Particular Communication Authentication Technique Patents (Class 713/168)
  • Patent number: 10673822
    Abstract: This invention establishes a protocol designed to mask the communication pattern that prevails within a group or a community, such that an outside observer has no knowledge as to who talks to whom within the protocol protected group, not how often, nor how much, or whether any communication takes place. Thereby an external observer is denied the intelligence borne in the very pattern of group communication.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 2, 2020
    Inventor: Gideon Samid
  • Patent number: 10673813
    Abstract: The present invention provides a method for NAT traversal in VPN so that the VPN can detect the rule of port allocation for NAT outside the VPN to achieve NAT traversal. The communication structure according to the present invention includes a public network, a client network, a destination network, a first NAT, a second NAT. A DNAT-T proxy server is installed between the first NAT and the second NAT and has the function for the VPN to conduct a plurality of (N times) registrations before sending data out to detect the rule for NAT port allocation of the DNAT-T proxy server, and then inform the next NAT port allocation to the other side of the VPN so as to achieve NAT traversal for the data packets in VPN.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: June 2, 2020
    Assignee: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Hsueh Ming Hang, Shaw Hwa Hwang, Cheng Yu Yeh, Bing Chih Yao, Kuan Lin Chen, Yao Hsing Chung, Shun Chieh Chang, Chi Jung Huang, Li Te Shen, Ning Yun Ku, Tzu Hung Lin, Ming Che Yeh
  • Patent number: 10674331
    Abstract: Technology for indoor location estimation of wireless stations is described. In one embodiment, a processing device identifies a plurality of wireless stations that support a signal round-trip-time measurement protocol. The processing device associates the plurality of wireless stations with one another to form a logical grouping of the plurality of wireless stations and provides an indication of the plurality of wireless stations in the logical grouping to each of the plurality of wireless stations. The processing device receives a first round-trip-time measurement value for a signal transmitted between a first wireless station and a second wireless station of the logical grouping and a second round-trip-time measurement value for a signal transmitted between the first wireless station and a third wireless station of the logical grouping. These round-trip-time measurement values indicate a distance between the wireless stations, respectively.
    Type: Grant
    Filed: March 12, 2019
    Date of Patent: June 2, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Rongsheng Huang, Shao-Cheng Wang, Jungtao Liu, Koohyun Um
  • Patent number: 10671734
    Abstract: Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers.
    Type: Grant
    Filed: January 10, 2020
    Date of Patent: June 2, 2020
    Assignee: Computer Protection IP, LLC
    Inventor: Ariel Silverstone
  • Patent number: 10672508
    Abstract: An intelligent gateway device provided at a premise (home or business) for providing and managing application services associated with use and support of a plurality of digital endpoint devices associated with the premises. The device includes a communications and processing infrastructure integrated with a peer and presence messaging based communications protocol for enabling communications between the device and an external support network and between the device and connected digital endpoint devices. A services framework at the gateway device implements the communications and processing infrastructure for enabling service management, service configuration, and authentication of user of services at the intelligent gateway. The framework provides a storage and execution environment for supporting and executing received service logic modules relating to use, management, and support of the digital endpoint devices.
