for decoding.Type: GrantFiled: February 26, 2020Date of Patent: November 12, 2024Assignee: Chorus Call, Inc.Inventor: Giorgio Coraluppi
-
Patent number: 12135656Abstract: Periodically re-encrypting user data stored on a storage device, including: determining that data stored in a first location of a storage device is encrypted with a data encryption key that has been decommissioned; re-encrypting the data utilizing a current data encryption key; and writing the data that is encrypted utilizing the current data encryption key to a second location of the storage device.Type: GrantFiled: September 23, 2021Date of Patent: November 5, 2024Assignee: PURE STORAGE, INC.Inventors: Ethan Miller, Andrew Bernat
-
Patent number: 12137159Abstract: A wireless mobile device, and a computer-implemented method of distributing encryption keys to Internet of Things (IoT) systems begins with the wireless mobile device requesting IoT systems keys from a key management system with a first radio transceiver. Next, the requested IoT systems keys are received. Each of the IoT systems keys is i) encrypted with a public key from a recipient IoT system, and ii) signed by the key management system. In response to the wireless mobile device being located in proximity to the recipient IoT system, identifiers of the IoT system are received by the wireless mobile device with a second radio transceiver. The wireless mobile device selects at least one of the IoT systems keys that corresponds to the identifiers. The IoT system keys are transmitted from the wireless mobile device to the recipient IoT system with the second radio transceiver.Type: GrantFiled: August 23, 2022Date of Patent: November 5, 2024Assignee: CENTRO DE PESQUISAS AVANCADES WERNHER VON BRAUNInventors: Dario Sassi Thober, Diogo Oliveira De Melo, Jorge Anthony Félix Herrera
-
Patent number: 12137162Abstract: An apparatus comprises an encryption key generator to generate a media encryption key to encrypt data in number of memory components, where the encryption key generator is configured to wrap the media encryption key to generate an encrypted media encryption key, The encrypted media encryption key is stored in a non-volatile memory. The apparatus comprises firmware having instructions to transition the apparatus to and from a secure state using the encrypted media encryption key.Type: GrantFiled: June 28, 2021Date of Patent: November 5, 2024Inventors: Nathan A. Eckel, Steven D. Check
-
Patent number: 12124544Abstract: The present disclosure is directed to systems and methods for protecting software application information that is passed between a caller of an API and the logic contained within the API by using a Secure Calling Convention (SCC). The SCC involves performing a cryptographic operation on the information such that the true nature of the information is obfuscated. The SCC prevents a hacker from using the information to reverse-engineer the software application to behave as desired.Type: GrantFiled: September 10, 2019Date of Patent: October 22, 2024Assignee: Aveva Software, LLCInventor: Ian Peter George Steele
-
Patent number: 12107969Abstract: Methods, systems, and computer media provide attestation tokens that protect the integrity of communications transmitted from client devices, while at the same time avoiding the use of stable device identifiers that could be used to track client devices or their users. In one approach, client devices can receive batches of N device integrity elements from a device integrity computing system, each corresponding to a different public key. The N device elements can be signed by a device integrity computing system. The signing by the device integrity computing system can be signing with a blind signature scheme. Client devices can include throttlers imposing limits on the quantity of attestation tokens created by the client device.Type: GrantFiled: March 16, 2021Date of Patent: October 1, 2024Assignee: Google LLCInventors: Gang Wang, Marcel M. Moti Yung
-
Patent number: 12101402Abstract: The present disclosure relates to a method for a cryptographic key rotation in a publish-subscribe system providing a broker service for routing stored encrypted messages to one or more subscribers of the topic to which the routed messages are assigned. The routing comprises decrypting the stored encrypted messages. The cryptographic key rotation comprises a re-encryption of the stored messages using a cryptographic replacement key. The re-encryption is executed by an encryption module of the publish-subscribe system as a background process, while the broker service is continued.Type: GrantFiled: December 14, 2020Date of Patent: September 24, 2024Assignee: International Business Machines CorporationInventors: Christopher J. Giblin, John G. Rooney, Florian Hermann Froese, Pascal Vetsch
-
Patent number: 12101415Abstract: Decryption of an RSA encrypted message encrypted with a public RSA key by receiving encrypted key share components computed by generating a private RSA key d and a RSA modulus integer N, where N and d are integers; splitting the private key into key shares, encrypting with a fully homomorphic encryption (FHE) algorithm each key share component by using a Fully Homomorphic Encryption secret key ps associated with a set Ss to generate the encrypted key share components of said secure RSA key, computing an intermediate value YS for each set SS from said encrypted key share components, such that said computed intermediate value is a part of the RSA decrypted message, under FHE-encrypted form, and decrypting the encrypted message by combining said computed intermediate values for all sets.Type: GrantFiled: January 12, 2022Date of Patent: September 24, 2024Assignee: THALES DIS FRANCE SASInventors: Mariya Georgieva, Aline Gouget
