Nonlinear (e.g., Pseudorandom) Patents (Class 380/46)
  • Patent number: 11032503
    Abstract: A seed value of a random number is generated in a more preferable manner by utilizing characteristics of a solid-state imaging device. A solid-state imaging device includes a pixel array unit in which a plurality of pixels is arrayed, and a processing unit that generates a seed value of a random number on the basis of each pixel value of predetermined one or more target pixels of the plurality of pixels, in which the pixel array unit is arranged on a first substrate, the processing unit is arranged on a second substrate, and a plurality of substrates including at least the first substrate and the second substrate is stacked so that the second substrate is located in a lower layer than the first substrate.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: June 8, 2021
    Assignee: SONY SEMICONDUCTOR SOLUTIONS CORPORATION
    Inventor: Isao Ohdaira
  • Patent number: 11018857
    Abstract: The present invention discloses a method for computing a secret value including a first secret using a function including an operation, comprising: computing, by a host, a first encrypted value of the first secret with a first key; sending, by the host, the first encrypted value to a value holder and the first key to a key holder, wherein the value holder and the key holder are independently trusted by the host; computing, by the value holder, a computed encrypted value from the first encrypted value using the function; and computing, by the key holder, a computed key from the first key using the function.
    Type: Grant
    Filed: January 16, 2018
    Date of Patent: May 25, 2021
    Assignee: ABB Schweiz AG
    Inventors: Johannes Schneider, Matus Harvan, Roman Schlegel, Sebastian Obermeier, Thomas Locher
  • Patent number: 11003799
    Abstract: System and method for integrity assurance in a virtual environment are provided. The system includes a memory. The memory is configured to receive and store one or more artifacts. The system also includes a processing subsystem operatively coupled to the memory. The processing subsystem is configured to create one or more binary files for a stored one or more artifacts. The processing subsystem is also configured to incorporate the one or more artifacts into a blockchain platform. The processing subsystem is further configured to request the blockchain platform to trigger a crypto sealing process for the one or more artifacts. The processing subsystem is further configured to copy one or more crypto sealed artifacts to a repository. The processing subsystem is further configured to request the blockchain to trigger a verification process to one or more copied artifacts for integrity assurance.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: May 11, 2021
    Assignee: Marlabs Innovations Private Limited
    Inventors: Sreejith Gireesan, Balasubramanian K Pethayapera, Bimal Mankara Balan
  • Patent number: 10990356
    Abstract: An access restriction system having a true random number generator (TRNG) to generate true random keys based on quantum-level physical properties and hub computer to provide those keys. An access-restricted component executes one or more tasks in response to receiving a verified task instruction. A component computer associated with the access-restricted component receives true random keys from the hub computer and stores the keys to a memory. A controller provides a task request to the component computer that includes a task instruction paired with a key. The component computer then verifies the task instruction by comparing and ensuring that the true random key stored to the memory matches the key received from the controller with the task request and then provides the verified task to the access-restricted component. The access-restricted component then carries out the verified task instruction.
    Type: Grant
    Filed: August 20, 2020
    Date of Patent: April 27, 2021
    Assignee: Quantum Lock Technologies LLC
    Inventor: Erica Grant
  • Patent number: 10983785
    Abstract: Information about firmware modules for a power unit (e.g., a battery backup unit or a power supply unit) can be downloaded, along with the firmware modules themselves. The firmware modules, which may constitute less than a complete firmware re-flash, can be used to update firmware of the power unit from a first version type to a second version type.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: April 20, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: David Edward Bryan, Ligong Wang
  • Patent number: 10972251
    Abstract: Systems and methods for end-to-end encryption of a web browsing process are described herein. A web query is encrypted at a client using a homomorphic encryption scheme. The encrypted query is sent to a server where the encrypted query is evaluated over web content to generate an encrypted response without decrypting the encrypted query and without decrypting the response. The encrypted response is sent to the client where it is decrypted to obtain the results of the query without revealing the query or results to the owner of the web content, an observer, or an attacker.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: April 6, 2021
    Assignee: Enveil, Inc.