    Type: Grant
    Filed: July 17, 2019
    Date of Patent: June 2, 2020
    Assignee: KIP PROD P1 LP
    Inventors: Amir Ansari, George A. Cowgill, Ramprakash Masina, Jude P. Ramayya, Alvin R. McQuarters, Atousa Raissyan, Leon E. Nicholls
  • Patent number: 10667126
    Abstract: A radio access network, RAN, node configures user plane access stratum, AS, security in a wireless communication system that includes a radio access network, RAN, and a core network, CN. The RAN node is configured to receive, from the CN, signaling that indicates a decision by the CN of whether or not the RAN node is to activate user plane AS security and that indicates whether or not the RAN node is allowed to overrule the decision by the CN. For example, the signaling may indicate whether the decision by the CN is a command that the RAN node must comply with or a preference that the RAN node is permitted to overrule. Regardless, the RAN node may also be configured to activate or not activate user plane AS security, depending on the signaling.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: May 26, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Monica Wifvesson, Prajwol Kumar Nakarmi, Pasi Saarinen, Vesa Torvinen
  • Patent number: 10666445
    Abstract: Implementations of the present disclosure include identifying, by a relay that is communicatively linked with a first blockchain instance and a second blockchain instance in a unified blockchain network, a blockchain domain name of a first blockchain instance; identifying a blockchain domain name of the second blockchain instance; receiving, from a node of the first blockchain instance, an access request for accessing the second blockchain instance, wherein the access request including the blockchain domain name of the second blockchain instance; identifying a chain identifier of the second blockchain instance based on the blockchain domain name of the second blockchain instance, wherein the chain identifier of the second blockchain instance indicates a blockchain network configuration of the second blockchain instance; and providing access to the second blockchain instance for the first blockchain instance based on the blockchain network configuration indicated by the chain identifier of the second blockchai
    Type: Grant
    Filed: April 22, 2019
    Date of Patent: May 26, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Honglin Qiu
  • Patent number: 10664581
    Abstract: A biometric-based authentication method, an apparatus, and a system are described. The method includes: receiving a biometric image to be authenticated sent from a client; performing feature extraction to the biometric image to be authenticated to obtain a biometric template to be authenticated; comparing the biometric template to be authenticated with a locally-stored biometric template; and returning an authentication result. In this case, the feature extraction process may be implemented at a cloud server side, as such, the complexity of the client may be reduced, the expandability of the client may be increased, a limitation that the biometric recognition may only be implemented on the client may be eliminated, and diversified utilization may be supported.
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: May 26, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Jie Hou, Pengfei Xiong, Hailong Liu, Bo Chen
  • Patent number: 10666438
    Abstract: A memory storage device is fabricated using a semiconductor fabrication process. Often times, manufacturing variations and/or misalignment tolerances present within the semiconductor fabrication process can cause the memory storage device to differ from other memory storage devices similarly designed and fabricated by the semiconductor fabrication process. For example, uncontrollable random physical processes in the semiconductor fabrication process can cause small differences, such as differences in doping concentrations, oxide thicknesses, channel lengths, structural widths, and/or parasitics to provide some examples, between these memory storage devices. These small differences can cause bitlines within the memory storage device to be physically unique with no two bitlines being identical. As a result, the uncontrollable random physical processes in the semiconductor fabrication process can cause electronic data read from the memory storage device to propagate along the bitlines at different rates.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: May 26, 2020
    Assignee: Taiwan Semiconductor Manufacturing Co., Ltd.
    Inventors: Jui-Che Tsai, Cheng Hung Lee, Shih-Lien Linus Lu, Yi-Ju Chen
  • Patent number: 10666625
    Abstract: A communication apparatus transmits a search signal including information based on a character string input by a user, the search signal being used to search for a providing apparatus that provides a communication parameter. Upon reception of a response to the search signal, the communication apparatus starts communication parameter sharing processing with a providing apparatus that has transmitted the response.
    Type: Grant
    Filed: July 13, 2016
    Date of Patent: May 26, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventor: Tsuyoshi Terao
  • Patent number: 10666442
    Abstract: An example operation may include one or more of hashing a password received from a user device to create one or more password hash values, determining whether the one or more password hash values match any internal password hash values of an internal password history chain stored in a blockchain, and providing an access level to the user device assigned to the matched one or more internal password hash values.