-
Patent number: 12095909Abstract: A customer of a computing resource provider is associated with a key provided by a key management system. When the key is generated, a value is generated and encrypted with the key. In response to a detection of a trigger to re-encrypt the customer's key, the encrypted value is used to verify validity of the re-encrypted customer's key before committing it to storage and made available for use.Type: GrantFiled: September 30, 2019Date of Patent: September 17, 2024Assignee: Amazon Technologies, Inc.Inventors: Matthew J. Campagna, Jin Peng, Jason Wrang
-
Patent number: 12087253Abstract: A transparent data display window apparatus, system, and method that receives and processes encrypted data in the form of non-fungible token (NFT) for display thereon. The transparent data display window receives and displays encrypted NFT data. The transparent data display window generates and embeds a unique time code within the transparent data display specific to a current display of the encrypted NFT data on the transparent data display such that the embedded unique time code is readable and recordable at a particular time by a user device proximate to the transparent data display window and useful for continuing the current display of the encrypted NFT data from the particular time of the recording of the embedded unique time code by the user device proximate to the transparent data display on another display device.Type: GrantFiled: October 4, 2022Date of Patent: September 10, 2024Inventor: Troy R. Holliday
-
Patent number: 12081677Abstract: Described are a system, method, and computer program product for secure real-time n-party computation. The method includes receiving a first computation input and a first portion of a one-time key from a first computer device, and receiving a second computation input and a second portion of the one-time key from a second computer device. The method also includes generating the one-time key based on the first and second portion of the one-time key, and executing a computation based on the first and second computation input. The method further includes generating an encrypted output by encrypting the computation with the one-time key, and communicating the encrypted output to the first computer device. The method further includes receiving a proof of publication from the first computer device and, in response to receiving the proof of publication, communicating the one-time key to the first computer device.Type: GrantFiled: September 6, 2023Date of Patent: September 3, 2024Assignee: Visa International Service AssociationInventors: Rohit Sinha, Ranjit Kumar Kumaresan, Sivanarayana Gaddam, Mihai Christodorescu, Srinivasan Raghuraman
-
Patent number: 12074972Abstract: The invention is a method for updating a first secret data in a credential container including a subscriber identity module. The credential container comprises a set of secret parameters customized for a network operator and is configured to execute a symmetric mutual authentication algorithm using said set. The credential container receives from a remote server a second secret data enciphered using a second algorithm different from said symmetric mutual authentication algorithm and a subset of said secret parameters, the credential container deciphers the enciphered second secret data by using both the subset and a third algorithm and replaces the first secret data with the second secret data.Type: GrantFiled: August 22, 2019Date of Patent: August 27, 2024Assignee: THALES DIS FRANCE SASInventors: Michel Anslot, Jean-Yves Fine
-
Patent number: 12067575Abstract: Disclosed is a method, system, and computer program product for determining solvency of a digital asset exchange system. The method includes identifying a plurality of blockchain addresses corresponding to a plurality of users of a digital asset exchange system, generating a first commitment to an amount of digital assets corresponding to the plurality of blockchain addresses, and generating a second commitment to a balance of each user of the plurality of users. The method also includes generating a first component of a zero-knowledge algorithm that is configured to receive, as input, the first commitment. The method further includes generating, with at least one processor, a second component of the zero-knowledge algorithm that is configured to receive, as input, the second commitment. The method further includes determining that the digital asset exchange system is solvent based on the zero-knowledge algorithm.Type: GrantFiled: March 24, 2023Date of Patent: August 20, 2024Assignee: Visa International Service AssociationInventors: Payman Mohassel, Shashank Agrawal, Chaya Ganesh
-
Patent number: 12069159Abstract: A method for redacting a private blockchain comprises applying a hash function to a prefix and new content to compute a hash for a block of the blockchain; performing a modulo operation to convert the hash to an integer modulo; determining an inverse of the integer modulo; computing a redactable suffix from the prefix and the inverse of the integer modulo; replacing current content of the blockchain with the new content; and applying the redactable suffix to the block having the new content.Type: GrantFiled: June 17, 2022Date of Patent: August 20, 2024Assignee: Research Foundation of the City University of New YorkInventors: Vladimir Shpilrain, Dima Grigoriev
