Particular Communication Authentication Technique Patents (Class 713/168)
  • Patent number: 10027773
    Abstract: Methods and apparatus to share online media impression data are disclosed. An example method includes receiving, at a database proprietor, a first request from a client device, the first request including an audience measurement entity cookie identifier of an audience measurement entity cookie; and determining, with a processor of the database proprietor, a cookie mapping of the audience measurement entity cookie to a database proprietor cookie that is assigned by the database proprietor and associated with the client device.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: July 17, 2018
    Assignee: The Nielson Company (US), LLC
    Inventors: Amitabh Seth, Brahmanand Reddy Shivampet
  • Patent number: 10028179
    Abstract: A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus may be a STA. The STA communicating with a first AP based on a key. The STA receives an identifier broadcasted from a second AP. The STA determines whether the key can be used with the second AP based on the received identifier. The STA selects the second AP upon determining the key can be used with the second AP. The STA requests a transfer of association context information from the first AP to the second AP. The key may be a PTK. The PTK may be a function of the identifier. The identifier may be a zone identifier identifying a set of APs that belong to a security domain in which the association context information of the STA can be transferred from one AP to another AP.
    Type: Grant
    Filed: January 21, 2014
    Date of Patent: July 17, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: George Cherian, Santosh P. Abraham
  • Patent number: 10027688
    Abstract: A method and system of detecting a malicious and/or botnet-related domain name, comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a network; searching for information about the domain name, the information related to: information about the domain name in a domain name white list and/or a domain name suspicious list; and information about the domain name using an Internet search engine, wherein the Internet search engine determines if there are no search results or search results with a link to at least one malware analysis site; and designating the domain name as malicious and/or botnet-related based on the information.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: July 17, 2018
    Assignee: Damballa, Inc.
    Inventors: Roberto Perdisci, Wenke Lee
  • Patent number: 10027616
    Abstract: A proximity discovery system enabling a person to quickly and efficiently discover colleagues within their proximity without visual contact. The system comprises a mobile computing device including an antenna and transceiver for exchanging messages with a plurality of other mobile devices within approximately 100 meters of the user device, a user detection module for detecting the messages from the other mobile devices, a proximity detector for estimating a distance between the user device and each of the mobile devices, a connection module for sharing biographic and professional information with the plurality of mobile devices based on one of a plurality of connection levels. At a first level, the users exchange name and initial corporate affiliation data, while at a second level they exchange more detailed professional data and social media contact data.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: July 17, 2018
    Assignee: PLEXUS MEET, INC.
    Inventor: Erika Larson
  • Patent number: 10025916
    Abstract: Provided are a method and apparatus for executing a device according to usage authority, wherein usage authority information for a first device may be received, usage authority for the first device may be identified based on the received usage authority information as well as telephone number information of a user, and the first device may be executed according to the identified usage authority for the first device.
    Type: Grant
    Filed: March 17, 2016
    Date of Patent: July 17, 2018
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jongseok Kim, Kihong Min, Chisung Bae, Daekwang Jung, Seokwhan Chung
  • Patent number: 10027485
    Abstract: Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.
    Type: Grant
    Filed: February 4, 2015
    Date of Patent: July 17, 2018
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: Glenn Benson, Salvatore Richard Re
  • Patent number: 10021562
    Abstract: An MTM-based short message service security system and a method thereof are provided. A hardware security module according to the present invention includes an access control unit configured to verify the integrity of a SMS application and a request from the SMS application, and verify whether the SMS application has a permission for the request; a key management unit configured to store and manage a public key and a private key of the terminal, and an encryption key shared with a server configured to transmit a security message between the server and the terminal; and a security message processing unit configured to convert the security message based on a preset security policy when the security message is received from the server, and return the converted message to the SMS application.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: July 10, 2018
    Assignee: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventor: Hwa Shin Moon
  • Patent number: 10021135
    Abstract: Methods, systems, and devices for instituting a new type of attack on Zigbee networks are provided. Targeting the data-collection aspect of Zigbee's use cases, a denial-of-service attack can be implemented, and can induce loss of the data transmitted from an end device to the coordinator of the network. Such an attack can exploit the fact that the handshake for a newly joining node to the Zigbee coordinator is not encrypted. Methods, systems, and devices to mitigate such an attack are also provided. To mitigate such a type of attack, a low-overhead countermeasure can be implemented, based on a challenge-response.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: July 10, 2018
    Assignee: The Florida International University Board of Trustees
    Inventors: Spencer Michaels, Kemal Akkaya, A. Selcuk Uluagac
  • Patent number: 10015187
    Abstract: Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: July 3, 2018
    Assignee: Qualys, Inc.