    Type: Grant
    Filed: November 29, 2017
    Date of Patent: May 26, 2020
    Assignee: International Business Machines Corporation
    Inventors: Debbie Anglin, Howard Anglin, Su Liu, Yu Liu
  • Patent number: 10664737
    Abstract: The mechanically stable value or security document 2000 according to the invention comprising an electric circuit 1270 is characterised by the following features: the document is formed of at least three document layers which are arranged in a stack 1700 and which are connected together face-to-face by a joining method, wherein a first document layer is formed by a circuit carrier layer 1200 which supports the electric circuit 1270, at least one second document layer is formed in each case by a compensation layer 1100 which has at least one opening 1120 and/or recess, and at least one third document layer is formed in each case by an outer cover layer 1300. The first 1200, the at least one second 1100, and the at least one third document layer 1300 are formed from a fibre composite material.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: May 26, 2020
    Assignee: BUNDESDRUCKEREI GmbH
    Inventors: Jörg Fischer, Stefan Trölenberg, Markus Tietke, Frank Fritze, Jakob Hille, Micha Kraus
  • Patent number: 10659231
    Abstract: A wearable device transmits a service request generated by the wearable device to a server, where the service request is associated to a service application type. The wearable device receives an identity authentication request message associated to the service application type from the server using a preset standard interface. The wearable device verifies a signature in the identity authentication request message according to a public key of the service application type. In response to verifying the signature, the wearable device retrieves service authentication information of an account corresponding to the identity authentication request message from a locally pre-stored service authentication information database. The wearable device transmits a verification response message comprising the acquired service authentication information to the server using the preset standard interface.
    Type: Grant
    Filed: March 13, 2018
    Date of Patent: May 19, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Yuanbo Sun
  • Patent number: 10657284
    Abstract: Systems and methods for retrieving a data object. An example method includes: receiving a query comprising a field identifier and a field value related to the field identifier; determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers; in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator; identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and decrypting and forwarding the one or more encrypted values as a response to the query.
    Type: Grant
    Filed: May 21, 2018
    Date of Patent: May 19, 2020
    Assignee: UBIQ SECURITY, INC.
    Inventors: Linda Eigner, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
  • Patent number: 10657231
    Abstract: Embodiments of the present invention provide an authenticating service of a chip having an intrinsic identifier (ID). In a typical embodiment, an authenticating device is provided that includes an identification (ID) engine, a self-test engine, and an intrinsic component. The intrinsic component is associated with a chip and includes an intrinsic feature. The self-test engine retrieves the intrinsic feature and communicates it to the identification engine. The identification engine receives the intrinsic feature, generates a first authentication value using the intrinsic feature, and stores the authentication value in memory. The self-test engine generates a second authentication value using an authentication challenge. The identification engine includes a compare circuitry that compares the first authentication value and the second authentication value and generates an authentication output value based on the results of the compare of the two values.
    Type: Grant
    Filed: January 3, 2019
    Date of Patent: May 19, 2020
    Assignee: International Business Machines Corporation
    Inventors: Srivatsan Chellappa, Subramanian S. Iyer, Toshiaki Kirihata, Sami Rosenblatt
  • Patent number: 10659414
    Abstract: A unique electronic communications account is generated and linked to a physical address of a user. A network of electronic mail addresses linked to physical addresses can be used for the transmission of information in electronic or physical form. Users can send information to a single recipient or multiple recipients by selecting the recipient or an area of recipients on a map generated by the system. A plurality of users can use a single e-mail address linked to a physical address through creation and storage of user profiles. Users can deactivate and transfer their unique electronic mail address upon relocation to a new physical address. The communication platform can overcome technical problems and limitations of electronic mail existing today. The communication platform can create a transparent global communication that can be achieved via an electronic communications account that can be created for every physical address in the world.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: May 19, 2020
    Assignee: Alphabet Communications, Inc.
    Inventor: Shafin Valla
  • Patent number: 10652268
    Abstract: Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: May 12, 2020
    Assignee: Qualys, Inc.
    Inventors: Wissam Ali-Ahmad, Wolfgang Kandek, Holger Kruse, Vikas Dewan, Khair-ed-dine Mazboudi, Ganesh Jampani, Kenneth K. Okumura
  • Patent number: 10650414
    Abstract: A method of generating an audience of user equipment users according to a user-searchable index for audience curation. The method includes generating the user-searchable index for audience curation, receiving user input describing a user's desired characteristic of an audience as user-friendly input through a public-facing selection interface, and parsing the user input to generate a distributed search query complying with a search syntax of a search engine. The method further includes searching the user-searchable index to determine a quantity of prospective audience members having the desired characteristic, transmitting the quantity of prospective audience members to the user to cause a terminal of the user to display the quantity of prospective audience members on a display, and transmitting the query to a first network element configured to execute the query to perform a desired action of the user when the user approves the quantity of prospective audience members.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: May 12, 2020
    Assignee: Sprint Communications Company L.P.
