Multiple Computer Communication Using Cryptography Patents (Class 713/150)
  • Patent number: 11223946
    Abstract: Embodiments of the present disclosure provide a solution that guarantees authenticity and integrity on the signaling exchange between mobile roaming networks that trust each other. According to at least one example embodiment, a network element located on a sending mobile network may be configured to generate a signaling message that includes one or more protected data fields, calculate a hash value for each of the one or more protected data fields, combine each of the calculated hash values together using an exclusive OR (XOR) operation resulting in a combined hash value. The network element may be further configured to calculate an authentication code based on the combined hash value and a key, add an authentication field to the signaling message, the authentication field storing the authentication code, and send the signaling message to a transporting network.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: January 11, 2022
    Assignee: KONINKLIJKE KPN N.V.
    Inventor: Ewout Leonard Pronk
  • Patent number: 11222292
    Abstract: An example operation may include one or more of determining, by a supply-chain node, a plurality of assets of the supply-chain node, generating, by the supply-chain node, key-value pairs for each asset of the plurality of the assets, forming, by the supply-chain node, asset matching rules for matching the plurality of the assets of the supply chain node to assets from another supply-chain node, and creating a plurality of aliases for the plurality of assets of the supply-chain node based on the key-value pairs and the matching rules.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: January 11, 2022
    Assignee: International Business Machines Corporation
    Inventors: Yichong Yu, Igor Anatolyevich Naumov
  • Patent number: 11218306
    Abstract: Some embodiments are directed to an electronic cryptographic device arranged to determine a cryptographic key. The cryptographic device can include a physically unclonable function (PUF) arranged to produce a first noisy bit string during the enrollment phase and a second noisy bit string during the reconstruction phase, and a statistical unit arranged to execute a statistical test for verifying correct functioning of the physical unclonable function. The statistical test computes a statistical parameter for the physical unclonable function using helper data. The statistical test determines correct functioning if the statistical parameter satisfies a criterion of the statistical test.
    Type: Grant
    Filed: July 27, 2016
    Date of Patent: January 4, 2022
    Assignee: INTRINSIC ID B.V.
    Inventors: Roel Maes, Erik Van Der Sluis, Geert Jan Schrijen
  • Patent number: 11210007
    Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.
    Type: Grant
    Filed: April 17, 2019
    Date of Patent: December 28, 2021
    Assignee: NetApp, Inc.
    Inventors: Srinivasan Narayanamurthy, Parag Deshmukh
  • Patent number: 11206086
    Abstract: [Problem] To allow addition of new functions to an optical module at a low cost. [Solution] An optical transceiver 11a includes a CPU 21 configured to perform download control of a program for executing an additional function to be newly added to the optical transceiver 11a, a wireless transmitting and receiving device 22 configured to receive, in accordance with the download control, the program from a terminal device 13 that stores various programs, and a memory unit 23 configured to store the program that is received. The CPU 21 is configured to perform, by interrupting a monitoring and control signal from a transmission device 12, control to write data related to transmission and reception processing of a Tx 25a and a Rx 26a in accordance with execution of the programs stored in the memory unit 23 in a storage area at a specific address of an EEPROM 24.
    Type: Grant
    Filed: May 22, 2019
    Date of Patent: December 21, 2021
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Toshiya Matsuda, Toru Homemoto, Kana Masumoto, Masaru Katayama, Kazuyuki Matsumura
  • Patent number: 11204726
    Abstract: An image processing apparatus includes a setting unit and a communication control unit to execute HTTP communication to an external apparatus. The setting unit sets whether to use a proxy server. The communication control unit controls, in a case where Hypertext Transfer Protocol (HTTP) communication to the external apparatus on a personal area network is performed, executing the HTTP communication to the external apparatus by other than the proxy server, even if use of the proxy server is set.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: December 21, 2021
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yoshiro Mihira
  • Patent number: 11201684
    Abstract: There is provided mechanisms for transmission of timestamp information. A method is performed by a transmitter device. The method comprises obtaining a first timestamp. The method comprises inserting a protected representation of the first timestamp in a payload field of a message. The message is a precision time protocol message. The method comprises timestamping the message by inserting a second timestamp in a timestamp field of the message. The method comprises transmitting the timestamped message to a receiver device. There is also provided mechanisms for reception of protected timestamp information. A method is performed by a receiving device.
