Nonlinear (e.g., Pseudorandom) Patents (Class 380/46)
  • Patent number: 10277629
    Abstract: A computer-implemented method for creating a deception computing system may include (i) identifying, by a computing device, a dataset of security alert signatures from a set of client devices, (ii) determining, by the computing device, a set of software vulnerabilities based on the dataset of security alert signatures, (iii) clustering, by the computing device, the set of software vulnerabilities to increase a length of at least one potential attack path within a predetermined number of honeypot machines, and (iv) distributing, by the computing device and based on clusters of software vulnerabilities, a set of vulnerable software among a set of honeypot machines within a honeynet. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 20, 2016
    Date of Patent: April 30, 2019
    Assignee: Symantec Corporation
    Inventor: Ravindra Guntur
  • Patent number: 10250387
    Abstract: A system and process provides quantum computer resistant algorithm cryptographic keys. Embodiments utilize a hardware noise source whose entropy is fed to a random bit generator to generate keys which go straight to the advanced encryption standard. The keys avoid the need for mutual authentication and are thus not subject to reverse factoring that can be accomplished through quantum computing.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: April 2, 2019
    Inventor: Patrick Joseph Guerin
  • Patent number: 10236887
    Abstract: Generating a unique die identifier for an electronic chip including placing the electronic chip in an identifier generation state, wherein the electronic chip comprises a set of test circuits, wherein each of the set of test circuits is attached to a corresponding component on the electronic chip; obtaining an ordered list of race pairs of the set of test circuits; for each race pair in the ordered list of race pairs of the set of test circuits: selecting the race pair of test circuits; executing a race between the selected race pair; and adding an element to the unique die identifier based on an outcome of the executed race; and returning the electronic chip to an operational state.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Karl R. Erickson, Phil C. Paone, David P. Paulsen, John E. Sheets, II, Gregory J. Uhlmann
  • Patent number: 10218517
    Abstract: In some aspects, a method includes obtaining, by a response generator circuit, reliability information for each bit of an array of bits provided by a physical unclonable function (PUF) circuit; receiving, from the PUF circuit during run time, an array of values for the array of bits; selecting a plurality of values from the array of values received from the PUF circuit in accordance with the reliability information; and generating, by the response generator circuit, a PUF response from the selected plurality of values.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: February 26, 2019
    Assignee: Carnegie Mellon University
    Inventors: Kenneth Wei-An Mai, Mudit Bhargava
  • Patent number: 10191719
    Abstract: A programmable magnetic device for generating random numbers during a programming operation, including an array of a plurality of magnetic tunnel junctions. Each magnetic tunnel junction includes a reference layer having a reference magnetization; a tunnel barrier layer; and a storage layer having a storage magnetization. The programmable magnetic device is arranged such that, during the programming operation, the storage magnetization is orientable in an unstable magnetization configuration and relaxable randomly in one of a plurality of stable or metastable configurations from the unstable magnetization configuration.
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: January 29, 2019
    Assignee: CROCUS TECHNOLOGY SA
    Inventors: Sebastien Bandiera, Quentin Stainer
  • Patent number: 10141982
    Abstract: In an RFID system having at least one tag and at least one reader, a tag and a reader can, in one embodiment, use a pair of keys, known to both the tag and the reader, to restrict the interaction of the tag and the reader so that tags having the pair of keys interact only with readers that use the pair of keys.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: November 27, 2018
    Assignee: RUIZHANG TECHNOLOGY LIMITED COMPANY
    Inventor: John Stephen Smith
  • Patent number: 10140178
    Abstract: A method begins by a processing module of a dispersed storage network (DSN) retrieving a decode threshold number of encoded data slices of a set of encoded data slices from a first grouping of storage units of the DSN. The method continues with the processing module determining a first status level indication of the retrieved decode threshold number of encoded data slices and sending check status request messages to a second grouping of storage units of the DSN. The method continues with the processing module receiving check status response messages and processing the check response messages to produce a second status level indication. When the second status level indication is substantially equal to the first status level indication, the method continues with the processing module indicating that the decode threshold number of encoded data slices is of a common status level as other encoded data slices of encoded data slices.