    Inventors: Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
  • Patent number: 10009169
    Abstract: A format-preserving cipher including encryption and decryption schemes supporting non-linear access to input data by allowing the selection of portions of data from a potentially larger dataset to be encrypted. The cipher first defines a forward mapping from the allowable ciphertext values to an integer set of the number of such allowable ciphertext values, and a corresponding reverse mapping. It also supports exclusion of a certain set of characters from the ciphering process. An encryption algorithm is provided that encrypts the input plaintext data while preserving its original format and length, and a corresponding decryption algorithm is provided. The cipher advantageously embodies the encryption and decryption of multi-byte values, composite datasets, credit card numbers and discontinuous datasets, thus fitting a variety of industrial needs.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: June 26, 2018
    Assignee: ZETTASET, INC.
    Inventor: Eric A. Murray
  • Patent number: 10004017
    Abstract: A switching method and system between heterogeneous networks are provided. In the switching method: a terminal sends identity information and a network access identifier to a home subscriber server (HSS) through a mobile management entity; the HSS sends the network access identifier to an access gateway, receives a seed key, sends the seed key to the terminal, calculates and sends a local key and a local identifier to an authentication, authorization and accounting (AAA) server; the terminal calculates a second handoff key and a second handoff identifier; and the AAA server sends a calculated first handoff key to an access point of the target network, for the access point and the terminal to execute a network switching operation. Communication traffic of a re-authentication process can be effectively decreased when a cellular network is switched to a WLAN, thereby decreasing time delay of re-authentication and increasing probability of success in switching.
    Type: Grant
    Filed: August 13, 2014
    Date of Patent: June 19, 2018
    Assignee: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) CO., LTD.
    Inventor: Yan-Tao Zhong
  • Patent number: 10001965
    Abstract: An example implementation may involve a playback device detecting placement of the playback device onto a device base of a particular media playback system. The playback device may determine that it is configured to automatically join media playback systems. Based on such a determination, the playback device may send, to the particular media playback system, a request to join the particular media playback system. The playback device may receive, from the media playback system, one or more messages that enable the playback device to join the particular media playback system, which the playback device may use to join the particular media playback system.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: June 19, 2018
    Assignee: Sonos, Inc.
    Inventors: Jonathan P. Lang, Christopher D. Butts
  • Patent number: 9996848
    Abstract: There is provided a scheme of communicating reward data from a first application running on a data processing device (100) to a second application on the data processing device (100) for use by the second application. The method comprises the first application obtaining a reward value in response to a user of the first application completing a predetermined task in the first application. In response to a request from the user to claim a reward, the first application generates and transmits: an instruction to place the second application into an interactive state; and reward data, which is generated on the basis of the reward value, for use by the second application in the interactive state. The passing of the reward value from the first application to the second application occurs within the data processing device (100), with no communication between the data processing device (100) and the backend server (200) via the Internet (400) taking place.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: June 12, 2018
    Assignee: Outfit7 Limited
    Inventor: Samo Login
  • Patent number: 9992674
    Abstract: A method of unlocking a locked device includes receiving a device identifier over a wireless communication protocol, determining if the device identifier is associated with a list of trusted devices, transmitting a request to generate an acoustic signal over the wireless communication protocol based on the determination, receiving the acoustic signal as an audio sound generated external to the locked device, estimating a distance between a source of the audio sound and the locked device, and unlocking the locked device based on the estimation.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: June 5, 2018
    Assignee: Apple Inc.
    Inventor: Matthew E. Last
  • Patent number: 9990489
    Abstract: The system and method of the present disclosure is a contextual authentication system, comprising: an authentication server, which comprises a memory; and an authentication application, wherein said authentication application may be configured to be run on at least a primary personal computing device and one or more secondary personal computing devices. The devices are networked with each other and each other and the authentication server. The primary device may have a resource that may be shared with the secondary devices if the users of the secondary devices are able to properly provide a contextual authentication, as required by the primary device. If the secondary users cannot properly authenticate, then they are denied access. The server may make the determination.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: June 5, 2018
    Assignee: LIVEENSURE, INC.