    Type: Grant
    Filed: July 6, 2016
    Date of Patent: December 14, 2021
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventor: Tume Wihamre
  • Patent number: 11194912
    Abstract: Aspects of the present disclosure disclose provide systems and methods for updating, or patching, encrypted image files located at a remote location. More specifically, a content update package that includes encrypted information is received and decrypted. Based on the content update package, a first portion of data in an encrypted image file is located, where the first portion data is to be decrypted and updated based on data in the content update package. The updated data may then be encrypted, verified, and stored. When the updating, or patching, process is complete, the file version located at the remote location is the same as the latest file version. In addition, the updating, or patching, process may be split between multiple operating systems.
    Type: Grant
    Filed: October 22, 2020
    Date of Patent: December 7, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Simon Lee Cooke
  • Patent number: 11195121
    Abstract: A machine learning method includes: obtaining first teacher data, which includes first encrypted words and corresponding search word information including one or more second encrypted words to be used for search, the first encrypted words being generated such that the first encrypted word includes a code sequence different from other encrypted words even though both of the first encrypted words and the other encrypted words have been generated from a same word; obtaining a group of words from among the first encrypted words by using a trapdoor scheme; generating second teacher data by using one encrypted word included in the obtained group to replace a rest of the obtained group of words; and performing, on the basis of the second teacher data, machine learning of a parameter to determine, in response to receiving of one or more encrypted words, one or more encrypted words to be used for search.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: December 7, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Keisuke Hirota, Daiki Hanawa, Nobuko Takase, Toshihide Miyagi, Jumma Kudo
  • Patent number: 11184223
    Abstract: Embodiments described herein are directed to implementing compliance settings by a computing device for bringing the computing device into compliance with a configuration scenario. For instance, a computing device may receive, from a server, configuration information describing compliance settings for implementing by the computing device to bring the computing device into compliance with a configuration scenario. Moreover, the computing device may identify a state machine indicated by the configuration information that describes a configuration process for implementing the compliance settings and execute the state machine to configure the computing device with the compliance settings.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: November 23, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Peter J. Kaufman, Richard I. June, Moiz Z. Rassiwala, Daniel S. Dudugjian, Shayak Lahiri, Sean A. Bowles, Yuhang Zhu, Adeep Singh Cheema, Rama Krishna Samudrala, Jitendrakumar G. Koshti, Gaurav Raghu Dhawan
  • Patent number: 11177944
    Abstract: Provided is a system and method for confidential string-matching and confidential deep-packet inspection. The method includes: receiving encrypted ciphertexts from a first computing device; windowing a text corpus and applying a hash; performing binning and splitting on the corpus set of hashes; performing batching on the binned and split corpus set of hashes; determining match ciphertexts by evaluating a homomorphic encryption circuit between the encrypted ciphertexts and the batched corpus set of hashes; and communicating the match ciphertexts to the first computing device, the confidential string matching determinable by the first computing device by: decrypting the match ciphertexts, determining from the decryption output, if the hash value for each pattern window matches the hash value for any corpus windows and if the matched windows are adjacent in the corpus.
    Type: Grant
    Filed: April 20, 2021
    Date of Patent: November 16, 2021
    Inventors: Shariq Khalil Ahmed, Yousef Sadrossadat, Yeqi Shi, Joshua Calafato, Achinth Venkatraman, Alhassan Khedr, Glenn Gulak
  • Patent number: 11176253
    Abstract: A method includes: federating, by a computer device, a proxy hardware security module from a physical hardware security module; storing, by the computer device, the proxy hardware security module; receiving, by the computer device, a first one of a plurality of periodic identifying communications from the physical hardware security module; and erasing, by the computer device, the proxy hardware security module as a result of the computer device not receiving a second one of the plurality of periodic identifying communications.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: November 16, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Erlander Lo, Karunakar Bojjireddy, Angel Nunez Mencias, Marco Pavone
  • Patent number: 11176059
    Abstract: In one embodiment, an apparatus comprises a processor to read a data line from memory in response to a read request from a VM. The data line comprises encrypted memory data. The apparatus also comprises a memory encryption circuit in the processor. The memory encryption circuit is to use an address of the read request to select an entry from a P2K table; obtain a key identifier from the selected entry of the P2K table; use the key identifier to select a key for the read request; and use the selected key to decrypt the encrypted memory data into decrypted memory data. The processor is further to make the decrypted memory data available to the VM. The P2K table comprises multiple entries, each comprising (a) a key identifier for a page of memory and (b) an encrypted address for that page of memory. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 27, 2020
    Date of Patent: November 16, 2021
    Assignee: Intel Corporation
    Inventors: David M. Durham, Siddhartha Chhabra, Amy L. Santoni, Gilbert Neiger, Barry E. Huntley, Hormuzd M. Khosravi, Baiju V. Patel, Ravi L. Sahita, Gideon Gerzon, Ido Ouziel, Ioannis T. Schoinas, Rajesh M. Sankaran
  • Patent number: 11178079
    Abstract: Exemplary embodiments relate to techniques for improving the speed and rendering quality of an image (e.g., a JPEG), particularly in an end-to-end encrypted environment. The image may be analyzed on the sending-client side and the image data may be broken into a thumbnail and a full-quality image, where the full-quality image data relies on the thumbnail data to render a high-quality image. The image is uploaded to a blob store, and a message is sent to the receiving client with image information. At the recipient side, the JPEG image data is retrieved from the blob store and the thumbnail is first rendered. Subsequently, as the remainder of the image data is received at the receiving client, the image is updated. Consequently, images are rendered faster, and the thumbnail can be automatically downloaded so that a user can determine if they wish to download the full image.