    Inventors: Jason R. Delker, Wayne William Schroeder
  • Patent number: 10652766
    Abstract: Disclosed is method and apparatus for operating a wireless network, the wireless network including a first eNB and a second eNB, including establishing an X2 interface between the first eNB and the second eNB and exchanging parameters between the first eNB and the second eNB via the X2 interface.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: May 12, 2020
    Assignee: Signal Trust for Wireless Innovation
    Inventors: Peter S. Wang, Ulises Olvera-Hernandez, James M. Miller, Louis J. Guccione
  • Patent number: 10650159
    Abstract: An electronic device. The electronic device comprises a memory comprising a confidential information region and a non-confidential information region, a processor, and an application stored in the memory. When executed by the processor, the application determines if a reboot has occurred after a most recent power-off boot, where a reboot takes place without removing power from the processor and memory and, in response to determining that the reboot occurred after the most recent power-off boot, prevents access of applications to the confidential information region in the memory.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: May 12, 2020
    Assignee: Sprint Communications Company L.P.
    Inventors: Lyle W. Paczkowski, William M. Parsel, Carl J. Persson, Matthew C. Schlesener
  • Patent number: 10652748
    Abstract: The present disclosure discloses a method of allowing WebView to verify the source context, source reputation, integrity and/or security level of a web content and inform the user with regards to the security and blocks web contents that are determined harmful or inappropriate. In one embodiment of the present disclosure, the WebView checks a trusted data source to see if the visited web content has been labeled or flagged as suspect, safe or unsafe by initiating a connection to a trusted third-party database using a to determine whether or not the URL is associated with a domain that has been classified or labeled as safe or unsafe. The WebView then informs the user about the security level, suspect quality, reputation and/or integrity of the web content through a visual indicator or it can redirect the user to a warning page explaining why access to the site is prohibited, or it can block access without warning.
    Type: Grant
    Filed: January 29, 2018
    Date of Patent: May 12, 2020
    Inventor: Paul Fergus Walsh
  • Patent number: 10652219
    Abstract: A system and method for dynamic geospatially-referenced cyber-physical infrastructure inventory and asset management in which a wireless computing device is attached to the physical assets in an inventory, wherein each wireless computing device tracks at least one characteristic of the physical asset to which it is attached, such as the location of the physical asset, and periodically transmits an encrypted message to a second computer, which verifies the identification of the wireless computing device and that the contents of the message have not been changed, and updates the record of the physical asset in a database.
    Type: Grant
    Filed: February 23, 2018
    Date of Patent: May 12, 2020
    Assignee: QOMPLX, INC.
    Inventors: Jason Crabtree, Andrew Sellers
  • Patent number: 10652245
    Abstract: Methods and apparati for permitting Computing Devices 200 to safely accept Payloads 220 from External Access Entity Devices 260, and to safely access external Networks 710. In an apparatus embodiment, a Computing Device 200 contains an Access Control Module 210 comprising an Access Verification Public Key 211 and a Device Signature Key 214. The Access Control Module 210 is configured to verify authorization of an External Access Payload 220 by verifying a digital signature affixed to the Payload 220 using the Access Verification Public Key 211. The authorized External Access Payload 220 is then permitted to execute on the Computing Device 200. The Access Control Module 210 is also configured to receive from a Network Access Device 600 information associated with a Network 710 access request, and to create a plurality of digital signatures, using the Device Signature Key 214, that link said information associated with the Network 710 access request with the Access Verification Public Key 211.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: May 12, 2020
    Inventor: Ernest Brickell
  • Patent number: 10650625
    Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: May 12, 2020
    Assignee: Live Nation Entertainment, Inc.