    Inventor: Christian Hessler
  • Patent number: 9986431
    Abstract: A method, performed by a User Equipment device, UE, for obtaining a key for direct communication with a device over an air interface, wherein the UE has previously acquired a transaction identifier received from a Bootstrapping Server Function, BSF, in a Generic Bootstrapping Architecture, GBA, procedure, is provided. The method comprises storing the transaction identifier, sending the transaction identifier to the device and requesting key generation for direct communication with the device. If the transaction identifier is invalid, the method further comprises receiving from the device a device identifier and key generation information, deriving a session shared key from at least the key generation information, and deriving a direct communication key from at least the session shared key and the device identifier.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: May 29, 2018
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Vesa Lehtovirta, Katharina Pfeffer, Vesa Torvinen, Monica Wifvesson
  • Patent number: 9985964
    Abstract: Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating identifiers with individuals having previously verified personal identities, assigning verification addresses on a block chain to the individuals, and recording identifiers and biometric data associated with the individuals at corresponding verification addresses. Block chain-based multifactor personal identity verification using the verification addresses may be performed by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, extracting the biometric data associated with the one or more individuals from the corresponding verification addresses, and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: May 29, 2018
    Assignee: Black Gold Coin, Inc.
    Inventor: Marcus Andrade
  • Patent number: 9985888
    Abstract: A method, computer program product, and/or system for maximizing hardware capabilities of a network interface card are provided. To maximize hardware capabilities of the network interface card, a media access control address for associating with the network interface card is received and a number of media access control addresses defined to the network interface card is compared to a maximum threshold of the network interface card. Then, in response to when the number is equal to or exceeds the maximum threshold of the network interface card, a promiscuous mode is enabled for network interface card and the media access control address is associated with the network interface card.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: May 29, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Mark H. Van Parys
  • Patent number: 9984256
    Abstract: Apparatus and method for detecting unauthorized tampering with a data storage device having a housing and a memory. A first identifier value is stored on an external surface of the housing and a second identifier value is stored within the memory. The first and second identifier values are combined in a predetermined order to form a combined identifier value for which a digital signature is generated using a private key, and the digital signature is stored on the storage device. The digital signature, the first and second identifier values, and one or more dummy identification values are retrieved from the storage device and stored in a memory of a verification device, which combines the retrieved first and second identifier values in the predetermined order to generate a retrieved combined identifier value. The storage device is authenticated using the retrieved combined identifier value, the digital signature and a public key.
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: May 29, 2018
    Assignee: Seagate Technology LLC
    Inventors: Hong Liu, Abhay Kataria, Chao Chen, WeiWei Feng, Monty A. Forehand, William Erik Anderson
  • Patent number: 9977891
    Abstract: An anonymous authentication method is implemented by an authentication device that has a key array. The key array has multiple array dimensions each having multiple device keys. The method includes: receiving ciphertexts from a chip that has multiple chip keys; acquiring authentication keys by: for each of the ciphertexts, performing trails of decryption using the device keys of one of the array dimensions that corresponds to one of the chip keys used to generate the ciphertext one by one until obtaining one of the device keys that successfully decrypts the ciphertext to serve as one of the authentication keys; and obtaining, for authentication, information associated with the chip according to the authentication keys.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: May 22, 2018
    Assignee: CHANG JUNG CHRISTIAN UNIVERSITY
    Inventor: Chi-Chao Chang
  • Patent number: 9980127
    Abstract: The present disclosure relates to a sensor network, machine type communication (MTC), machine-to-machine (M2M) communication, and technology for internet of things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart homes, smart buildings, smart cities, smart cars, connected cars, health care, digital education, smart retail, security and safety services. A method for performing a pairing process in a wireless device in a wireless communication system is provided. The method includes transmitting a signal including an encryption key to a terminal, receiving an authentication success message which is encrypted based on the encryption key from the terminal, and performing the pairing process with a coordinator based on the encryption key.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: May 22, 2018
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Dong-Ik Lee
  • Patent number: 9979554