    Type: Grant
    Filed: April 7, 2015
    Date of Patent: November 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jason K. Resch, Kumar Abhijeet
  • Patent number: 10135614
    Abstract: Disclosed herein is a method for performing an integrated contactless point-of-sale transaction. More particularly, there is disclose a method comprising: receiving, by a mobile device 1, a seed number from a communications network; generating, by the mobile device 1, one or more session keys, in dependence on the received seed number, for use in encrypted communication with the mobile device 1; and/or generating, by the mobile device 1, a pre-image, in dependence on the received seed number, for use in generating an unpredictable number for use in secure communication with the mobile device. Advantageously, the generation of session keys and/or a pre-image in dependence on a seed number provided to the mobile device improves the security of the system since the source of the seed number can detect incorrect session keys and/or unpredictable number derived from an incorrect pre-image.
    Type: Grant
    Filed: April 2, 2014
    Date of Patent: November 20, 2018
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: David Anthony Roberts, Patrik Smets, Axel Emile Jean Charles Cateland, Patricia Bateson
  • Patent number: 10116437
    Abstract: A method for protection of cloud computing includes homomorphic encryption of data. Partially or fully homomorphic encryption allows for data within the cloud to be processed without decryption. A partially or fully homomorphic encryption is provided. The proposed scheme can be used with both an algebraic and analytical approaches. A cloud service is implemented on a server. A client encrypts data using fully homomorphic encryption and sends it to the server. The cloud server performs computations without decryption of the data and returns the encrypted calculation result to the client. The client decrypts the result, and the result coincides with the result of the same calculation performed on the initial plaintext data.
    Type: Grant
    Filed: December 14, 2015
    Date of Patent: October 30, 2018
    Assignee: Ingram Micro, Inc.
    Inventor: Sergey Krendelev
  • Patent number: 10102386
    Abstract: Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded in an initialization vector corresponding to an encrypted sample. Upon decryption of encrypted content, the content type is identified and an action taken based upon the detected content type.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: October 16, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Lei Li, Pankaj Sethi, Patrik Schnell, Wesley Shawn Davis, Joshua B. Barnard
  • Patent number: 10089495
    Abstract: There is described a method of obfuscating access to a data store by a software application. The method comprises accessing the data store using access operations. The access operations comprise real access operations and dummy access operations. Each real access operation is operable to access the data store as part of the execution of the software application. There is also described a computer program which, when executed by a processor, causes the processor to carry out the above method. There is also described a computer readable medium storing the above computer program. There is also described a system configured to carry out the above method.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: October 2, 2018
    Assignee: IRDETO B.V.
    Inventors: Calin Ciordas, Fan Zhang
  • Patent number: 10082975
    Abstract: The present disclosure includes apparatuses and methods for obfuscation-enhanced memory encryption. An example method comprises performing a write operation, wherein the write operation includes transmitting a number of write transactions received from a host along with a number of spurious transactions to a memory, and wherein the number of spurious transactions are transmitted at a particular rate among the number of received write transactions.
    Type: Grant
    Filed: March 2, 2017
    Date of Patent: September 25, 2018
    Assignee: Micron Technology, Inc.
    Inventor: Jayarama N. Shenoy
  • Patent number: 10079673
    Abstract: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: September 18, 2018
    Assignee: Certicom Corp.
    Inventor: Daniel Richard L. Brown
  • Patent number: 10075291
    Abstract: Deduplication and compression evaluation methods and systems involve one or more processors obfuscating plain text file data in each file of a computer file system using a first cipher encryption scheme, obfuscating each plain text file name representing the plain text file data in each file of the computer file system using a second cipher encryption scheme, and associating each obfuscated file name representing the plain text file data of each of the plurality of files of the computer file system with the obfuscated file data of each of the plurality of files of the computer system. In addition, each plain text directory name for each of the obfuscated file names associated with the obfuscated file data in each of the plurality of files of the computer file system is obfuscated using a third cipher encryption scheme.
    Type: Grant
    Filed: December 2, 2015
    Date of Patent: September 11, 2018
    Assignee: CITIGROUP TECHNOLOGY, INC.