    Inventor: Ryan Carr
  • Patent number: 10937510
    Abstract: A method for identifying cell coupling in a memory system includes generating a two-dimensional pseudorandom binary sequence array. The method also includes performing an erase operation on a plurality of cells of a memory block of the memory system. The method also includes performing a write operation on the plurality of cells using the two-dimensional pseudorandom binary sequence array. The method also includes performing a read operation on the plurality of cells to identify a voltage value for each cell of the plurality of cells. The method also includes identifying cell coupling between respective cells of the plurality of cells using the voltage value for each of the cells of the plurality of cells.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: March 2, 2021
    Assignee: Western Digital Technologies, Inc.
    Inventors: Richard Galbraith, Jonas Goode, Henry Yip, Ravi Kumar, Niranjay Ravindran
  • Patent number: 10929103
    Abstract: Multiple random numbers are generated. The multiple random numbers are N different random numbers. N is a positive integer. Generating the multiple random numbers includes generating a random number array including N storage units. The multiple random numbers are shuffled. A random number obtaining instruction is received. A random number is obtained from the multiple random numbers based on the random number obtaining instruction.
    Type: Grant
    Filed: June 19, 2020
    Date of Patent: February 23, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Jiaxiang Wen
  • Patent number: 10924303
    Abstract: A secure training sequence (STS) is included in wireless packets communicated between electronic devices to assist with channel estimation and wireless ranging. The STS includes multiple STS segments generated based on outputs from a cryptographically secure pseudo-random number generator (CSPRNG), the STS segments being separated by guard intervals and formatted in accordance with an 802.15.4 data symbol format that uses burst position modulation (BPM) and binary phase shift keying (BPSK) to map bits from the CSPRNG to burst positions and pulse polarities for the STS symbols. Both a first electronic device, which generates the STS, and a second electronic device, which estimates a communication channel using the STS, have prior private knowledge of cryptographic keys required to generate a non-repetitive single-use pseudo-random (PR) sequence by the CSPRNG. The STS includes two burst position intervals per STS symbol and two possible burst positions within each burst position interval.
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: February 16, 2021
    Assignee: Apple Inc.
    Inventors: Anuj Batra, Joachim S. Hammerschmidt, Eren Sasoglu
  • Patent number: 10862680
    Abstract: In embodiments, an apparatus for microcontroller (?C) or system-on-chip (SoC) computing includes a set of fuses disposed in a ?C or a SoC to store a seed value and M pairs of loop counter values (LCVs) with which to locally generate M private keys from the seed value on the microcontroller or SoC, where M is a positive integer, each private key to decrypt data encrypted with a pre-defined public key cryptosystem, wherein each private key includes two prime numbers p and q (p,q), the LCVs being a number of iterations of a key derivation function (KDF) needed to respectively obtain p and q from the seed value; and a key decoder, disposed in the (?C) or the SoC, and coupled to the set of fuses, to read the seed value and the M pairs of LCVs, and, for each of the M private keys to: respectively generate (p,q) from the seed value by respectively iterating the KDF by the LCVs for that key.
    Type: Grant
    Filed: September 26, 2018
    Date of Patent: December 8, 2020
    Assignee: Intel Corporation
    Inventors: Daniel Nemiroff, Xiaoyu Ruan, William Stevens, Jr.
  • Patent number: 10855440
    Abstract: The present application describes a method, system, and non-transitory computer-readable medium for generating new keys during a secure communication session. A key derivation function is operatively connected to both a counter and a memory. The key derivation function generates new key material from a first input and a second input in response to a signal provided by the counter. The key derivation function generates the new key material and outputs it to the memory.
    Type: Grant
    Filed: November 8, 2017
    Date of Patent: December 1, 2020
    Assignee: Wickr Inc.