    Abstract: Methods and systems for securely accessing a transportation vehicle are provided. As an example, one method includes obtaining user specific secret information from a key server with a user device, without providing the user access to the user specific secret information; securely storing the user specific secret information in a memory of the user device; generating a challenge message for the user device with an LRU, the challenge message generated by the LRU using the user specific secret information also stored at the LRU and optionally an identifier identifying the LRU; generating a response to the challenge message by the user device using any user specific secret information and the challenge message; providing the response to the LRU; and validating the response by the LRU using any user specific secret information and the challenge message for authorizing access to the LRU by the user device.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: May 22, 2018
    Assignee: Panasonic Avionics Corporation
    Inventor: Philip Watson
  • Patent number: 9979717
    Abstract: A technique for hardening the entry of user credentials in web sites is described. A headless web browser authenticates the user to a target web site with credentials previously stored in a secure database, and generates a session cookie. The headless browser provides the session cookie to the user's web browser, allowing the user to continue the session established by the headless browser.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: May 22, 2018
    Assignee: McAfee, LLC
    Inventors: Greg Whiteside, Olivier Beaulieu, Mathieu Rene
  • Patent number: 9978095
    Abstract: An illustrative implementation of the technology includes three primary components: a desktop application, a mobile phone application, and connections to retailer inventory and pricing APIs (e.g., for Walmart and/or Best Buy). The experience begins with the consumer going to an online retailer's website (e.g., Amazon) to search for a product. The desktop application automatically searches for product matches using the APIs of affiliated retailers. If matches and near-matches of the product are found, the product name, model, price, and local availability at affiliate locations is shown. With a mobile phone camera-scan of the product page, relevant information is transferred to the consumer's phone. From there, the consumer can interact with the options on the mobile phone to be directed to the nearby brick and mortar store of choice carrying that product at the price they want. Along the way, the retailer can present offers and additional product information directly to the consumer.
    Type: Grant
    Filed: January 15, 2015
    Date of Patent: May 22, 2018
    Assignee: Digimarc Corporation
    Inventors: Bruce L. Davis, Geoffrey B. Rhoads, Eoin C. Sinclair, Brian T. MacIntosh
  • Patent number: 9971886
    Abstract: A keyboard is disclosed. The keyboard may comprise a biometric sensor configured for authenticating a user; a docking station configured for receiving a security device; and a processor configured for facilitating communication between the biometric sensor and the security device docked in the docking station with a computing device coupled to the keyboard.
    Type: Grant
    Filed: January 2, 2014
    Date of Patent: May 15, 2018
    Assignee: Bloomberg Finance L.P.
    Inventors: Helmars E. Ozolins, Masamichi Udagawa, Sean Roarty, Avram Kaufman, Christopher William Zimman, Stanislaw Skowronek, Emmanuel Patychakis
  • Patent number: 9973341
    Abstract: Systems, methods, and apparatuses are described wherein a block chain or block chain network can be created and the mining of new blocks can be limited to certain actors holding a specific set of private keys and verified by the corresponding public keys accessible to consumers interested in validating the block chain. These keys are stored in software or on specific hardware devices designed to not reveal the private key. Only blocks mined using those keys are acceptable on the block chain. The signing of the blocks in the particular block chain is integrated in such a fashion as to be integral to the proof of work for the block chain.
    Type: Grant
    Filed: January 5, 2016
    Date of Patent: May 15, 2018
    Inventor: Daniel Robert Ferrin
  • Patent number: 9972147
    Abstract: A smart badge of the present invention comprises a communication unit capable of performing wireless communication, an OTP (one-time password) storage unit configured to store therein OTP information for generating one-time password (OTP), a display unit configured to display information, an image storage unit configured to store therein at least two images to be displayed on the display unit, a personal information storage unit configured to store therein user's personal information, an input unit that is to be used for selecting an image to be displayed on the display unit, and a control unit configured to control the respective constitutional elements.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: May 15, 2018
    Assignee: Penta Security Systems Inc.
    Inventors: Seok Woo Lee, Duk Soo Kim, Sang Gyoo Sim, Kyung Moon Nam, Yeon Tae Kim
  • Patent number: 9967099
    Abstract: A method for providing information includes acquiring modified access authentication information after detecting that access authentication information for accessing a gateway device is modified, determining a device to be notified corresponding to the modified access authentication information, and providing the modified access authentication information to the device to be notified.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: May 8, 2018
    Assignee: Xiaomi Inc.