    Inventors: Donald Joseph Molaro, Stephen M. Hopkins, Chris Howarth
  • Patent number: 10075205
    Abstract: Provided is a technique to download and install a profile to a universal integrated circuit without receiving, from a network, an SMS for triggering reception of the profile. Specifically, a terminal according to the present invention comprises a communication unit configured to transmit and receive a signal; a control unit configured to create information for triggering reception of a profile; and a universal integrated circuit card configured to: access a profile management server and receive the profile based on the information using the communication unit, and install the received profile.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: September 11, 2018
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Duckey Lee, Jonghan Park
  • Patent number: 10069801
    Abstract: Systems and methods of computer network defense using Checksum-Security System (CSS) 10. An embodiment called Header Checksum Security System (HCSS) 22 uses header block checksum of a packet, and may be used in all routers or a subset of routers of a network. Another embodiment called Data Checksum Security System (DCSS) 24 used data block checksum pf a packet and may be used in the host computers. CSS uses randomization of the existing artifacts of a data packet, that of checksums of the packet. The randomization is able to substitute one value of the artifact with another identical value of the artifact, that is, one checksum is replaced by another checksum, where the replaced checksums have no relationship to the original checksums, they having been derived from a randomization process of the original checksum.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: September 4, 2018
    Inventor: Tara Chand Singhal
  • Patent number: 10061636
    Abstract: In a general aspect, a conversion scheme is used in a public key cryptosystem. In some aspects, an error vector derivation function is applied to a random value and a message value to produce an error vector. A plaintext value is generated based on the random value, the message value, and the error vector. The error vector and the plaintext value are used in an encryption function to produce a ciphertext component, and the ciphertext component is provided for transmission in a communication system.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: August 28, 2018
    Assignee: ISARA Corporation
    Inventors: Edward William Eaton, Atsushi Yamada, Kassem Kalach
  • Patent number: 10049207
    Abstract: A method of operating a storage system includes using the device driver to combine a password, the key salt, and the number of iterations to generate a primary key, using the device driver to generate a key schedule from the primary key, receiving an encrypted master key at the device driver, and using the device driver to decrypt the encrypted master key with the key schedule.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: August 14, 2018
    Assignee: Micron Technology, Inc.
    Inventors: Ahuja Gurmukhsingh Ramesh, Senthil Kumar Chellamuthu
  • Patent number: 10031795
    Abstract: In a general aspect, a conversion scheme is used in a public key cryptosystem. In some aspects, a plaintext value is generated based on a message value, a constant value, and a random value. An error vector derivation function is applied to the plaintext value to produce an error vector. The plaintext value and the error vector are used in an encryption function to produce a ciphertext component, and the ciphertext component is provided for transmission in a communication network.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: July 24, 2018
    Assignee: ISARA Corporation
    Inventors: Edward William Eaton, Atsushi Yamada, Kassem Kalach
  • Patent number: 10031723
    Abstract: Systems and methods for a random number generator including a systolic array to receive a plurality of first inputs, and to provide a random number output. In one embodiment, the systolic array can be arranged in two or greater dimensions, and each cell of the array comprises a ring oscillator. Data is read from a random access memory to provide the inputs to the systolic array. A linear feedback shift register receives the random number output as a feedback signal used to address the memory to read data to provide as the inputs to the systolic array.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: July 24, 2018
    Assignee: SECTURION SYSTEMS, INC.
    Inventor: Richard J. Takahashi
  • Patent number: 10027476
    Abstract: A method for generating a secret or a key in a network, the network including at least one first and one second member and a transmission channel between at least the first and the second members. The first and second members being able to place at least one first value and one second value on the transmission channel. The first member causes a first member value sequence and the second member causes a second member value sequence to be transmitted over the transmission channel largely synchronously with each other. The first member and the second member generate a shared secret or a shared key on the basis of information about the first member value sequence and the second member value sequence and on the basis of an overlap value sequence resulting from the overlap of the first member value sequence with the second member value sequence on the transmission channel.