-
Patent number: 12069164Abstract: A method for securing communications for a given network is provided. The method comprises by at least one node(i) of the network configured to utilize pairwise keys: generating a set of encryption keys; and transmitting the set of encryption keys to a controller for the network; by the controller, executing a key selection process wherein for each node(j) in the network an encryption key J is selected from the set of encryption keys; assigning the encryption key J to the node(j); and transmitting the selected encryption key J to the node(j); by each node(j), generating an encryption key I to the node(i); and sending the encryption key I to the node(i) via the controller.Type: GrantFiled: September 13, 2019Date of Patent: August 20, 2024Assignee: Cisco Technology, Inc.Inventors: Syed Khalid Raza, Praveen Raju Kariyanahalli, Venugopal Hemige
-
Patent number: 12063293Abstract: A collation system 20, which is provided with a client 30 and a server 40, the client 30 includes: a random number generation unit 31 which generates a random number; a concealed information storage unit 32 which stores concealed information generated by concealing registered information and the generated random number using a concealment key; and a concealed index computation unit 33 which, on the basis of the collation information input for collation with the registered information and the concealed information, computes a concealed index, generated by concealing an index indicating closeness between the registered information and the collation information; the server 40 includes a determination unit 41 which uses a release key corresponding to the concealment key and the random number transmitted from the client 30 to determine whether or not the index can be acquired from the concealed index transmitted from the client 30.Type: GrantFiled: December 12, 2018Date of Patent: August 13, 2024Assignee: NEC CORPORATIONInventors: Toshiyuki Isshiki, Haruna Fukuda, Hiroto Tamiya, Masahiro Nara
-
Patent number: 12052359Abstract: Various aspects of the subject technology relate to systems, methods, and machine-readable media for encrypting data. The method includes adding a new encryption key for encrypting and/or decrypting data of a database, the data previously encrypted by an old encryption key. The method also includes hashing the new encryption key to generate a new hash. The method also includes comparing the new hash and an old hash with values in an encryption log, the old hash generated by hashing an old encryption key. The method also includes in response to the comparing, decrypting the data with the old encryption key when the new hash and old hash match the values in the encryption log. The method also includes encrypting the data with the new encryption key. The method also includes adding a new entry into the encryption log, the new entry comprising the new hash.Type: GrantFiled: July 30, 2021Date of Patent: July 30, 2024Assignee: AppDirect, Inc.Inventors: Daniel P. Craggs, Jonathan David Fok kan
-
Patent number: 12047519Abstract: Methods and endpoint nodes and controllers are disclosed for mutual authentication and key exchange. In an embodiment, physical unclonable function circuits on the endpoint nodes are used in combination with key masks to allow mutual authentication and key exchange between the endpoint nodes.Type: GrantFiled: July 15, 2022Date of Patent: July 23, 2024Assignee: Nanyang Technological UniversityInventors: Yue Zheng, Chip Hong Chang, Wenye Liu
-
Patent number: 12047500Abstract: The present invention is a platform and/or agnostic method and system operable to protect data, documents, devices, communications, and transactions. Embodiments of the present invention may be operable to authenticate users and may be operable with any client system. The method and system are operable to disburse unique portions of anonymous related information amongst multiple devices. These devices disburse unique portions of anonymous information and are utilized by the solution to protect sensitive data transmissions, and to authenticate users, data, documents, device and transactions. When used for authentication, login-related information is not stored in any portion of the solution, users and devices are anonymously authenticated. The solution also permits a user to access secured portions of the client system through a semi-autonomous process and without having to reveal the user's key.Type: GrantFiled: May 12, 2023Date of Patent: July 23, 2024Assignee: AUTNHIVE CORPORATIONInventor: Devi Selva Kumar Vijayanarayanan
-
Patent number: 12041063Abstract: Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and verifying data integrity between two or more interacting users exchanging information. A client computing device generates a split secret that is transmitted to a server via two distinct communication channels. The split secret is generated based on a public key of a public-private key pair generated by the client computing device based on a unique identifier. Validity of the public key can authenticate source identity.Type: GrantFiled: May 23, 2023Date of Patent: July 16, 2024Assignee: Uledger, Inc.Inventors: Joshua McIver, Taulant Ramabaja
-