    Inventors: Enxing Hou, Deguo Meng, Ziguang Gao
  • Patent number: 9961552
    Abstract: Technology is disclosed for preventing classification of objects, e.g., in an augmented reality system. The technology can identify a set of objects to be classified, determine whether context information for one or more objects in the identified set of objects to be classified is identified as not to be employed during classification, and during classification of two different objects, include context information for one object but not the other.
    Type: Grant
    Filed: April 22, 2015
    Date of Patent: May 1, 2018
    Assignee: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Hyoung-Gon Lee
  • Patent number: 9961063
    Abstract: An information processing device includes an interface configured to receive authentication information from an electronic device. The device also includes circuitry configured to identify an execution range of an association operation program executed by the electronic device, the execution range being indicative of an authentication of an association between the electronic device and another electronic device.
    Type: Grant
    Filed: July 24, 2014
    Date of Patent: May 1, 2018
    Assignee: SONY CORPORATION
    Inventors: Hirotoshi Maegawa, Tooru Hiraga
  • Patent number: 9961148
    Abstract: Systems and methods can be implemented for IP multimedia subsystem (IMS) resource reservation. A first electronic device can transmit, through an IP network, a non-Session Initiation Protocol (SIP) message to an application server in an IMS network, where the non-IMS SIP message includes a request to initiate an IMS communication session through the IMS network with a second electronic device. A SIP message can also be transmitted through the IMS network to the application server that initiates a SIP INVITE session between the first electronic device and the application server, where the SIP INVITE session is routed through the IMS network. The first electronic device can then, receive a SIP response message that identifies a resource reservation for the IMS communication session from the application server.
    Type: Grant
    Filed: July 9, 2015
    Date of Patent: May 1, 2018
    Assignee: BlackBerry Limited
    Inventor: Alexander Shatsky
  • Patent number: 9953176
    Abstract: A method for processing activity records. The method includes obtaining an activity record, and generating an anonymization dictionary. Generating the anonymization dictionary includes detecting, in the activity record, a set of target entities to be anonymized, making a determination that a resource is associated with a subset of the target entities of the set of target entities, and after making the determination, assigning an anonymized identity to the subset of target entities, and generating an anonymization identifier for each target entity in the subset of target entities to obtain a set of anonymization identifiers, each including the anonymized identity. The method further includes processing the activity record using the anonymization dictionary to obtain an anonymized activity record and storing the anonymized activity record.
    Type: Grant
    Filed: October 2, 2015
    Date of Patent: April 24, 2018
    Assignee: Dtex Systems Inc.
    Inventors: Rajan Peng Kiat Koo, Russell Alan Bruechert, Roderick Duncan Stamp, Arun Narasimha Swami, Vamsi Krishna Akkineni
  • Patent number: 9953167
    Abstract: Systems and methods facilitating a framework that provides a core trusted computing base (TCB) of an electronic device with various security capabilities. The framework can include a low-resource device and at least one distributed resource. The low-resource device can be configured to generate sealing keys, migration keys, and attestation keys that are based on a device secret associated with the low-resource device and one or more software modules. The low-resource device can further be configured to use the migration keys and the sealing keys to both verify a software update and migrate secrets from a previous version of the software to a newer version of the software. Additionally, the low-resource device can be configured to generate an attestation statement using the attestation keys and perform attestation using the attestation statement and the at least one distributed resource.
    Type: Grant
    Filed: October 12, 2015
    Date of Patent: April 24, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David R Wooten, Andrey Marochko, Dennis Mattoon, Paul England
  • Patent number: 9954687
    Abstract: A method and apparatus for establishing a wireless connection. A digital certificate having a second name is obtained by a processor unit in response to receiving a selection of a network using a first name broadcast by a wireless access point. A determination is made by the processor unit as to whether the digital certificate is valid. A determination is made by the processor unit as to whether the second name in the digital certificate matches the first name broadcast by the wireless access point. The processor unit establishes the wireless connection to the wireless access point in response to the digital certificate being valid and the second name in the digital certificate matching the first name broadcast by the wireless access point.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Thomas J. Cross, David B. Dewey, Takehiro Takahashi
  • Patent number: 9953315
    Abstract: A method for building an advanced storage key includes: storing, in a mobile device, at least (i) device information associated with the mobile device, (ii) program code associated with a first program including an instance identifier, and (iii) program code associated with a second program including a first key; generating a device fingerprint associated with the mobile device based on the device information via execution of the code associated with the first program; generating a random value via execution of the code associated with the first program; building a diversifier value based on the generated device fingerprint, the generated random value, and the instance identifier included in the code associated with the first program; and decrypting the built diversifier value using the first key stored in the code associated with the second program via execution of the code associated with the second program to obtain a storage key.