    Type: Grant
    Filed: May 20, 2020
    Date of Patent: November 16, 2021
    Assignee: WHATSAPP LLC
    Inventors: Aaron Patel, Jonathan Sheller
  • Patent number: 11166324
    Abstract: A method performed by an AP may comprise initializing a CCC and increasing the CCC upon a change of at least one of a plurality of parameters of the AP. The plurality of parameters may include at least a high throughput (HT) Operation element, one or more Enhanced Distributed Channel Access (EDCA) parameters, or one or more operational mode parameters. The method may further comprise transmitting a frame, to at least one STA, wherein the frame includes an indication of the CCC, and the frame indicates that the at least one STA return from a power saving mode.
    Type: Grant
    Filed: February 6, 2020
    Date of Patent: November 2, 2021
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Lei Wang, Yousif Targali, Sudheer A. Grandhi, Xiaofei Wang, Guodong Zhang
  • Patent number: 11140546
    Abstract: Embodiments of the present invention disclose a security processing method and a related device. The method may include: receiving, by a base station, security-processed target data sent by user equipment UE; sending, by the base station, security request information of the UE to a core network device; and receiving, by the base station, security response information returned by the core network device, where the security response information includes security parameter information of the UE and/or security-deprocessed target data. According to the present invention, during data transmission between the UE and the base station, not only data security can be ensured, but also low power consumption can be ensured.
    Type: Grant
    Filed: August 3, 2018
    Date of Patent: October 5, 2021
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yinghui Yu, Chenwan Li, Jiangwei Ying
  • Patent number: 11140602
    Abstract: Example end marker sending methods are described. In one example method, a user plane gateway (UP GW) determines when to send an end marker based on trigger information, so as to sort one or more downlink data packets received on a target user plane path based on the end marker. The UP GW receives trigger information and an identifier (ID) of a source user plane path of user equipment (UE) that are sent by a control plane (CP) node, where the UP GW is located on the source user plane path. The UP GW sends an end marker to an access network (AN) node on the source user plane path based on the trigger information and the ID of the source user plane path.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: October 5, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Qianghua Zhu
  • Patent number: 11138324
    Abstract: Method and apparatus for virtualized environment where virtual computing instances interface a service platform operated on a physical computing apparatus are disclosed. A new virtual computing instance interfacing the service platform can be created, the created new virtual computing instance belonging to a class of virtual computing instances. At least one security credential is obtained from a storage of security credentials associated with the class of the new virtual computing instance. Data communicated with at least one further computing instance is secured based on the obtained at least one security credential.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: October 5, 2021
    Assignee: SSH Communications Security OYJ
    Inventor: Tatu Ylönen
  • Patent number: 11126980
    Abstract: Systems and methods for token linking and unlinking in digital wallets are disclosed. In one embodiment, a method for token linking in digital wallets may include: an issuer wallet application executed by the information processing device requesting, from a token vault, an identification of a customer's accounts that are eligible for push-provisioning to a third party wallet application executed by the information processing device; receiving the identification of customer accounts from the token vault; identifying accounts provisioned in the third party wallet application; determining accounts from the customer accounts that have not been provisioned to the third party wallet application to provision to the third party wallet application; provisioning the determined accounts to the third party wallet application; and requesting the token vault link a token associated with the provisioned account to an issuer wallet associated with the issuer wallet application.