Patent number: 12032704Abstract: Systems, apparatuses, and methods for improving security of a silicon-based system by creating a glitch-resistant process for executing a software code block on the silicon-based system are disclosed. An example method may begin by marking the software code block as non-executable. Second, intent to execute the software code block is registered with a staging register. Third, the software code block is compressed into a compression constant. Fourth, the compression constant is compared with a first predetermined value using two comparators. Fifth, responsive to the comparators providing a true result after comparison, the software code block is marked as executable to allow the software code block to execute. In another aspect, the example method may be repeated for n>1 iterations, and in each iteration i, an ith software code block is compressed into an ith compression constant that is compared to an ith predetermined value.Type: GrantFiled: August 31, 2021Date of Patent: July 9, 2024Assignee: Google LLCInventors: Marius P. Schilder, Timothy Chen, Scott D. Johnson, Derek L Martin
-
Patent number: 12013830Abstract: There is disclosed a system (100) comprising computing nodes (102A, 102B, 102C, 102D), wherein each computing node includes processor (104A, 104B, 104C, 104D), wherein each computing node comprises hash value of each data entity of pre-existing data entities therein, and wherein system (100) operates to provide verified recordal of data entities therein to ensure consistent recordal of data that assists to ensure reliable, efficient and robust operation of the system (100).Type: GrantFiled: October 16, 2020Date of Patent: June 18, 2024Inventor: Lum Ramabaja
-
Patent number: 12015707Abstract: A communication method and a related product are provided. The communication method includes: When UE switches from a source slice to a target slice mutually exclusive with the source slice, both the UE and a target AMF serving the target slice can obtain a first AMF key Kamf_new. The first AMF key Kamf_new is different from a second AMF key Kamf, and the second AMF key Kamf is a key of a source AMF serving the source slice. According to the application communication security and effectiveness are significantly improved_in a mutually exclusive slice switching scenario.Type: GrantFiled: July 20, 2021Date of Patent: June 18, 2024Assignee: Huawei Technologies Co., Ltd.Inventors: Juan Deng, Chengdong He
-
Patent number: 12010219Abstract: Disclosed is a highly available distributed key management system (KMS). The system receives a request for an encrypted data encryption key (DEK) from a user at an instance of the KMS. The instance of the KMS generates a blob that is signed with a symmetric key, and negotiated keys based on a key agreement scheme between the instance of the KMS and another instance of the KMS. The negotiation steps are performed using different public/private key pairings, while producing equivalent negotiated keys shared between KMS instances. This blob is sent to the user where it is stored by the user. Subsequently, when the user needs a decrypted DEK, the user may send this blob to any instance of the KMS and obtain a decrypted DEK for use in encrypting user data.Type: GrantFiled: October 25, 2021Date of Patent: June 11, 2024Assignee: Salesforce, Inc.Inventor: Lionel L Zhang
-
Patent number: 11995648Abstract: The invention relates to a computer-implemented method for enabling zero-knowledge proof or verification of a statement in which a prover proves to a verifier that a statement is true while keeping a witness to the statement a secret. The method includes the prover sending to the verifier a set of data including a statement, which for a given function circuit output and an elliptic curve point, the function circuit input is equal to the corresponding elliptic curve point multiplier. The data includes individual wire commitments and/or a batched commitment for wires of the circuit, a function circuit output, and a prover key, which enables the verifier to determine that the circuit is satisfied and calculate the elliptic curve point and validate the statement, thus determining that the prover holds the witness to the statement.Type: GrantFiled: March 18, 2019Date of Patent: May 28, 2024Assignee: nChain Licensing AGInventor: Thomas Trevethan
-
Patent number: 11991266Abstract: Some embodiments are directed to a fully homomorphic encryption (FHE) cryptography, wherein some encrypted data items are clipped, thereby reducing a bit-size of the encrypted data item and increasing an associated noise level of the encrypted data item. An FHE operation or a decrypt operation that operates on the clipped encrypted data item as input, has noise tolerance above a noise level associated with the clipped encrypted data item.Type: GrantFiled: October 28, 2021Date of Patent: May 21, 2024Assignee: ZAMA SASInventor: Marc Joye
-
Patent number: 11979385Abstract: A blockchain-implemented transaction from an originator node is to be broadcast. The originator node is communicatively coupled to proxy nodes. The method, implemented by a proxy node, includes: receiving a transaction including an input taking x+r units of computing resources, an output providing x units to the output address and another output providing d+r units to a 1-of-n multi-signature address unlockable by any one of a set of private keys associated the proxy nodes. The proxy node selects a quantity of computing resources, t units, to be allocated to the proxy node for broadcasting the transaction and having it included in the blockchain and generates a further transaction taking d+r units sourced from the multi-signature address and an output providing t units to the proxy node. The proxy node broadcasts both transactions timed to permit their inclusion in the same block of the blockchain.Type: GrantFiled: March 29, 2022Date of Patent: May 7, 2024Assignee: nChain Licensing AGInventors: Silvia Bartolucci, Pauline Bernat, Daniel Joseph