    Inventors: Kenneth Ives-Halperin, Harry C. Evans, David Johnson, Scott Wall, David Lilly, Ajay Pondicherry
  • Patent number: 10645086
    Abstract: A system and method detects and handles replay attacks using counters maintained for each of several different periods for various values of IP addresses and browser description attributes encountered.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: May 5, 2020
    Assignee: Charles Schwab & Co., Inc.
    Inventor: Steven Hadler
  • Patent number: 10642974
    Abstract: An application security protection processing method and device, and terminal device are disclosed. The method includes: acquiring a sample application from one or more applications installed on a terminal device; performing an image processing to a first sample icon of the sample application, and generating a second sample icon having a protection mark; and displaying an application security protection prompt message carrying the second sample icon on an interface of the terminal device.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: May 5, 2020
    Assignee: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO., LTD.
    Inventors: Yian Lin, Shiduo Yang
  • Patent number: 10644885
    Abstract: The Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (“SFTSP”) transforms transaction signing request, key backup request, key recovery request inputs via SFTSP components into transaction signing response, key backup response, key recovery response outputs. A key backup request that includes an encrypted master key associated with a hosting HSM is received by a backup HSM from a backup utility. A private key decryption key corresponding to a public key encryption key previously provided by the backup HSM to the backup utility for the hosting HSM is retrieved from the backup HSM's tamper-proof storage and used to decrypt the encrypted master key. A specified number of master key shares to generate for the decrypted master key is determined and generated using a secret sharing method. The generated master key shares are provided to the backup utility.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: May 5, 2020
    Assignee: FMR LLC
    Inventors: Gang Cheng, Vladimir Tsitrin, Thomas Stephen McGuire
  • Patent number: 10637659
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for secure multi-party computation. One of the methods includes identifying a trusted input data item that is homomorphically encrypted; generating a message authentication code (MAC) key share; generating a MAC share associated with the trusted input data item, wherein the MAC share is a random number; generating a ciphertext based on the trusted input data item, the MAC key share, and the MAC share; sending the ciphertext to the second computing device, wherein the second computing device uses the ciphertext as a component of a MAC share associated with the secret input data item; and after the multi-party computation is completed by the plurality of computing devices, verifying a result of the multi-party computation based at least in part on the MAC share associated with the secret input data item.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: April 28, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Lichun Li, Wenzhen Lin, Zheng Liu, Shan Yin
  • Patent number: 10637855
    Abstract: A server obtains a challenge from another computer system during a negotiation with a client according to a protocol. The server injects the challenge into a message of the protocol to the client. The client uses the challenge in an authentication request. The server submits the authentication request to the other computer system for verification. The other computer system verifies the authentication request using a key registered to the client. The server operations are further dependent at least in part on whether verification of the authentication request was successful.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: April 28, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Andrew Paul Mikulski, Nicholas Alexander Allen, Gregory Branchek Roth
  • Patent number: 10637857
    Abstract: A registering method involving an authenticating device includes: a client obtains a URI, obtains an application ID according to the URI, obtains a device registering request according to the application ID and a user identification input, and sends the request to a server; receives registering data from the server, and obtains a client data object according to a challenge value and the application ID in the registering data; hashes the client data object and the application ID to obtain a challenge parameter and an application parameter, sends registering request information combining the challenge parameter and application parameter; receives registering response information from the authenticating device, sends a key registering request combining the registering response information, client data object and session ID in the registering data to the server; and the registering is deemed successful if success information is received from the server, or is failed if otherwise.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: April 28, 2020
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 10630481
    Abstract: Method and apparatus are disclosed for controller area network message authentication. An example disclosed vehicle includes a data bus and a first control unit communicatively coupled to the data bus. The example first control unit generates a secured message by (a) calculating a message authentication code, (b) truncating the message authentication code, (c) truncating a freshness value used to generate the message authentication code, and (d) placing portions of the truncated message authentication code and the truncated freshness value in separate portions of the secured message.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: April 21, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: James Martin Lawlis, Douglas A. Oliver, Xin Ye
  • Patent number: 10630697
    Abstract: The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: April 21, 2020
    Assignee: SONICWALL INC.