    Type: Grant
    Filed: November 8, 2018
    Date of Patent: September 21, 2021
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Tuan Dao, Gayathri Sundar, Aditya Chebiyyam, Rajitha Dissanayake, Yunchul Bryan Jeon
  • Patent number: 11126742
    Abstract: A method for sharing read access to a document stored on memory hardware. The method includes receiving a shared read access command from a sharor sharing read access to a sharee for a document stored on memory hardware in communication with the data processing hardware, and receiving a shared read access request from the sharee. The shared read access command includes an encrypted value and a first cryptographic share value based on a write key, a read key, a document identifier, and a sharee identifier. The method also includes multiplying the first and second cryptographic share values to determine a cryptographic read access value. The cryptographic read access value authorizes read access to the sharee for the document. The method also includes storing a read access token for the sharee including the cryptographic read access value and the encrypted value in a user read set of the memory hardware.
    Type: Grant
    Filed: February 4, 2020
    Date of Patent: September 21, 2021
    Assignee: Google LLC
    Inventors: Kevin Yeo, Sarvar Patel, Giuseppe Persiano
  • Patent number: 11128459
    Abstract: Embodiments of the present invention provide systems and techniques for changing cryptographic keys in high-frequency transaction environments to mitigate service disruptions or loss of transactions associated with key maintenance. In various embodiments, a server device can employ a working key encrypted with a first master key to decrypt messages being communicated from a client device, whereby each message is encrypted with a first cryptogram that was generated based on the working key encrypted with the first master key. While the working key encrypted with the first master key is being employed, the server device can generate a notification including a second cryptogram generated based on the working key encrypted with a second master key for transmission to the client device. The transmitted notification can cause the client device to encrypt the messages being communicated with the second cryptogram.
    Type: Grant
    Filed: November 28, 2018
    Date of Patent: September 21, 2021
    Assignee: ITS, INC.
    Inventors: Terry Dooley, Thomas Sherrard, Shane Van Waardhuizen, Manish Nathwani, Craig F. Branch
  • Patent number: 11119980
    Abstract: Systems, methods, tools and computer programming products for implementing a cognitive data lake that selects or recommends operational database based on historically created data lakes storing files having similar file types, categorizations, metadata, and/or frequency of file usage. Selecting the appropriate operational databases is streamlined by building a knowledge base that is accessible during the creation and/or registration of each data lake. The knowledge base maintains historical records of past data lakes, describing each historical data lake's file types, attributes, metadata, frequency of file usage and at least one operational database implemented to manage the files of the historical data lake.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Grzegorz P. Szczepanik, Krzysztof A. Rudek, Tomasz Hanusiak, Konrad W. Komnata
  • Patent number: 11113298
    Abstract: Systems and methods are provided for collaborating with different object models. Data corresponding to one or more source objects is received. The source objects is stored in a first object model, and each of the source objects is associated with information describing an entity. Matches between the respective information associated with the one or more source objects and respective information associated with one or more target objects are determined based on a query. The target objects are stored in a second object model. The one or more source objects are ranked based at least in part on the matches. A list of the ranked source objects are provided through an interface, the interface indicating a number of matching target objects for each of the source objects.
    Type: Grant
    Filed: January 9, 2019
    Date of Patent: September 7, 2021
    Assignee: Palantir Technologies Inc.
    Inventors: Alexander Mark, Andrew Elder
  • Patent number: 11115186
    Abstract: Aspects of the disclosure relate to processing systems for performing cross-sectional asset editing. A computing platform may receive permission to perform a first subset of event processing steps. The computing platform may delegate permission to an external event processor to perform a second subset of event processing steps and to an external resource management platform to perform a third subset of event processing steps. The computing platform may generate an element chain corresponding to the account. In response to receiving a request to process an event, the computing platform may add a sub-element to the element chain containing a fixed parameter corresponding to an expected value associated with the event and a variable parameter corresponding to an actual value associated with the event. In response to receiving a request to write the actual value to the element chain, the computing platform may modify the variable parameter of the sub-element accordingly.