    Type: Grant
    Filed: December 2, 2014
    Date of Patent: April 24, 2018
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Mehdi Collinge, Cristian Radu
  • Patent number: 9953153
    Abstract: A method of providing a degree of authentication for a content link presented to peer user(s) by a sharing user via the Internet. The method includes, at a server, associating the content link with authentication data provided by the sharing user, and storing the associated content link and authentication data in a storage location. A redirection link that links to the stored associated content link and authentication data is presented to a peer user via a user interface of a client computer of the peer user. Upon submission of an access request from the client computer to the redirection link, the content link and the authentication data is delivered to the client computer. The authentication data is presented to the peer user via the user interface and the peer user is able to choose, via the user interface, to submit an access request to the content link.
    Type: Grant
    Filed: January 17, 2011
    Date of Patent: April 24, 2018
    Assignee: F-Secure Corporation
    Inventor: Juha Torkkel
  • Patent number: 9953336
    Abstract: There is provided a scheme of communicating reward data from a first application running on a data processing device (100) to a second application on the data processing device (100) for use by the second application. The method comprises the first application obtaining a reward value in response to a user of the first application completing a predetermined task in the first application. In response to a request from the user to claim a reward, the first application generates and transmits: an instruction to place the second application into an interactive state; and reward data, which is generated on the basis of the reward value, for use by the second application in the interactive state. The passing of the reward value from the first application to the second application occurs within the data processing device (100), with no communication between the data processing device (100) and the backend server (200) via the Internet (400) taking place.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: April 24, 2018
    Assignee: Outfit7 Limited
    Inventor: Samo Login
  • Patent number: 9955334
    Abstract: A method of performing proximity discovery for a network entity and a user equipment (UE). In one of the exemplary embodiments, this disclosure is directed to a generating method that is applicable to a network entity and includes at least but not limited to receiving a discovery request message comprising a ProSe application identifier (ID) and a UE identity, obtaining a discover code for performing the proximity discovery according to a target group of the UE identity, and transmitting a discovery response message comprising the discovery code in response to the discovery request message. The ProSe application ID indicates the target group of the UE identity.
    Type: Grant
    Filed: September 9, 2015
    Date of Patent: April 24, 2018
    Assignee: Acer Incorporated
    Inventor: Pei-Jung Chen
  • Patent number: 9954878
    Abstract: A network surveillance system, including a management server within a network of resources in which users access the resources in the network based on credentials, including a deployment module planting honeytokens in resources in the network, wherein a honeytoken is an object in memory or storage of a first resource that may be used by an attacker to access a second resource using decoy credentials, and wherein the deployment module plants a first honeytoken in a first resource, R1, used to access a second resource, R2, using first decoy credentials, and plants a second honeytoken in R2, used to access a third resource, R3, using second decoy credentials, and an alert module alerting that an attacker is intruding the network only in response to both an attempt to access R2 using the first decoy credentials, and a subsequent attempt to access R3 using the second decoy credentials.
    Type: Grant
    Filed: June 7, 2016
    Date of Patent: April 24, 2018
    Assignee: ILLUSIVE NETWORKS LTD.