    Inventors: Joël Alwen, Thomas Michael Leavy
  • Patent number: 10833870
    Abstract: Examples of the present disclosure describe systems and methods for performing cryptographic operations in an isolated collection. In an example, a user may have an associated user resource within the isolated collection, which may be associated with a cryptographic key. Other users may access the user's key from a known location to manually or automatically perform one or more cryptographic operations. In another example, a key may be generated when initiating a group conversation. The key may be encrypted for and provided to each participant using each participant's public key. Each participant may then use the cryptographic key during the conversation. A new participant may receive authorization to join the conversation from an existing participant, wherein the encrypted key of the existing participant may be decrypted and re-encrypted using the new participant's public key. The new participant may then use the re-encrypted key to participate in the conversation.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: November 10, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Christopher L. Mullins
  • Patent number: 10826922
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Grant
    Filed: November 11, 2019
    Date of Patent: November 3, 2020
    Assignee: General Electric Company
    Inventors: Lalit Keshav Mestha, Hema Kumari Achanta, Justin Varkey John, Cody Joe Bushey
  • Patent number: 10785025
    Abstract: Presented herein are techniques for synchronizing a cloud service and a key management service via a single indirect synchronous message sent by a client device. In particular, a cloud service receives a service request message sent by a client device. Embedded into the service request message is an encrypted key management message. The cloud service is configured to extract the encrypted key management message from the service request message and then send the encrypted key management message to the key management service.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: September 22, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Matthew A. Miller, Andrew Biggs, Bo Zou, Panos Kozanian
  • Patent number: 10769625
    Abstract: Dynamically generated quick response (QR) codes are used for secure communication to/from mobile devices. In one example, a QR code identifies a product or service selected by a user using a mobile device. The mobile device generates the QR code identifying the user's selection, and displays the QR code for reading by a retail kiosk. The retail kiosk, such as movie-rental kiosk, extracts the product or service selection encoded in QR code and provides the identified product or service to the user. The QR code can additionally identify a user account, such that payment for the product or service is automatically charged to the account identified from the QR code. In another example, the QR code is used to transfer money and/or credits between a user and a retailer, or between two users.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: September 8, 2020
    Assignee: CELLCO PARTNERSHIP
    Inventors: Vijayakumar Pandiarajan, William Dakota Commons, Siva Patnam, Jayant Ghoshal, Ramakrishna Kannamangalam
  • Patent number: 10753438
    Abstract: A lifting drive device for a Z-axis spindle inserted into a guide tube and guided via an air layer including: a wire extending upward from the inside of the Z-axis spindle and having its upper end supported by the guide tube, a piston connected to an lower end of the wire, a cylinder that moves up-and-down relative to the piston by an air supplied to a cylinder chamber provided to the Z-axis spindle and partitioned by the piston, a driving roller provided to the guide tube and in contact with the surface of the Z-axis spindle, and a motor for driving the driving roller, so as to achieve highly precise linear movement and swift lifting of the Z-axis spindle guided by an air bearing and to be suitable for structural simplification, weight reduction and vibration countermeasures.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: August 25, 2020
    Assignee: MITUTOYO CORPORATION
    Inventors: Yoshiharu Kimura, Yoshikazu Ooyama, Kazuaki Kawarai
  • Patent number: 10728022
    Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: July 28, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Patent number: 10708048
    Abstract: Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: July 7, 2020
    Assignee: Intel Corporation
    Inventors: Emily H. Qi, Jesse R. Walker, Robert J. Stacey, Herbert Liondas, Marc Jalfon
  • Patent number: 10708043
    Abstract: Perfect secrecy can only be assumed if the length of the key is as long the message sent and the cardinality of the key space is the same as that of the message. The preferred embodiment will demonstrate how to implement a one-pad communication system between a transmitter and a receiver where only a few parameters need to be transferred to the receiver. The preferred embodiment will also demonstrate that a true random number will be generated and used. In an M-sequence LFSR, the integers N+K=M will be used. 2N will be the number of random number runs and 2K will be the quantity of random numbers generated during the runs. The formula is: (2N?1)*(2K)+(2K?1).