    Inventors: Hui Ling, Cuiping Yu, Zhong Chen
  • Patent number: 10628332
    Abstract: A semiconductor device, semiconductor system, and system may be provided. The semiconductor system may include one semiconductor device of a first semiconductor device and a second semiconductor device suitable for transmitting and receiving addresses and encrypted data. The one semiconductor device may include an address output circuit configured to output the addresses. The one semiconductor device may include an encryption circuit configured to output the encrypted data based on normal data and the addresses. The one semiconductor device may include a decryption circuit configured to output the normal data based on the addresses and the encrypted data.
    Type: Grant
    Filed: July 8, 2016
    Date of Patent: April 21, 2020
    Assignee: SK hynix Inc.
    Inventor: Yong-Deok Cho
  • Patent number: 10630465
    Abstract: Plurality of users share a common key while permitting dynamic member change and computational complexity required for key exchange is reduced. The first key generation unit 212 of the communication devices Ui computes Ri and ci, or ci based on a twisted pseudo-random function. A session ID generation unit 113 of a key distribution device S generates sid based on a target-collision resistant hash function and transmits sid to the communication devices Ui. A second key generation unit 214 of the communication devices Ui computes Ti based on a pseudo-random function. A third key generation unit 115 of the key distribution device S computes k? and T?i based on the twisted pseudo-random function. A session key generation unit 217 of the communication devices Ui generates the common key K2 based on a pseudo-random function.
    Type: Grant
    Filed: April 14, 2017
    Date of Patent: April 21, 2020
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Tetsutaro Kobayashi, Reo Yoshida, Hitoshi Fuji, Tomohide Yamamoto, Yuto Kawahara, Kazuki Yoneyama
  • Patent number: 10631163
    Abstract: A Long Term Evolution (LTE) base station, a user equipment (UE) and pre-association and pre-authentication methods thereof in a WWAN-WLAN aggregation are provided. In a Carrier Aggregation, the LTE base station is a primary cell of an Evolved Node B (eNB) and a WLAN access point (AP) is a secondary cell of the eNB. In a Dual Connectivity, the LTE base station is a master eNB and the WLAN AP is a secondary eNB. The pre-association and pre-authentication method of the LTE base station comprises the following steps. A WLAN information is received from a user equipment (UE) by the LTE base station. A WLAN authentication procedure is assisted for the UE by the LTE base station. The UE is commanded to establish a WLAN link with the WLAN AP by the LTE base station.
    Type: Grant
    Filed: December 28, 2015
    Date of Patent: April 21, 2020
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Tzu-Jane Tsai, Wei-Chen Pao
  • Patent number: 10623445
    Abstract: An endpoint security agent facilitates a security policy on an endpoint computing device. The endpoint agent comprises an engine and one or more plugins that each provide a particular security feature. The endpoint agent receives a policy from a cloud server specifying one or more plug-ins used by the policy and configuration of those plug-ins. The endpoint agent retrieves, installs, and configures the one or more plugins. The endpoint agent updates a communication table with command subscription information obtained from each installed plugin indicating command types subscribed to by each plug-in. When a command is received, a lookup of the command type is performed in the table, and the command is sent to the subscribing plugin.
    Type: Grant
    Filed: February 22, 2019
    Date of Patent: April 14, 2020
    Assignee: Malwarebytes Inc.
    Inventors: Kevin Douglas Breton, Mark Patton
  • Patent number: 10623397
    Abstract: Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login identity provider username and password. When the user registers for the first time, the system collects additional information to verify the user for a subsequent access to the system. The system also automatically creates a system secret username and secret, highly securely generated password, both of which are unknown and inaccessible to the user. The secret username and password are stored in a lightweight directory access protocol (LDAP) server or database or in a distributed cloud database system. The system also maps the login identity provider user name to the secret user name and password for subsequent usage.