    Type: Grant
    Filed: April 21, 2015
    Date of Patent: July 17, 2018
    Assignee: ROBERT BOSCH GMBH
    Inventor: Andreas Mueller
  • Patent number: 10019235
    Abstract: Random number generators include a thermal optical source and detector configured to produce random numbers based on quantum-optical intensity fluctuations. An optical flux is detected, and signals proportional to optical intensity and a delayed optical intensity are combined. The combined signals can be electrical signals or optical signals, and the optical source is selected so as to have low coherence over a predetermined range of delay times. Balanced optical detectors can be used to reduce common mode noise, and in some examples, the optical flux is directed to only one of a pair of balanced detectors.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: July 10, 2018
    Assignee: Los Alamos National Security, LLC
    Inventors: Jane Elizabeth Nordholt, Richard John Hughes, Raymond Thorson Newell, Charles Glen Peterson, Alexander Rosiewicz
  • Patent number: 9979686
    Abstract: Computer and communications systems and methods are provided in which a first computing system sends a second computing system a message and an associated deep-string and the second computing system applies a key of a cryptographic system or a one-way function to the deep-string to determine the deep-string's deep-string-depth. The second computing device then uses the determined deep-string-depth in determining subsequent behavior regarding the message. In some environments, a third computing device may generate and provide deep-strings of various deep-string-depths to the first computing device to ensure more favorable behavior of the second computing device.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: May 22, 2018
    Assignee: ELEMENTUM, LLC
    Inventor: Leonard M. Adleman
  • Patent number: 9973479
    Abstract: The present embodiments relate to a communication system, communication method, information processor, method, device, program, and recording medium which permit plural algorithms to be treated and which can impart expansibility to communications. A capability list stores a capability list in which capabilities regarding algorithms for encryption and decryption treated by a reader/writer are described. Similarly, a capability list stores a capability list in which capabilities regarding algorithms for encryption and decryption treated by an IC card are described. The reader/writer and the IC card exchange their mutual capability lists, select algorithms capable of securing a security level according to the importance of the data sent and received, and perform communications based on the selected algorithms. The present embodiments can be applied, for example, to a device that performs communications by the NFCIP method.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: May 15, 2018
    Assignee: SONY CORPORATION
    Inventor: Katsuyuki Teruyama
  • Patent number: 9916459
    Abstract: Methods, systems, and computer program products for encrypting photograph metadata are provided. An image file is received. The image file includes digital image data and a plurality of data fields. A first data field of the plurality of data fields includes a first metadata. A rule set for modifying the first metadata is received. In response to determining that at least one rule of the rule set corresponds to the first metadata, the first metadata is encrypted based to create a second metadata. The second metadata is stored in the image file.
    Type: Grant
    Filed: August 21, 2015
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Erik Rueger, Tim U. Scheideler, Matthias Seul, Thomas A. Snellgrove
  • Patent number: 9887834
    Abstract: Deduplication and compression evaluation methods and systems involve one or more processors generating a hash value for each block of data in a block storage device and creating a random substitution cypher using the respective hash values for each of said blocks of data as seed values to a random number generator. Thereafter, positions of run lengths for each of said blocks of data are randomly shuffled by the one or more processors with no run lengths having identical run length values disposed adjacent one another, a synthetic version of each of said blocks of data is generated using the substituted, shuffled, run lengths.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: February 6, 2018
    Assignee: CITIGROUP TECHNOLOGY, INC.
    Inventor: Donald Joseph Molaro
  • Patent number: 9870319
    Abstract: Data items to be stored in a queue are received, where the queue is distributed among a plurality of memory banks. The data items are distributed among the plurality of memory banks, including selecting memory banks in which to store the data items based on pseudorandom numbers generated for the data items, where the pseudorandom numbers are generated using a first pseudorandom number generator initialized with a first seed. Subsequently the data items are retrieved from the plurality of memory banks, including selecting memory banks from which to retrieve the data items based on the pseudorandom numbers regenerated for the data items, where the pseudorandom numbers are regenerated using a second pseudorandom number generator initialized with the first seed.
    Type: Grant
    Filed: April 4, 2016
    Date of Patent: January 16, 2018
    Assignee: Marvell Israel (M.I.S.L) Ltd.
    Inventors: Sharon Ulman, Roi Sherman, Dror Bromberg, Carmi Arad
  • Patent number: 9846727
    Abstract: A method, apparatus, and program product for generating check data for a location within an area of a workspace include receiving an identifier for a selected location that has check data associated therewith. Candidate check data for use with the selected location is generated. The candidate check data is evaluated for a match against at least one of existing check data for the selected location or check data associated with a related location. Based on the evaluation, a determination is made of whether the candidate check data is acceptable for use for the selected location.
    Type: Grant
    Filed: January 7, 2016
    Date of Patent: December 19, 2017
    Assignee: Vocollect, Inc.