    Type: Grant
    Filed: March 7, 2013
    Date of Patent: July 7, 2020
    Inventor: David Mayer Hutchinson
  • Patent number: 10691415
    Abstract: Multiple random numbers are generated. The multiple random numbers are N different random numbers. N is a positive integer. Generating the multiple random numbers includes generating a random number array including N storage units. The multiple random numbers are shuffled. A random number obtaining instruction is received. A random number is obtained from the multiple random numbers based on the random number obtaining instruction.
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: June 23, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Jiaxiang Wen
  • Patent number: 10693659
    Abstract: A generator device being configured for generating pseudo random numbers, the generator device comprising a computing device operable for (i) calculating a first hash chain from an initial hash value (H_0), the first hash chain comprising a first sequence of M hash values (HA_1, HA_2, . . . , HA_M); (ii) calculating a second hash chain (20) comprising a second sequence of M hash values (HB_1, HB_2, . . . , HB_M) from the initial hash value (H_0) and the hash values (HA_1, HA_2, . . . , HA_M) of the first sequence; and (iii) determining the pseudo random numbers from the hash values (HB_1, HB_2, . . . , HB_M) of the second sequence. Also disclosed are a method for generating pseudo random numbers and a method for quantum computing secure authentication, as well as a computer program product and a data processing system.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: June 23, 2020
    Assignee: International Business Machines Corporation
    Inventor: Tobias U. Bergmann
  • Patent number: 10659224
    Abstract: An apparatus and method for performing operation being secure against side channel attack are provided. The apparatus and method generate values equal to values obtained through an exponentiation operation or a scalar multiplication operation of a point using values extracted from previously generated parameter candidate value sets and an operation secure against side-channel attack, thereby improving security against side-channel attack without degrading performance.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: May 19, 2020
    Assignee: SAMSUNG SDS CO., LTD.
    Inventors: Kyu-Young Choi, Duk-Jae Moon, Hyo-Jin Yoon, Ji-Hoon Cho
  • Patent number: 10613833
    Abstract: The present relates to invention deals with an execution unit configured to execute a computer program instruction to generate random numbers based on a predetermined probability distribution. The execution unit comprises a hardware pseudorandom number generator configured to generate at least randomised bit string on execution of the instruction and adding circuitry which is configured to receive a number of bit sequences of a predetermined bit length selected from the randomised bit string and to sum them to produce a result.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: April 7, 2020
    Assignee: Graphcore Limited
    Inventors: Stephen Felix, Godfrey Da Costa
  • Patent number: 10616191
    Abstract: Information is removed from data transmitted over networks and stored in data storage facilities by generating non-informational data as an output from a series of nodes (routers, computing devices or logical routing applications) by using a function that applies random data to the data received at each node. The function may be an XOR and the random data may be a pseudorandom string of the same length as the informational data. The non-informational data may be managed normally without concern for security. When the informational data is needed it can be re-generated using the non-informational data and a cascade of the random data from the series of nodes as inputs to an inverse function (XOR is its own inverse). The random data may be generated from a smaller random seed.
    Type: Grant
    Filed: April 5, 2017
    Date of Patent: April 7, 2020
    Assignee: TFOR LLC
    Inventor: David von Vistauxx
  • Patent number: 10594473
    Abstract: A database server stores encrypted vector data in which each of a plurality of elements is encrypted by encryption maintaining semi-homomorphism between calculation before encryption and calculation after encryption. The database server receives an obfuscated query (N-randomized query) from a terminal device, performs calculation for each of a plurality of segments of vectors of the obfuscated query with a segment of the encrypted vector data, and transmits the calculation to the terminal device in reply. The terminal device may acquire a result of decryption calculation transmitted in reply by a decryption device.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: March 17, 2020
    Assignee: KABUSHIKIKAISHA RNAi
    Inventors: Tomoyuki Yamada, Masahiro Hattori
  • Patent number: 10574698
    Abstract: Systems and methods are provided for configuring and deploying decoy content over a network. The methods generate decoy content, including identifying information, based on information about network traffic in a virtual network associated with a user. Cause the decoy content to be sent in the virtual network. Determine, based at least in part on the identifying information, that at least the portion of the decoy content was used. In response to determining that the portion of the decoy content was used, alert the user that the decoy content was used.