    Type: Grant
    Filed: January 2, 2019
    Date of Patent: September 7, 2021
    Assignee: Bank of America Corporation
    Inventors: Manu Kurian, Joseph Castinado
  • Patent number: 11115459
    Abstract: Techniques are disclosed for validating a webhook post by a receiver. The receiver receives an HTTP (Hypertext Transfer Protocol) request associated with the webhook post from an application. The receiver extracts at least one parameter from the HTTP request, to be used for validation of the webhook post. The receiver, obtains, based on the at least one parameter, configuration information associated with validating the webhook post from a configuration template, wherein the configuration template comprises configuration information associated with validating webhook posts from each of a plurality of applications. The receiver then validates the webhook post based on the configuration information.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: September 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Subramanian Krishnan, Varun Pal, Bharathi Venkatasubramanian
  • Patent number: 11108741
    Abstract: A system and method is introduced for separating computing devices that work together. The computing devices appear to the user as a single device such as through using a single display and other I/O means. The output of computing devices such as the display output, may be monitored for unwanted display output to the user which may be filtered from the user. The device displaying unwanted content may then be reverted to a known state. Computing devices may communicate among themselves using display data while remaining separated. Secure services from the cloud to a user device may be offered through the separated computing devices that work together, services that utilizes separating and securing the user I/O from internet connected devices, while allowing to monitor and filter the internet connected devices. These services preferably use a key that is non-extractable for communicating with the secure cloud.
    Type: Grant
    Filed: February 11, 2018
    Date of Patent: August 31, 2021
    Inventor: Noam Camiel
  • Patent number: 11108573
    Abstract: A computer-implemented method for performing authentication includes: determining, by a database server storing data in a blockchain ledger, a target ledger segment on which time service authentication is to be performed; generating a Merkle tree corresponding to the target ledger segment; determining a root hash of the Merkle tree, the root hash of the Merkle tree being based on a block hash of each data block in a set of one or more data blocks; executing a predetermined time capture process in a trusted execution environment to obtain a trusted time from an interface provided by a trusted time service organization; generating a digital signature for the trusted time and the root hash in the trusted execution environment; and generating a time service certificate including the trusted time, the root hash, and the digital signature.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: August 31, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Xinying Yang, Yuan Zhang, Benquan Yu, Yize Li
  • Patent number: 11108553
    Abstract: An example operation may include one or more of receiving, by a committer node or peer of a blockchain network, a block comprising a lock request that locks a partial state of a smart contract, the lock request comprising a submitter identifier and a lock delay, the committer node or peer configured to process blocks of transactions, the method further comprising, validating the lock request, committing transactions comprising the submitter identifier with no delay, and committing transactions not comprising the submitter identifier after the lock delay.
    Type: Grant
    Filed: April 5, 2019
    Date of Patent: August 31, 2021
    Assignee: International Business Machines Corporation
    Inventors: Jeronimo Irazabal, Andres Garagiola, Guillermo R. Lopez
  • Patent number: 11095444
    Abstract: Automatically and dynamically ascertaining by means of autoconfiguration whether used or activated and usable cipher suites and/or key lengths are sufficiently strong for current cryptographic protection of the control communication and/or other service access by virtue of 1) “cipher-suite”-based/-specific information available in the network/system being called up to ascertain reference cipher suites and/or 2) block chain information available in the network/system, containing data records referred to as “proof of work” for solving complex computation tasks, being called up or ascertained, with the ascertainment of block chain difficulty parameters as key length estimation parameters to ascertain appropriate reference key lengths, in particular reference minimum key lengths required for cryptoalgorithms, and 3) the ascertained reference cipher suites and/or the reference key lengths ascertained by the key length estimation parameters being compared with the used or activated and usable cipher suites and/or k
    Type: Grant
    Filed: January 11, 2018
    Date of Patent: August 17, 2021
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventor: Rainer Falk
  • Patent number: 11087006
    Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel encryption method for encrypting the data messages sent by the GVMs. The method initially receives a data message to send for a GVM executing on the host. The method then determines whether it should encrypt the data message based on a set of one or more encryption rules. When the process determines that it should encrypt the received data message, it encrypts the data message and forwards the encrypted data message to its destination; otherwise, the method just forwards the received data message unencrypted to its destination. In some embodiments, the host encrypts differently the data messages for different GVMs that execute on the host.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: August 10, 2021
    Assignee: NICIRA, INC.