-
Patent number: 11971998Abstract: A data comparison device holds first and second encrypted data of first and second plaintext, respectively. The first plaintext is divided into a plurality of blocks and the first encrypted data is generated by executing encryption of each of the plurality of blocks and shuffling of the plurality of blocks. The second plaintext is divided into a plurality of blocks and the second encrypted data is generated by executing encryption of each of the plurality of blocks. In at least one of the first encrypted data and the second encrypted data, a plaintext value is embedded as a value indicating a magnitude comparison result, and the data comparison device compares blocks at the same position before shuffling of the first encrypted data and the second encrypted data based on the embedded value and determines a magnitude relationship between the first plaintext and the second plaintext.Type: GrantFiled: June 2, 2020Date of Patent: April 30, 2024Assignee: HITACHI, LTD.Inventors: Masayuki Yoshino, Ken Naganuma, Hisayoshi Sato
-
Patent number: 11962696Abstract: Systems and methods are described for removing unused encryption key files from a computing device. In an example, a key removal tool can identify three sets of keys to preserve. For the first set, the key removal tool can append a device identifier to known key names and add the resulting key file names to a whitelist. For the second set, the key removal tool can identify keys associated with certificates on the computing device and add their corresponding file names to the whitelist. The third set can correspond to keys created after a cutoff timestamp. The key removal tool can delete all key files with key file names not on the whitelist that were created before the cutoff timestamp.Type: GrantFiled: October 5, 2021Date of Patent: April 16, 2024Assignee: VMware, Inc.Inventors: Keith Robertson, Sagar Date
-
Patent number: 11949799Abstract: Disclosed is an input/output circuit for a physical unclonable function generator circuit. In one embodiment, a physical unclonable function (PUF) generator includes: a PUF cell array comprising a plurality of bit cells configured in a plurality of columns and at least one row, and at least one input/output (I/O) circuit each coupled to at least two neighboring columns of the PUF cell array, wherein the at least one I/O circuit each comprises a sense amplifier (SA) with no cross-coupled pair of transistors, wherein the SA comprises two cross-coupled inverters with no access transistor and a SA enable transistor, and wherein the at least one I/O circuit each is configured to access and determine logical states of at least two bit cells in the at least two neighboring columns; and based on the determined logical states of the plurality of bit cells, to generate a PUF signature.Type: GrantFiled: April 5, 2021Date of Patent: April 2, 2024Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.Inventors: Jui-Che Tsai, Shih-Lien Linus Lu, Cheng Hung Lee, Chia-En Huang
-
Patent number: 11945688Abstract: Proper use of a remote monitoring function is realized in an elevator-control-device that monitors an elevator. An elevator-control-device is connected with a remote-monitoring-server that remotely monitors an elevator, via a communication network. The elevator-control-device includes a processor that performs a monitoring-control-process for monitoring the elevator, and a memory. The memory stores a communication function in which a control program for communicating with the remote-monitoring-server for the elevator is stored, a remote-monitoring-function in which a control program for the monitoring-control-process is stored, and a maintenance terminal function in which a control program for connection with a maintenance terminal is stored. The remote-monitoring-function is encrypted and is stored in the memory.Type: GrantFiled: June 19, 2020Date of Patent: April 2, 2024Assignee: MITSUBISHI ELECTRIC BUILDING SOLUTIONS CORPORATIONInventor: Akihiko Watanabe
-
Patent number: 11942099Abstract: Disclosed example people monitoring methods include detecting a first watermark in a first audio signal obtained from an acoustic sensor, the first watermark identifying media presented by a monitored media device, determining whether a second watermark, different from the first watermark, is embedded in the first audio signal obtained from the acoustic sensor, the second watermark identifying at least one of a mobile device or a user of the mobile device, classifying the second watermark as a media watermark or a people monitoring watermark based on a characteristic of the second watermark, and when the second watermark is determined to be embedded in the first audio signal, reporting at least one of the second watermark or information decoded from the second watermark to identify at least one of the mobile device or the user of the mobile device as being exposed to the media presented by the monitored media device.Type: GrantFiled: December 29, 2021Date of Patent: March 26, 2024Assignee: The Nielsen Company (US), LLCInventors: Alexander Topchy, Padmanabhan Soundararajan, Venugopal Srinivasan