    Type: Grant
    Filed: September 1, 2017
    Date of Patent: February 25, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventor: Nima Sharifi Mehr
  • Patent number: 10567169
    Abstract: An apparatus and method for multi-user quantum key distribution. The method for multi-user quantum key distribution is performed using a multi-user quantum key distribution apparatus and a quantum key client device, and includes generating, by the multi-user quantum key distribution apparatus, transmission qubit pairs based on a key bit string of a shared key to be distributed to the quantum key client device, measuring, by the quantum key client device, the transmission qubit pairs, received from the multi-user quantum key distribution apparatus through a quantum channel, based on a measurement basis, verifying security of the quantum channel using the transmission qubit pairs, and if the security has been verified, decoding qubit measurement values of the transmission qubit pairs into the shared key.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: February 18, 2020
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Changho Hong, Nayoung Kim, Osung Kwon, Younchang Jeong, Haeng-Seok Ko, Jingak Jang, Daesung Kwon
  • Patent number: 10567162
    Abstract: The present disclosure discloses a mask S-box, a block ciphers algorithm unit, a device and a corresponding construction method. The mask S-box includes an input module, an address mapping processing module, and an output module. The input module receives a random number and an input data which is masked by the random number and uses the random number and the input data as two inputs of the mask S-box. The address mapping processing module performs one-to-one mapping on the two inputs and the corresponding memory address of the mask S-box. The output module linearly processes the random number by using a linear function to obtain the linearly converted random number, which is used as one output of the mask S-box. The memory address obtained by using the linearly converted random number to mask the output of the original S-box is used as the other output of the mask S-box.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: February 18, 2020
    Assignee: SHENZHEN STATE MICRO TECHNOLOGY CO LTD
    Inventors: Liangqing Wang, Songliang Yu, Ruocan Wang
  • Patent number: 10552623
    Abstract: Non-informational data D is generated as an output using a non-informational data E and informational data as inputs to a function on a computing device in an information-restricted domain. The function may be an XOR and the non-informational data E may be a pseudorandom string of the same length as the informational data. The non-informational data D is moved to an unrestricted domain where it may be managed normally. When the informational data is needed it can be re-generated using the non-informational data D and non-informational data E as inputs to an inverse function (XOR is its own inverse). The non-informational data E may be generated from a smaller random seed.
    Type: Grant
    Filed: January 28, 2016
    Date of Patent: February 4, 2020
    Inventor: David von Vistauxx
  • Patent number: 10554399
    Abstract: A method, system, and computer program product encrypt data. A processor(s) obtains plaintext (plaintext data) and randomly generates multiple seed keys and obtains a user-defined password. The processor(s) randomly generates encryption parameters (pattern indicators, end pointers, pattern indicator pointers, and component sizes) and encrypts the plaintext by converting the plaintext data to shuffle-transform encrypted text and generating, from the shuffle-transform encrypted text and based on the encryption parameters, a plurality of encrypted blocks. The processor(s) implements a dynamic mathematical offset, to a portion of mathematical functions underlying the encryption parameters. The processor(s) generates an encrypted chunk for each encrypted block of the plurality of encrypted blocks, wherein the encrypted chunk for each encrypted block contains a portion of the shuffle-transform encrypted text.
    Type: Grant
    Filed: May 12, 2017
    Date of Patent: February 4, 2020
    Assignee: Audacious Designs, LLC
    Inventor: Raymond Richard Feliciano
  • Patent number: 10528940
    Abstract: A smart card (1) interfaces with a smart card reader (2) to generate an authentication message (PSRQ), which is sent to a PIN servicing centre (5, 6). If the authentication message (PSRQ) is validated by the PIN servicing centre (5, 6), a validation response message (PSRS) is sent back to the user (3). The user (3) enters the validation response message (PSRS) on the reader (2), which authenticates the validation response message (PSRS) with the smart card (1); the PIN servicing function may then be performed. The smart card cryptographic messages are generated internally and solely by the smart card (1)—the reader (2) acts merely as an input mechanism into the smart card (1) or as an output mechanism from the smart card (1) to the display (10). The reader (2), therefore, does not need to contain any customer information or be personalised by the card issuer.