    Inventors: James D. Maloy, Michael Kusar, Alexander Mracna, Venkatesh Narayan, Jeffrey Thorsen
  • Patent number: 9807063
    Abstract: A device (CD) is intended for controlling authenticity of a code received with a message by an electronic device (ED2) and resulting from application to this message of a bijective algorithm with at least one predetermined key. This device (CD) has i) a first computation means (CM1) arranged for applying partly this bijective algorithm with this predetermined key, from a starting step to a chosen intermediate step, to the received message, in order to get a first result, ii) a second computation means (CM2) arranged for applying partly in a reverse manner the bijective algorithm with the predetermined key, from an ending step to this chosen intermediate step, to the received code while using the received message, in order to get a second result, and iii) a comparison means (CM3) arranged for comparing these first and second results and for outputting an information representative of the authenticity of the received code when the first and second results are identical.
    Type: Grant
    Filed: November 12, 2013
    Date of Patent: October 31, 2017
    Assignee: GEMALTO SA
    Inventor: St├ęphanie Salgado
  • Patent number: 9806887
    Abstract: Data security is enhanced by computing an authentication tag based at least in part on encrypted data and additional authenticated data that includes at least a nonce. The computed authentication tag is compared against a provided authentication tag. The encrypted data is decrypted and made available for use.
    Type: Grant
    Filed: September 23, 2014
    Date of Patent: October 31, 2017
    Assignee: Amazon Technologies, Inc.
    Inventor: Matthew John Campagna
  • Patent number: 9800410
    Abstract: An improved method for data encryption has been developed. The method includes storing data, multiple prime numbers and random numbers within an electronic memory storage device. Next, calculating a public number using the multiple prime numbers and providing a public number to a recipient apparatus that has knowledge of the multiple prime numbers. The method then encrypts the stored data with a randomly generated key that is determined with elliptical curve cryptography (ECC) and deletes the randomly generated key after use. Next, the method calculates a common shared secret between the sender and recipient using the prime numbers, a recipient public number and the second random number. The sender and recipient calculate parameters using a key equation based on the randomly generated key and random numbers and a common shared secret.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: October 24, 2017
    Assignee: Key Holdings, LLC
    Inventors: Ray Clayton, Ronn W. Cochran
  • Patent number: 9798863
    Abstract: Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a network, a content server connected to the network and to a trusted system, a first device including a non-volatile memory that is connected to the network and a second device including a non-volatile memory that is connected to the network. In addition, the registration server is configured to provide the first device with a first set of activation information in a first format, the first device is configured to store the first set of activation information in non-volatile memory, the registration server is configured to provide the second device with a second set of activation information in a second format, and the second device is configured to store the second set of activation information in non-volatile memory.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: October 24, 2017
    Assignee: Sonic IP, Inc.
    Inventors: Eric William Grab, Chris Russell, Francis Yee-Dug Chan, Michael George Kiefer
  • Patent number: 9787475
    Abstract: Provided are a tag generation device, method and program which are capable of parallel execution, need no precomputation, and are capable of reducing block-cipher calls to the minimum necessary using one block cipher key when a tag to be attached to a message is generated.
    Type: Grant
    Filed: February 18, 2014
    Date of Patent: October 10, 2017
    Assignee: NEC CORPORATION
    Inventor: Kazuhiko Minematsu
  • Patent number: 9787474
    Abstract: There is provided an information processing device including a secret key generator that generates a secret key from a random number received from an external device that provides a service, and a given value, a public key generator that generates a public key on the basis of the secret key by using a function identically set in a plurality of the services, a transmitter that transmits the public key to the external device, and an authentication processor that conducts authentication with the external device using the secret key.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: October 10, 2017
    Assignee: SONY CORPORATION
    Inventors: Seiichi Matsuda, Koichi Sakumoto
  • Patent number: 9778912
    Abstract: A system, method, and device for stochastically processing data. There is an architect module operating on a processor configured to manage and control stochastic processing of data, a non-deterministic data pool module configured to provide a stream of non-deterministic values that are not derived from a function, a plurality of functionally equivalent data processing modules each configured to stochastically process data as called upon by the architect module, a data feed configured to feed a data set desired to be stochastically processed, and a structure memory module including a memory storage device and configured to provide sufficient information for the architect module to duplicate a predefined processing architecture and to record a utilized processing architecture.