    Inventors: Azeem Feroz, Kiran Kumar Thota, James C. Wiese
  • Patent number: 11087361
    Abstract: An information processing method is provided. The method includes acquiring a JavaScript (JS) template for filtering multimedia information from a backend server when determining a preset update condition is satisfied; and acquiring a filtering parameter corresponding to a target webpage from the backend server when detecting that a user requests to access the target webpage. The method also includes inserting the filtering parameter into the JS template; executing the JS template inserted with the filtering parameter, screening out multimedia information from webpage information displayed on the target webpage and shielding displaying of the multimedia information.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: August 10, 2021
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: Xuequan Ma
  • Patent number: 11082837
    Abstract: Management and configuration of internet of things network connected devices is facilitated herein. A proxy device comprises a memory that stores executable instructions that, when executed by a processor, facilitate performance of operations that comprise determining a first identity and a first operational parameter of a first device and a second identity and a second operational parameter of a second device. The first device and the second device can be associated with a defined communication network. The proxy device can be provisioned within the defined communication network and can operate as a security update proxy node for the first device and the second device. The operations can also comprise facilitating a first security update at the first device and a second security update at the second device based on a determination that the first device and the second device have delegated responsibility for security synchronization to the proxy device.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: August 3, 2021
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Eric Zavesky, Bernard S. Renger, Behzad Shahraray, David Crawford Gibbon, Lee Begeja, Timothy Innes
  • Patent number: 11076293
    Abstract: An access control device includes a processor configured to: receive a request for a connection via wireless communication from a terminal, issue a password from a first device for supporting a reading scheme for the terminal in response to a reception of the request for the connection, and transmit, to the terminal, a first program for generating a key information item of the terminal and acquiring authentication data corresponding to the password read by the reading scheme for the terminal, receive a response including the key information item and the authentication data from the terminal and determine whether the terminal is authorized based on the authentication data included in the response, and associate the key information item included in the response with identification information of the terminal and execute a process of establishing the connection to the terminal when the processor determines that the terminal is authorized.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: July 27, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Koichi Yasaki, Tadanobu Tsunoda, Kazuaki Nimura, Hidenobu Ito
  • Patent number: 11075895
    Abstract: A cloud operation interface sharing method, a related device includes: displaying, by a first terminal device, a first message sent by a cloud operating system of a second terminal device, where the first message carries first authentication information and address information of the cloud operating system, and the first message informs the first terminal device that the second terminal device authorizes the first terminal device to use the cloud operating system; requesting, by the first terminal device, authentication from the cloud operating system; after the authentication succeeds, establishing, by the first terminal device, a connection to the cloud operating system; receiving, by the first terminal device, interface information sent by the cloud operating system; and switching, by the first terminal device, a currently displayed first operation interface to a second operation interface corresponding to the interface information.
    Type: Grant
    Filed: December 31, 2015
    Date of Patent: July 27, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Fen Yang, Mingxing Cai
  • Patent number: 11075894
    Abstract: Novel tools and techniques might provide for implementing secure communications for IoT devices. In various embodiments, a gateway or computing device might provide connectivity between or amongst two or more Internet of Things (“IoT”) capable devices, by establishing an IoT protocol-based, autonomous machine-to-machine communication channel amongst the two or more IoT capable devices. For sensitive and/or private communications, the gateway or computing device might establish a secure off-the-record (“OTR”) communication session within the IoT protocol-based, autonomous machine-to-machine channel, thereby providing encrypted machine-to-machine communications amongst the two or more IoT capable devices, without any content of communications that are exchanged amongst the IoT capable devices over the secure OTR communication session being recorded or logged.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: July 27, 2021
    Assignee: CenturyLink Intellectual Property LLC
    Inventor: Tom Funk
  • Patent number: 11070360
    Abstract: An example operation may include one or more of identifying pending blockchain transactions in a transaction queue, determining states of the pending blockchain transactions, determining whether the pending blockchain transactions in the transaction queue are valid based on the determined states, retrieving a list of potential blockchain transaction conflicts associated with the pending blockchain transactions, and determining whether any conflicts exist for one or more of the pending blockchain transactions based on the list of blockchain transaction conflicts.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: July 20, 2021
    Assignee: International Business Machines Corporation
    Inventors: Yue Tong, Miao He, Bing Shao, Changrui Ren
  • Patent number: 11062046
    Abstract: Systems, methods, and computer-executable instructions for protecting data that includes receiving a request for a first data value. A data store is queried for a first stored data value. The first stored data value is received which contains a security prefix and encrypted data. From the security prefix, a cryptography algorithm and a key are determined. The encrypted data is decrypted using the cryptography algorithm and the key. The decrypted data is returned.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: July 13, 2021
    Assignee: DeCurtis LLC
    Inventor: Ajay Thapar
  • Patent number: 11063755
    Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.
    Type: Grant
    Filed: May 7, 2019
    Date of Patent: July 13, 2021
    Assignee: Cryptography Research, Inc.