    Type: Grant
    Filed: February 19, 2007
    Date of Patent: January 7, 2020
    Assignee: BARCLAYS EXECUTION SERVICES LIMITED
    Inventor: David Taylor
  • Patent number: 10515242
    Abstract: In one aspect of the present disclosure, a method is disclosed. The method involves: a reader detecting an eye-mountable device within a wireless communication range of the reader, wherein the eye-mountable device includes a transparent material having a concave mounting surface configured to be removably mounted on a corneal surface; wirelessly retrieving from the detected eye-mountable device a first set of data; using the retrieved first set of data to determine that a condition has been satisfied; and responsive to using the retrieved first set of data to determine that the condition has been satisfied, retrieving from the detected eye-mountable device a second set of data.
    Type: Grant
    Filed: June 27, 2018
    Date of Patent: December 24, 2019
    Assignee: VERILY LIFE SCIENCES LLC
    Inventors: Brian Otis, Daniel James Yeager, William Biederman
  • Patent number: 10499219
    Abstract: An information sharing system includes a server and an in-vehicle system. The server includes: a first storage part; a first key generation part configured to generate a first private key and a first public key, if keys can be exchanged with the in-vehicle system; and a signature generation part configured to generate a signature value of the first public key using a server private key. The in-vehicle system includes: a second storage part configured to store a public key certificate including a server public key; a signature verification part configured to verify the first public key and a signature value received from the server, using a public key certificate; and a second key generation part configured to generate a second private key and a second public key, if a combination of the first public key and the signature value is correct as a result of the verification.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: December 3, 2019
    Assignee: Hitachi, Ltd.
    Inventors: Kota Ideguchi, Eriko Ando, Makoto Kayashima
  • Patent number: 10481872
    Abstract: Various aspects of the subject technology relate to systems, methods, and non-transitory machine-readable medium for generating random numbers are disclosed herein. Entropic data is collected from a computer system and the entropic data is stored as raw data in an assigned entropy pool. The entropic data is encrypted using a globally incrementing counter as an encryption key and the encrypted bytes are returned as a random number.
    Type: Grant
    Filed: August 29, 2017
    Date of Patent: November 19, 2019
    Assignee: Colossio, Inc.
    Inventor: Joseph A. Jaroch
  • Patent number: 10482037
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: November 19, 2019
    Assignee: Georgetown University
    Inventor: Thomas Clay Shields
  • Patent number: 10476887
    Abstract: Methods and systems for tag-based identification include reading a counterfeit-proof identification tag using a sensor in a user device. Features of the identification tag are extracted in accordance with a feature extraction function, using a processor, to generate a tag bit sequence. A challenge function is applied to the extracted features to generate a result. The result is transmitted to a remote server to authenticate the identification tag.
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: November 12, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jean-Olivier Plouchart, Wendy Chong, Alberto Valdes Garcia, Petros Zerfos
  • Patent number: 10461938
    Abstract: A method and a device for manipulation protection, including receiving a first data packet sent from a first device by a second device, the first data packet including a first time-variant parameter; signing a concatenation of a first hash value with the first time-variant parameter and an identification of the second device with the aid of a private key of an asymmetric encryption method which is assigned to the second device, program instructions or data, which are stored on the second device and provided to be carried out during the operation of the second device, being used to determine the hash value; generating a second data packet including the signature and the concatenation; and sending the second data packet from the second device to the first device.