    Type: Grant
    Filed: May 29, 2012
    Date of Patent: October 3, 2017
    Assignee: CASSY HOLDINGS LLC
    Inventor: Patrick D. Ross
  • Patent number: 9735963
    Abstract: A private key is held which conforms to an ElGamal encryption system on a semigroup, calculation of an order of an element of the semigroup being computationally difficult, information corresponding to ciphertext conforming to the ElGamal encryption system is input, a private key s is used to decrypt the information corresponding to the ciphertext in conformance to the ElGamal encryption system, and information corresponding to a result of decrypting the ciphertext is obtained and output. Alternatively, whether it is computationally difficult or easy to calculate the order of the element of the semigroup is determined, and the safety of a decryption service providing device is evaluated based on the determination result.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: August 15, 2017
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Tetsutaro Kobayashi, Go Yamamoto, Hitoshi Fuji, Tomohide Yamamoto, Reo Yoshida
  • Patent number: 9727310
    Abstract: An entropy source extracts noise associated with the sampling of an RC circuit. The decay time of the RC circuit and other parameters are selected so that a buffer used to sample the voltage remains in an indeterminate voltage region over multiple clock cycles to generate random transitions. The entropy source may be implemented to be compliant with government standards for entropy sources utilized to generate random numbers.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: August 8, 2017
    Assignee: Toshiba Corporation
    Inventor: Julien C. R. Margetts
  • Patent number: 9686404
    Abstract: Devices and methods include communication devices and network devices configured to automatically connect to each other over a password protected network connection without a user setting the password for the password protected network connection. The communication devices may communicate over the password protected network connection to the network device and further to a communication service for providing interpretive services for hearing-impaired users, such as text captions, during a call. Predetermined network names and associated passwords may be persistent prior to set up as well as after a hard reset in which other user defined settings may be erased.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: June 20, 2017
    Assignee: SORENSON IP HOLDINGS, LLC
    Inventor: Jasper Pan
  • Patent number: 9680643
    Abstract: A system for securely transmitting data includes a control device and at least one security module. The control device is configured for producing a cryptographic key using a physically unclonable function (PUF). The at least one security module is configured for communicating with the control device at least one of confidentially and authentically using the cryptographic key. The control device has no storage for storing the cryptographic key. The control device includes at least one hardware device that is configured for providing a specific feature combination. The control device also includes a calculation unit that is configured for producing the cryptographic key using the specific feature combination and the physically unclonable function (PUF).
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: June 13, 2017
    Assignee: Siemens Aktiengesellschaft
    Inventor: Bernd Meyer
  • Patent number: 9658832
    Abstract: Systems and methods for multi-factor entropy sourcing for random number generators. An example method may comprise: identifying, by a processing device, a plurality of entropy sources; receiving random bits from each of the plurality of entropy sources; identifying a minimum number of bits among numbers of bits received from each of two or more entropy sources of the plurality of entropy sources; mixing, into an entropy pool, at least the identified minimum number of bits received from each entropy source of two or more entropy sources; and increasing a size of the entropy pool by the identified minimum number of bits.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: May 23, 2017
    Assignee: Red Hat Israel, Ltd.
    Inventor: Michael Tsirkin
  • Patent number: 9651906
    Abstract: An image forming apparatus, which is provided with a display device including a plurality of segments, registers a number having digits larger than the digits that can be displayed on the display device as a specific symbol other than numbers from 0 to 9 to be displayed on the display device including the plurality of segments, and controls the display device including the plurality of segments to display the registered arbitrary number when the display device including the plurality of segments is instructed to display the specific symbol.
    Type: Grant
    Filed: May 16, 2012
    Date of Patent: May 16, 2017
    Assignee: Canon Kabushiki Kaisha
    Inventor: Masumi Tabuki
  • Patent number: 9634838
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include defining multiple primitives, each primitive including ranking and unranking methods. Two or more of the multiple primitives are selected, and an operation is performed on the selected primitives, thereby defining a complex format. Upon and encryption processor receiving a data record comprising a plaintext, the complex format is applied to the plaintext, thereby generating a ciphertext, and the ciphertext is transmitted to a remote computer. Upon receiving the ciphertext, the remote computer can apply the complex format to the received ciphertext, thereby regenerating the plaintext.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: April 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Boris Rozenberg, Mor Weiss
  • Patent number: 9628271
    Abstract: A method and arrangement is disclosed for managing session keys for secure communication between a first and at least a second user device in a communications network. The method is characterized being independent of what type of credential each user device implements for security operations. A first user receives from a first key management server keying information and a voucher and generates a first session key. The voucher is forwarded to at least a responding user device that, with support from a second key management server communicating with the first key management server, resolves the voucher and determines a second session keys. First and second session keys are, thereafter, used for secure communication. In one embodiment the communication traverses an intermediary whereby first and second session keys protect communication with respective leg to intermediary.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: April 18, 2017
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Rolf Blom, Yi Cheng, Fredrik Lindholm, John Mattsson, Mats Naslund, Karl Norrman
  • Patent number: 9621552
    Abstract: Computer and communications systems and methods are provided in which a first computing system sends a second computing system a message and an associated deep-string and the second computing system applies a key of a cryptographic system or a one-way function to the deep-string to determine the deep-string's deep-string-depth. The second computing device then uses the determined deep-string-depth in determining subsequent behavior regarding the message. In some environments, a third computing device may generate and provide deep-strings of various deep-string-depths to the first computing device to ensure more favorable behavior of the second computing device.