    Type: Grant
    Filed: May 18, 2018
    Date of Patent: April 14, 2020
    Assignee: Avatier Corporation
    Inventor: Nelson A. Cicchitto
  • Patent number: 10614535
    Abstract: A method and apparatus for controlling digital evidence comprising creating a case record comprising information about an investigative case, electronically storing at least one piece of digital evidence into memory, and associating the stored at least one piece of evidence with the case record.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: April 7, 2020
    Assignee: DFLabs S.p.A.
    Inventor: Dario V. Forte
  • Patent number: 10616194
    Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. If the keys used to encrypt the data have not been exposed during serialization operation, they may be deleted or destroyed enabling the destruction of data encrypted with the keys.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: April 7, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Todd Lawrence Cignetti, Andrew J. Doane, Eric Jason Brandwine, Robert Eric Fitzgerald
  • Patent number: 10616905
    Abstract: Systems, methods, and instrumentalities are disclosed to describe reporting and/or reacting to a mobility event. A wireless transmit/receive unit (WTRU) may comprise a processor configured, at least in part, to establish a proximity service (ProSe) session with a second WTRU, detect the occurrence of a mobility event in a cellular network while the ProSe session is ongoing, determine a type of action to be performed with respect to the ProSe session based on one or more of the type of mobility event and type of ProSe session, and transmit a notification to a node in the cellular network, wherein the notification includes an indication of an action to be performed on the ProSe session. The node may be one of an evolved Node B (eNB), proximity server, or mobility management entity (MME). The node may be the second WTRU.
    Type: Grant
    Filed: April 12, 2018
    Date of Patent: April 7, 2020
    Assignee: INTERDIGITAL PATENT HOLDINGS, INC.
    Inventors: Mahmoud Watfa, Guanzhou Wang, Saad Ahmad, Li-Hsiang Sun
  • Patent number: 10616222
    Abstract: Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators. A first authenticator from the stored authenticators is selected to be used for authenticating the user based on an authentication policy received from the enterprise. An authentication request is transmitted to a user device requesting the first authenticator and the user is authentication by comparing the received authenticator with the stored first authenticator.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: April 7, 2020
    Assignee: Early Warning Services, LLC
    Inventors: Andrew Robert Rolfe, Alan Dundas, Gregory Slowiak
  • Patent number: 10609201
    Abstract: When a monitoring task is executed, a management server acquires setting information from a monitoring target device, compares the acquired setting information with setting information for monitoring the monitoring task, and determines whether a difference exists between the acquired setting information and the setting information for monitoring. If a difference exists, the management server performs a process according to a monitoring setting of the monitoring task.
    Type: Grant
    Filed: July 6, 2016
    Date of Patent: March 31, 2020
    Assignee: CANON KABUSHIKI KAISHA
    Inventor: Junji Sato
  • Patent number: 10608910
    Abstract: Efficiently and reliably tracking information for devices in a network, for example, a heterogeneous network of a plurality of devices of different types, includes collecting and storing information in a computationally efficient and secure manner that ensures to a high degree of certainty the integrity of the information for future access and use. The information may be collected from one or more sensors/data sources, for example, over a predetermined period of time, and may be grouped into a single transaction record. The transaction record may be sent from a gateway to a server of a network cloud, for example, during a predefined time slot of cycle based in part on the number of gateways and sensors in the system. Each transaction record may include a one-way hash of, and a reference to, an immediately preceding transaction record for the overall system for which information is being tracked.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: March 31, 2020
    Assignee: MyOmega Systems GmbH
    Inventor: Bernd Moeller
  • Patent number: 10609552
    Abstract: The present disclosure provides a data communication method and system. The method includes: a first terminal transmitting first data to a second terminal, and starting timing from a time point when finishing transmitting the first data, the first data at least comprising data to be processed; the second terminal receiving the first data, and starting timing from a time point when finishing receiving the first data; when a value obtained by the second terminal from the timing reaches a preset value, the second terminal transmitting second data to the first terminal, the second data being data obtained by the second terminal performing data processing on the data to be processed; and when a value obtained by the first terminal from the timing is in a valid range of the preset value or reaches the preset value, the first terminal allowing to start receiving the second data.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: March 31, 2020
    Assignee: TENDYRON CORPORATION
    Inventor: Ming Li
  • Patent number: 10609012
    Abstract: There is provided a method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. Furthermore, a corresponding computer program product and a corresponding security token are provided.