    Type: Grant
    Filed: February 17, 2016
    Date of Patent: October 29, 2019
    Assignee: Robert Bosch GmbH
    Inventors: Jamshid Shokrollahi, Jan Zibuschka
  • Patent number: 10462110
    Abstract: In one embodiment, an apparatus includes: a device having a physically unclonable function (PUF) circuit including a plurality of PUF cells to generate a PUF sample responsive to at least one control signal; a controller coupled to the device, the controller to send the at least one control signal to the PUF circuit and to receive a plurality of PUF samples from the PUF circuit; a buffer having a plurality of entries each to store at least one of the plurality of PUF samples; and a filter to filter the plurality of PUF samples to output a filtered value, wherein the controller is to generate a unique identifier for the device based at least in part on the filtered value. Other embodiments are described and claimed.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: October 29, 2019
    Assignee: Intel Corporation
    Inventors: Simon N. Peffers, Sean M. Gulley, Vinodh Gopal, Sanu K. Mathew
  • Patent number: 10412068
    Abstract: Techniques are disclosed relating to signing and authentication of network messages such as API calls. A server system and a client system may collaboratively establish a shared secret key, which is then usable to sign such messages. These techniques may be useful in various situations, such as for integrations between different systems.
    Type: Grant
    Filed: December 7, 2015
    Date of Patent: September 10, 2019
    Assignee: salesforce.com, inc.
    Inventor: Prasad Peddada
  • Patent number: 10410018
    Abstract: A data integrity system generates a transaction signature associated with a transaction based on transaction data received from a data producer. The transaction signature is unique to the transaction and is generated by applying a hash function to the transaction data. When the transaction data is to be transmitted to a data consumer, the data integrity system redacts the transaction data based on permission information associated with the data consumer and transmits the redacted transaction data to the data consumer. To enable the data consumer to verify the integrity of the received data, the data integrity system also transmits a cryptographic assurance that includes at least the transaction signature associated with the transaction. The data consumer verifies the integrity of the received data by independently generating a transaction signature based on the redacted transaction data and matching the independently generated signature with the transaction signature in the cryptographic assurance.
    Type: Grant
    Filed: June 17, 2016
    Date of Patent: September 10, 2019
    Assignee: PeerNova, Inc.
    Inventors: Gangesh Kumar Ganesan, David John Hudson, Kevin Michael Gee
  • Patent number: 10394526
    Abstract: Provided are a true random number generator and an oscillator. The random number generator includes an oscillator configured to output signals and oscillate a random number of times until phases of the signals being output are inverted with respect to each other after initialization, and a counter configured to count the number of oscillations. The counted number of oscillations is used as a seed for generating a random number.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: August 27, 2019
    Assignee: POSTECH ACADEMY-INDUSTRY FOUNDATION
    Inventors: Eunhwan Kim, Jae-Joon Kim
  • Patent number: 10367657
    Abstract: Example implementations relate to a bridge port extender. For example, a bridge port extender may include a processor. The processor may receive an Ethernet frame from a network bridge, where the Ethernet frame includes an encapsulated portion and an unencapsulated portion, and where the unencapsulated portion includes an E-tag. The processor may remove the E-tag from the unencapsulated portion to form a modified Ethernet frame. The processor may transmit the modified Ethernet frame to a client device based on the E-tag.
    Type: Grant
    Filed: November 4, 2014
    Date of Patent: July 30, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Mark Allen Gravel
  • Patent number: 10354063
    Abstract: A method of protecting a modular calculation on a first number and a second number, executed by an electronic circuit, including the steps of: combining the second number with a third number to obtain a fourth number; executing the modular calculation on the first and fourth numbers, the result being contained in a first register or memory location; initializing a second register or memory location to the value of the first register or to one; and successively, for each bit at state 1 of the third number: if the corresponding bit of the fourth number is at state 1, multiplying the content of the second register or memory location by the inverse of the first number and placing the result in the first register or memory location, if the corresponding bit of the fourth number is at state 0, multiplying the content of the second register or memory location by the first number and placing the result in the first register or memory location.