    Type: Grant
    Filed: December 24, 2014
    Date of Patent: April 11, 2017
    Assignee: ELEMENTUM, LLC
    Inventor: Leonard M. Adleman
  • Patent number: 9588751
    Abstract: A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: March 7, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Kristofer Reierson, Feroz Gora, Charles Kossi Kekeh, Peter A. Morgan, Joseph W. Rovine, John M. Sheehan, Lidiya Vikhlyayeva
  • Patent number: 9589143
    Abstract: A system and method provide for shared access to a database in a semi-trusted platform. In the method, for each of a set of users, provision is made for regenerating a respective user key, based on a respective predefined user input, such as a hashed password. One or more of the users is authorized to have access to an encrypted database. For each of these, the method includes encrypting a key for the encrypted database with the respective user's user key to generate an encrypted database key. During a user session, one of the authorized users is provided with access to the encrypted database by decrypting the database key from the encrypted database key with the respective user's user key, and decrypting the database, from the encrypted database, with the database key. The database key and each user's user key are not stored on the platform and are thus inaccessible to platform administrators and unauthorized users between user sessions.
    Type: Grant
    Filed: April 17, 2014
    Date of Patent: March 7, 2017
    Assignee: XEROX CORPORATION
    Inventors: Saghar Estehghari, Nicolas Guerin, Nicolas Monet
  • Patent number: 9576154
    Abstract: An embodiment of a method of operating a storage system includes combining a password, a first number, and a number of iterations to produce a first key, encrypting the first key, receiving a second number, and encrypting the second number with the first key to produce an encrypted second key.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: February 21, 2017
    Assignee: Micron Technology, Inc.
    Inventors: Ahuja Gurmukhsingh Ramesh, Senthil Kumar Chellamutha
  • Patent number: 9507566
    Abstract: In one embodiment, a method generates first entropy using a true random number generator in a management computer configured to manage a main computer in a computing device. The main computer controls a set of physical nodes including a set of services running in a set of virtual machines. The method then provides the first entropy to the main computer and the first entropy is combined with second entropy generated by the main computer to generate third entropy. The third entropy is provided to the set of physical nodes where the set of virtual machines access the third entropy via a hypervisor.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: November 29, 2016
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Bryan Payne, Matthew Garrett
  • Patent number: 9495111
    Abstract: A system and method includes a processing unit connected with a memory, the processing unit configured to access data from the memory. A memory transaction unit is added between the processing unit and the memory. The memory transaction unit is configured to perform dummy read- and write-operations at random memory locations at random times and/or insert random delays before real accesses by the processing unit from the memory.
    Type: Grant
    Filed: October 10, 2014
    Date of Patent: November 15, 2016
    Assignee: THE BOEING COMPANY
    Inventors: Laszlo Hars, Jeffery Hammond
  • Patent number: 9483664
    Abstract: Encryption of data within a memory 6 is provided by key generation circuitry 12 which serves to generate a key as a function of the address within the memory 6 being accessed and then encryption circuitry 14 or decryption circuitry 16 which serve respectively to encrypt or decrypt the data as a function of the key that has been generated based upon the address. The encryption and the decryption may be performed using a bitwise XOR operation. The key generation circuitry may have the form of physically unclonable function circuitry, which varies from instance to instance of implementation and that operates to generate the same key for the same address upon both write and read operations within the same instance.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: November 1, 2016
    Assignee: ARM Limited
    Inventors: Vikas Chandra, Robert Campbell Aitken