    Inventor: Helena Handschuh
  • Patent number: 11064010
    Abstract: Systems and methods for tracking the download progress of a composite file. One system includes a notification server and a media server. The notification server provides a token to a user device that uniquely identifies a user session between a browser application and a cloud storage service. The media server receives the token from the browser application associated with a download request for a set of files, creates a composite file including the set of files, transmits the composite file to the user device, and, while transmitting the composite file, transmits progress information and the token to the notification server. The progress information includes a number of files in the composite file transmitted to the user device. The notification server receives the progress information and the token from the media server, determines the user session based on the token, and transmits the progress information to the user device.
    Type: Grant
    Filed: March 30, 2018
    Date of Patent: July 13, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sridhar Periasami, Harshad R. Sheth, Jose Emmanuel Miranda-Steiner
  • Patent number: 11055427
    Abstract: A cloud security system and method designed to protect users' data in case of accidental leaks in a cloud computing environment. Secured hashing of the names of folders stored on the cloud data storage are generated and persisted using multiple iterations of cryptographic hash functions along with a concatenated random number for each of the folder names, thereby providing protection against vulnerability of the folder names. The proposed system is a dual-layer framework consisting of a control layer and a data layer. The control layer is responsible for cryptographic hashing and persistence of the folder name, hashed name, salt, and iterations in a database. The control layer communicates with the data layer and provides the hashed folder names to persist the user data cloud storage.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: July 6, 2021
    Assignee: University of South Florida
    Inventors: Vivek Kumar Singh, Kaushik Dutta, Balaji Padmanabhan, Shalini Sasidharan
  • Patent number: 11057293
    Abstract: A system and method for validating proof of transit of network traffic through network nodes (N), the node (N) comprising a set of input interfaces (20) receiving incoming packets, a first module (A) to identify a matching route within a routing table (23) and storing means (22) to provide next modules (B, C, D) with two private keys if the packet is matched and/or the packet metadata includes OPoT information. The second module (B) decrypts the OPoT metadata using the first private key associated to the link of the node from which the incoming packets are received. The node (N) has SSS metadata to be processed by a third module (C) for the correct generation of cumulative validation parameters. When the SSS process is finished by the third module (C), the fourth module (D) re-encrypts the OPoT metadata using the second private key before packet forwarding to the subsequent node in the path through output interfaces (21).
    Type: Grant
    Filed: February 17, 2019
    Date of Patent: July 6, 2021
    Assignee: Telefónica, S.A
    Inventors: Alejandro Aguado Martín, Vicente Martín Ayuso, Diego R. López, Antonio Pastor Perales, Victor López Alvarez
  • Patent number: 11050784
    Abstract: A technology is provided for mitigating an attack against a host service. Receive a connection from a client using a first cipher suite to authenticate the client. Identify that a distributed denial-of-service (DDoS) attack is occurring from a plurality of clients. Change the first cipher suite to a second cipher suite wherein the second cipher suite is more computationally intensive than the first cipher suite. Disconnect with the client and causing the client to reconnect using the second cipher suite.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: June 29, 2021
    Assignee: Amazon Technologies, Inc.
    Inventor: Timothy Mattison
  • Patent number: 11042641
    Abstract: A trusted deployment and communications gateway for deployment, trusted execution, and secure communications system includes a trusted platform for deployment of trusted applications. The trusted platform may include a secure user profile comprising user data specifications that is stored in a secure storage location of the trusted platform, a kernel development engine configured to receive various application program instructions within a trusted environment, a testing and signing module configured to generate signed application program instructions in response to determining that the application program instructions do not violate one or more of the data specifications, a compiler configured to compile the signed application program instructions to generate a signed application kernel, and a kernel store configured to store the signed application kernels that are executable in the trusted platform.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: June 22, 2021
    Assignee: AMARI.AI INCORPORATED
    Inventors: Jonathan Alan Simmons, Eddie B. Satterly
  • Patent number: 11038857
    Abstract: A messaging server receives a network packet that encapsulates a user packet that indicates a source domain and a destination domain. The user packet encapsulates a data message that indicates a code and comprises encrypted data. The messaging server transfers the user packet to a distributed ledger. The distributed ledger executes a distributed ledger transaction with the domains and the code to determine a receiving device. The distributed ledger commits the user packet and device identifiers to distributed ledger memory and transfers the user packet and the receiving device identifier to the messaging server. The messaging server encapsulates the user packet in a network packet for delivery to the receiving device. The user packet encapsulates that data message that indicates the code and comprises the encrypted user data.