    Type: Grant
    Filed: February 24, 2017
    Date of Patent: July 16, 2019
    Assignee: STMICROELECTRONICS (ROUSSET) SAS
    Inventors: Ibrahima Diop, Pierre-Yvan Liardet, Yanis Linge
  • Patent number: 10348704
    Abstract: A dynamic computer communication security encryption method or system using an initial seed key and multiple random number generators of a specific design, whereby a sequence of independent random entropy values is produced by one set of random number generators and encrypted along with the message stream using the initial seed key, or the output of a second set of random number generators initialized with the initial seed key, and following the subsequent transmission of the variable encrypted entropy/message block, the entropy values are used to symmetrically or identically augment or increase the current uncertainty or entropy of the cryptosystem at both the sender and the receiver, prior to the next encryption block operation.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: July 9, 2019
    Inventor: Helder Silvestre Paiva Figueira
  • Patent number: 10331698
    Abstract: A method for execution by a rebuilding module includes detecting that less than a pillar width number of encoded data slices of a common revision are retrievable from a set of storage units. A decode threshold number of encoded data slices are retrieved and decoded to reproduce a data segment. The data segment is encoded to produce at least one encoded data slice and storage of the at least one encoded data slice in the set of storage units is facilitated in accordance with the common revision when determining to rebuild the at least one encoded data slice. The data segment is encoded to reproduce the set of encoded data slices and storage of the reproduced set of encoded data slices is facilitated in the set of storage units in accordance with a new revision when determining to not rebuild the at least one encoded data slice.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: June 25, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Asimuddin Kazi, Jason K. Resch
  • Patent number: 10277629
    Abstract: A computer-implemented method for creating a deception computing system may include (i) identifying, by a computing device, a dataset of security alert signatures from a set of client devices, (ii) determining, by the computing device, a set of software vulnerabilities based on the dataset of security alert signatures, (iii) clustering, by the computing device, the set of software vulnerabilities to increase a length of at least one potential attack path within a predetermined number of honeypot machines, and (iv) distributing, by the computing device and based on clusters of software vulnerabilities, a set of vulnerable software among a set of honeypot machines within a honeynet. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 20, 2016
    Date of Patent: April 30, 2019
    Assignee: Symantec Corporation
    Inventor: Ravindra Guntur
  • Patent number: 10250387
    Abstract: A system and process provides quantum computer resistant algorithm cryptographic keys. Embodiments utilize a hardware noise source whose entropy is fed to a random bit generator to generate keys which go straight to the advanced encryption standard. The keys avoid the need for mutual authentication and are thus not subject to reverse factoring that can be accomplished through quantum computing.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: April 2, 2019
    Inventor: Patrick Joseph Guerin
  • Patent number: 10236887
    Abstract: Generating a unique die identifier for an electronic chip including placing the electronic chip in an identifier generation state, wherein the electronic chip comprises a set of test circuits, wherein each of the set of test circuits is attached to a corresponding component on the electronic chip; obtaining an ordered list of race pairs of the set of test circuits; for each race pair in the ordered list of race pairs of the set of test circuits: selecting the race pair of test circuits; executing a race between the selected race pair; and adding an element to the unique die identifier based on an outcome of the executed race; and returning the electronic chip to an operational state.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Karl R. Erickson, Phil C. Paone, David P. Paulsen, John E. Sheets, II, Gregory J. Uhlmann
  • Patent number: 10218517
    Abstract: In some aspects, a method includes obtaining, by a response generator circuit, reliability information for each bit of an array of bits provided by a physical unclonable function (PUF) circuit; receiving, from the PUF circuit during run time, an array of values for the array of bits; selecting a plurality of values from the array of values received from the PUF circuit in accordance with the reliability information; and generating, by the response generator circuit, a PUF response from the selected plurality of values.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: February 26, 2019
    Assignee: Carnegie Mellon University
    Inventors: Kenneth Wei-An Mai, Mudit Bhargava
  • Patent number: 10191719
    Abstract: A programmable magnetic device for generating random numbers during a programming operation, including an array of a plurality of magnetic tunnel junctions. Each magnetic tunnel junction includes a reference layer having a reference magnetization; a tunnel barrier layer; and a storage layer having a storage magnetization. The programmable magnetic device is arranged such that, during the programming operation, the storage magnetization is orientable in an unstable magnetization configuration and relaxable randomly in one of a plurality of stable or metastable configurations from the unstable magnetization configuration.
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: January 29, 2019
    Assignee: CROCUS TECHNOLOGY SA
    Inventors: Sebastien Bandiera, Quentin Stainer