    Inventors: Shlomo Touboul, Hanan Levin, Stephane Roubach, Assaf Mischari, Itai Ben David, Itay Avraham, Adi Ozer, Chen Kazaz, Ofer Israeli, Olga Vingurt, Liad Gareh, Israel Grimberg, Cobby Cohen, Sharon Sultan, Matan Kubovsky
  • Patent number: 9953166
    Abstract: A method for securely booting a target processor in a target system from a secure root of trust includes computing a message authentication code from boot code to be provided to the target processor, including an obfuscated algorithm for recreating the message authentication code in the target processor, serving the boot code to the target processor, executing the boot code to recreate the message authentication code in the target processor, serving the message authentication code back to the root of trust, comparing the returned message authentication code with the message authentication code generated in the root of trust, continuing execution of the boot code data if the returned message authentication code matches the message authentication code, and applying at least one penalty to the target system if the returned message authentication code does not match the message authentication code generated in the root of trust.
    Type: Grant
    Filed: July 3, 2014
    Date of Patent: April 24, 2018
    Assignee: Microsemi SoC Corporation
    Inventor: G. Richard Newell
  • Patent number: 9948647
    Abstract: Provided are a method and device for authenticating a static user terminal. The method comprises: an identity request message used for acquiring a user identity of the static user terminal is sent to the static user terminal; a response message is received from the static user terminal, wherein the response message carries the user identity of the static user terminal; and, an Extensible Authentication Protocol (EAP) authentication is performed on the static user terminal according to the user identity of the static user terminal. The present disclosure solves the problem in the related art of low security in the authentication on the static user terminal access the network, thus achieving the effects of increasing the security and reliability in the authentication on the static user terminal accessing the network and improving the WLAN service using experience of the static user.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: April 17, 2018
    Assignee: ZTE CORPORATION
    Inventors: Qiandeng Liang, Lei Shi, Na Song
  • Patent number: 9942378
    Abstract: Disclosed is a display device and a method for implementing an incoming notification function with respect to an MHL signal source. The display device includes: a control module, configured to control, when the display device is in a non MHL signal source pattern, a first MHL interface transfer switch, disposed between a signal decoding processor and an MHL signal source interface of the display device, to be on, and configured to start a background monitoring module electrically connected to the first MHL interface transfer switch, and further configured to display, if an MHL signal source is monitored to be connected, incoming reminder information according to a pre-configured incoming notification information or switch a current signal source pattern of the display device to be the MHL signal source pattern; and the background monitoring module, configured to monitor whether the MHL signal source is connected.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: April 10, 2018
    Assignee: SHENZHEN TCL NEW TECHNOLOGY CO., LTD
    Inventors: Ping Duan, Yangzhi Luo
  • Patent number: 9940146
    Abstract: Embodiments relate to controlling configuration of a computer system comprising one or more exchangeable components. The exchangeable components comprising identification means to store an identifier. A pair of a private key and a public key are generated for each accepted manufacturer of the exchangeable components and a pair of a private key and a public key for the computer system; assigning an identifier for each exchangeable component available for attachment to the system; receiving configuration data comprising a list of encrypted identity records comprising identifiers of the components together with signatures over the data generated with the private key of the respective component manufacturer for each component expected to be attached to the system; and receiving a configuration record. The configuration data of the expected components from the received configuration record is compared with the configuration data of the components attached to the system.
    Type: Grant
    Filed: June 4, 2015
    Date of Patent: April 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Andreas Bieswanger, Dirk Bolte, Carl Mayer, Thomas Pohl, Martin Troester
  • Patent number: 9942608
    Abstract: Systems and methods for changing TV operating mode in accordance with number of viewers present. In some implementations, a method includes: obtaining a total number of viewers of a connected TV, the connected TV having a plurality of operating modes and the total number is one or more; in accordance with a determination that the total number of viewers is within a first predefined range of a plurality of predefined ranges; placing or maintaining the connected TV in or into a first operating mode unrelated to media content being displayed on the connected TV; and in accordance with a determination that the total number of viewers is within a second predefined range of the plurality of predefined ranges: placing or maintaining the connected TV in or into a second operating mode unrelated to the media content, the second operating mode is different from the first operating mode.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: April 10, 2018
    Assignee: GOOGLE LLC
    Inventors: Alok Chandel, Eric H C Liu, Pierre-Yves Laligand, Justin Koh
  • Patent number: 9940449
    Abstract: A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user commands the client computer to encrypt an electronic file. The client computer generates a private key, encrypts the electronic file and transmits the key to the server computer. The client computer saves the encrypted file. The encrypted file and the key are saved at different physical locations. The owner of the file is able to grant permission to other registered users to unlock the encrypted file.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: April 10, 2018
    Inventor: James McNulty
  • Patent number: 9939074
    Abstract: Secured debug of an integrated circuit having a test operation mode and a secure mission operation mode. The integrated circuit has a processing unit, a test interface through which the test operation mode is controllable, an on-chip memory which is accessible in the test operation mode and in the secure mission operation mode, and one or more protected resources inaccessible in the test operation mode. The processing unit is configured, in the test operation mode, to receive an authenticated object through the test interface, and store the received authenticated object in the on-chip memory. The processing unit is moreover configured, upon reset into the secure mission operation mode, to execute a boot procedure to determine that the authenticated object is available in the on-chip memory, authenticate the authenticated object, and—upon successful authentication—render the more protected resources accessible to a debug host external to the integrated circuit.