    Type: Grant
    Filed: February 14, 2019
    Date of Patent: June 15, 2021
    Assignee: Sprint Communications Company L.P.
    Inventors: Lyle Walter Paczkowski, Ronald R. Marquardt, Ivo Rook
  • Patent number: 11010976
    Abstract: An approach for simulating items in an environment, such as a room, is disclosed. A package file can store information including an image of the environment and metadata including an identifier that uniquely identifies a selected image. The package file can be used to regenerate a simulation of the item arranged over the image of the environment. Later changes can be made to the simulation of the item by accessing the metadata.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: May 18, 2021
    Assignee: Houzz, Inc.
    Inventors: Guy Shaviv, Xiaoyi Huang, Aaron Yip
  • Patent number: 11012237
    Abstract: Systems and methods for inter-service authentication are disclosed. In one embodiment, a system may include a plurality of services and a cloud platform. The first service may generate a token comprising a first service identifier for communicating with a second service, and may request, from the cloud platform, a private key for the first service. The cloud platform may provide the private key to the first service. The first service may sign the token with the private key and may communicate a request to the second service with the signed token. The second service may retrieve the first service identifier and may request, from the cloud platform, a public key for the first service identifier. The cloud platform may provide the public key to the second service. The second service may validate the token using the public key, and may grant the request in response to the validation.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: May 18, 2021
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Deepak Sarda, Ramji Venkateswaran
  • Patent number: 11004060
    Abstract: A fare collection method and apparatus are provided. The apparatus comprises a camera; an NFC device; a processor, configured to: trigger a ride fare collection transaction upon a target object being detected within a set distance; determine whether a first payment information has been obtained by the camera; if yes, perform payment processing according to the first payment information; and if no, collect a near-field communication (NFC) signal through an NFC device to obtain second payment information, and perform payment processing according to the second payment information.
    Type: Grant
    Filed: January 17, 2020
    Date of Patent: May 11, 2021
    Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.
    Inventor: Hong Zhang
  • Patent number: 10997163
    Abstract: The subject technology at a data system, an ingest request to ingest one or more files into a table. The subject technology, after obtaining the ingest request and prior to the ingesting of the one or more files, persists the one or more files in a first file queue that corresponds to the table, the first file queue further corresponding to a client account, and the data system further comprising a second file queue that corresponds to both a second client account and a second table. The subject technology ingests, by one or more execution nodes, the one or more files into one or more micro-partitions of the table, each of the one or more micro-partitions comprising contiguous units of storage of a storage device.
    Type: Grant
    Filed: July 30, 2020
    Date of Patent: May 4, 2021
    Assignee: Snowflake Inc.
    Inventors: Benoit Dageville, Varun Ganesh, Jiansheng Huang, Jiaxing Liang, Haowei Yu, Scott Ziegler
  • Patent number: 10992459
    Abstract: Implementations of the present specification provide a method for updating a state Merkle tree, where the state Merkle tree is used to store a state of an account in a blockchain network. The method includes: accessing data related to a state Merkle tree that stores a state of an account in a blockchain network; determining to-be-updated nodes that need to be updated in the state Merkle tree due to a state change of the account; extracting one first subtree and M second subtrees from the state Merkle tree based on the to-be-updated nodes; allocating the M second subtrees to N worker threads, wherein two or more of the N worker threads process in parallel the M second subtrees to obtain each updated second subtree; and updating at least the first subtree based on hash values of root nodes of the updated second subtrees, to obtain an updated state Merkle tree.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: April 27, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Zhonghao Lu
  • Patent number: 10984123
    Abstract: A method is presented to geographically control the distribution of protected data and ensure that it is not transmitted along any path which would encompass prohibited areas. A user wanting to so protect data can input geographic restrictions which are translated into geodeclaration metadata representing one or more geographic areas in which the data is either permitted or prohibited. The metadata may be in the form of an XML statement, and is sealed with the data using a digital certificate. When the data is received at a network router or at a destination device, the router/device can check its own current location (e.g., via GPS) and determine whether its location is within permissible boundaries. If not, the data is not transmitted or stored, and an error message is returned. If the router/device determines that it is within permissible boundaries, it proceeds to transmit or store the data.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: April 20, 2021
    Assignee: International Business Machines Corporation
    Inventors: Fan Frank Meng, Jayavel Rajendran