    Type: Grant
    Filed: October 29, 2014
    Date of Patent: March 31, 2020
    Assignee: NXP B.V.
    Inventors: Thomas Suwald, Arne Burghardt
  • Patent number: 10607427
    Abstract: An information processing apparatus including circuitry configured to obtain, from sensors, first and second observation information related to at least one characteristic of a user, recognize the user based on correlation between the first and second observation information, and initiate an execution function associated with the recognized user.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: March 31, 2020
    Assignee: SONY CORPORATION
    Inventors: Masaharu Nagata, Yasuhiro Matsui, Kiyoshi Yoshikawa
  • Patent number: 10602356
    Abstract: A method performed by a proximity service server is disclosed. The method comprises generating a ProSe query code and a ProSe response code, sending at least a the ProSe response code together with a first and a second discovery key to a first end device, and sending at least the first discovery key and the ProSe query code to a second end device, so that the second end device can securely discover the first end device over an air interface.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: March 24, 2020
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Vesa Lehtovirta, Katharina Pfeffer, Vesa Torvinen, Monica Wifvesson
  • Patent number: 10601782
    Abstract: Methods in a cloud object store facilitate strong data encryption, customer-management of object (encryption) keys, reductions in latency, globally-distributed object storage, and handling of streamed uploads. A method for encrypting objects stored in a cloud includes encrypting each object with a unique encryption (object) key. The plaintext object keys are generated in advance of uploads. The plaintext object keys can be stored in an object database in the cloud. Alternatively, the plaintext object keys can be provided to a customer's HSM, encrypted, and returned to the cloud, such that encrypted object keys, encrypted by the customer, are stored in the cloud. The cloud can alternatively encrypt the customer's object keys with a master key for the customer, which is then encrypted by the customer's HSM before being stored in the cloud. Proxies are also deployed for efficiently communicating with customer security modules.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 24, 2020
    Assignee: Egnyte, Inc.
    Inventors: Sachin Shetty, Amrit Jassal, Krishanu Lahiri, Yogesh Rai, Manoj Chauhan, Leszek Jakubowski
  • Patent number: 10601832
    Abstract: A system for re-registering an input-limited device, such as a voice-enabled device, with a captive portal access point that requires completion of a portal webpage prior to allowing client devices access to a network, such as the Internet, is described. Such captive portal access points are commonly found in hotels, and may be used for both freely provided public WiFi and for connections that require providing payment. For re-registration of the input-limited device with the captive portal access point, a server may send a notification to a mobile computing device associated with the input-limited device.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: March 24, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Ambika Pajjuri, Soniya Jobanputra, David Pathakjee, Thomas Daniel Mueller, Ezekiel Wade Sanborn de Asis
  • Patent number: 10601824
    Abstract: Disclosed is a method for granting access for a device to a private local network with a gateway device. The method includes: establishing a connection over the gateway device, wherein a request for accessing the private local network is transmitted; transmitting information on the device; receiving a request for preparing a setup of an authentication procedure; generating a pair of authentication keys; providing one of the generated authentication keys to the device requesting the access to the private local network; initiating the authentication procedure; granting access to the private local network for the device in response to a successful authentication procedure. The invention also relates to a gateway device, a computer program product and a system.
    Type: Grant
    Filed: November 8, 2017
    Date of Patent: March 24, 2020
    Assignee: TELIA COMPANY AB
    Inventors: Michael Huber, Nils-Goran Magnusson, Per-Ola J. Wester