    Type: Grant
    Filed: August 6, 2014
    Date of Patent: April 10, 2018
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventor: Peter Svensson
  • Patent number: 9935767
    Abstract: Methods, systems and computer readable media for configuring secure storage on a computing device. A method comprises: storing, at a first application running on a first computing device, authentication data associated with an authenticated communications session conducted between the first application and a second application running on a second computing device different from the first computing device; receiving, at the first application, an activation command comprising encryption data from the second application; authenticating, by the first application, the activation command based on the stored authentication data; and configuring, by the first application, secure storage on the first device based at least in part on the activation command received from the second application, wherein configuring the secure storage comprises encrypting application data associated with execution of the first application based on the encryption data.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: April 3, 2018
    Assignee: BlackBerry Limited
    Inventors: Johnathan George White, SeungSub Jung
  • Patent number: 9935962
    Abstract: Various embodiments provide systems and methods for connecting wireless-enabled products to wireless networks. Customer network credentials may be stored in a server along with a customer identifier (“customer ID”) during one-time registration. When a wireless-enabled product is purchased, a product identifier (“product ID”) and the customer's ID are forwarded to the server, which correlates the two identifiers, linking the purchased product to the customer. When the wireless-enabled product is powered on, the product accesses the server via a public network connection, and sends the product ID and a security token to the server. The server uses the product ID and the security token to authenticate the product. Once authenticated, the server uses the correlated customer ID to look up the network credentials for the customer's private network, and provides the network credentials to the wireless-enabled product.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: April 3, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Gregory Burns, Christopher Kavas, Marcello Lioy, Kenneth Swinson, Todd Malsbary, Matthew Michael
  • Patent number: 9935773
    Abstract: This application is directed to trusted platform module certification and attestation utilizing an anonymous key system. In general, TPM certification and TPM attestation may be supported in a device utilizing integrated TPM through the use of anonymous key system (AKS) certification. An example device may comprise at least combined AKS and TPM resources that load AKS and TPM firmware (FW) into a runtime environment that may further include at least an operating system (OS) encryption module, an AKS service module and a TPM Certification and Attestation (CA) module. For TPM certification, the CA module may interact with the other modules in the runtime environment to generate a TPM certificate, signed by an AKS certificate, that may be transmitted to a certification platform for validation. For TPM attestation, the CA module may cause TPM credentials to be provided to the attestation platform for validation along with the TPM and/or AKS certificates.
    Type: Grant
    Filed: February 13, 2017
    Date of Patent: April 3, 2018
    Assignee: INTEL CORPORATION
    Inventors: Nitin V. Sarangdhar, Daniel Nemiroff, Ned M. Smith, Ernie Brickell, Jiangtao Li
  • Patent number: 9930514
    Abstract: In order to reduce latency and overhead during the device discovery process, operations involved in pairing of two electronic devices may be predefined. In particular, when a user specifies a new electronic device in a list of their electronic devices, a computer provides a notification to these electronic devices. In response to the notification, a given one of the electronic devices generates encryption information and identification information for the given electronic device, and provides this encryption information and identification information to the new electronic device via a network (such as the Internet). Then, the new electronic device generates encryption information and identification information for the new electronic device, and provides this encryption information and identification information to the given electronic device via the network. This pairing information may subsequently facilitate secure wireless communication between the two electronic devices.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: March 27, 2018
    Assignee: Apple Inc.
    Inventors: Jason C. Conn, Akshay Mangalam Srivatsa, Craig P. Dooley, Michael J. Giles