Authentication Of An Entity And A Message Patents (Class 713/170)
  • Patent number: 10999329
    Abstract: Disclosed are various examples for enforcing network access permissions on applications that are installed on a client device. A network whitelist or network blacklist can be deployed by a management service onto a managed client device. A management component can facilitate enforcement of the whitelist and/or blacklist to enforce network access rules on installed applications.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: May 4, 2021
    Assignee: VMware, Inc.
    Inventors: Gaurav Verma, Suchit Shivashankar, Don Joy
  • Patent number: 10986150
    Abstract: The disclosed technology teaches distributed routing and load balancing in a dynamic service chain: receiving and processing a packet, with added header including stream affinity code, at a first service instance and based on processing determining a second service, among available services, that should next handle the packet. The technology teaches accessing a flow table using the stream affinity code in the header to select a service instance performing the second service in the service chain, and routing the packet to the second service instance upon egress from the first service instance. When the flow table lacks an entry for the second service corresponding to the stream affinity code, the disclosed technology teaches accessing a consistent hash table of service instances performing the second service, selecting an available instance, and updating the flow table to specify the second service instance as providing the second service for packets sharing the header.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: April 20, 2021
    Assignee: Netskope, Inc.
    Inventors: Ravi Ithal, Umesh Bangalore Muniyappa
  • Patent number: 10983740
    Abstract: User information is obtained, and an access token for receiving provision of a service from a service provider is obtained. The obtained access token is stored in a memory unit in association with the user information. In accordance with an instruction, the service provider is accessed using the access token stored in the memory unit, and a function corresponding to the instruction is executed.
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: April 20, 2021
    Assignee: Canon Kabushiki Kaisha
    Inventor: Nobuyuki Tonegawa
  • Patent number: 10979403
    Abstract: A system and method for providing data such as credentials to a third-party service while protecting the data from being transmitted to unintended locations. The system receives a first request containing encrypted data and information identifying the third-party service, validates that the first request is to be transmitted to the third-party service, generates a second request by replacing the encrypted data from the first request with unencrypted data, and transmits the second request to the third-party service.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: April 13, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Dan Mutescu, Cristi Ursachi
  • Patent number: 10972283
    Abstract: A system, method, and computer program product are provided for implementing zero round trip secure communications based on a noisy secret. In operation, a sender system utilizes a randomly generated message key for encrypting a message to send to a receiver system. The sender system selects a plurality of different sub-keys from a negotiated noisy secret to encrypt the randomly generated message key. The sender system encrypts the message utilizing the randomly generated message key. The sender system sends the encrypted message, all encrypted message keys, and a message MAC that is calculated and added for every sub-key, to the receiver system such that the receiver system is able to perform a MAC-based verification to test sub-key validity of the plurality of different sub-keys.
    Type: Grant
    Filed: March 13, 2019
    Date of Patent: April 6, 2021
    Assignee: DIGITAL 14 LLC
    Inventors: Serguei Velikevitch, Alexander Sherkin
  • Patent number: 10936720
    Abstract: A method for reliable computation of a program P includes generating, by a verifier, a public verification key vkp and a public evaluation key (ekp), both on a basis of the program P, providing, by the verifier, a number N at random and sending the number N to the at least one provider, producing, by the at least one provider, at least one output Si concatenated with N and producing a signature ?i over a corresponding input into the at least one provider and/or corresponding data within the at least one provider, both the input and/or the data signed under a secret key ski, so that a pair of output and signature (Si, ?i) is transmitted to the computing unit. The verifier verifies the proof ?y using the public verification key vkp and rejects y, if the proof verification fails.
    Type: Grant
    Filed: July 10, 2015
    Date of Patent: March 2, 2021
    Assignee: NEC CORPORATION
    Inventors: Sebastian Gajek, Francesco Alesiani
  • Patent number: 10931667
    Abstract: Systems and methods involving a user authentication system for granting access to digital systems and content, computing systems and devices and physical locations. The authentication system granting access to digital systems and content involves a mobile device, a computing device and a server. The authentication system granting access to computing systems and devices and physical locations involves a mobile device, an interface device, a secure system and a server. The authentication systems described permit a user to access digital systems and content, computing systems and devices and physical locations using only the user's mobile device. The mobile device runs mobile application that performs the authentication functionality using biometric data obtained on the mobile device. The authentication data is stored on the mobile device in an encrypted format and is not shared with the other devices in the authentication system.
    Type: Grant
    Filed: August 30, 2018
    Date of Patent: February 23, 2021
    Inventor: Baldev Krishan
  • Patent number: 10924925
    Abstract: Techniques for secure pairing for devices with Near Field Communications (NFC) tags equipped with authentication are provided. In one aspect a device with a passive near field communication tag including a private key for authentication is provided. The device may send a challenge request to a host device including an active NFC tag via a wireless communication protocol. The challenge request may be combined with a shared secret value known to the device and the host device to create a challenge request seed. The challenge request seed may be combined with the private key to compute a verified challenge request response. A challenge request response may be received from the host device via the wireless communication protocol. The challenge request response and verified challenge request response may be compared to authenticate the host device to the device.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: February 16, 2021
    Assignee: MOTOROLA SOLUTIONS, INC.
    Inventor: Daniel Grobe Sachs
  • Patent number: 10908805
    Abstract: A method of executing an application in a wearable device and a wearable device are disclosed, the method including receiving an input requesting execution of a first application, acquiring time information required to execute the first application in response to the input, and scrolling and displaying a predetermined image in a first direction until the execution of the first application based on the time information.
    Type: Grant
    Filed: May 1, 2018
    Date of Patent: February 2, 2021
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Jin Yoon, Young-joo Park
  • Patent number: 10904255
    Abstract: Disclosed is an electronic device including a storage storing contents, a display, and a processor configured to set one or more access authorities of one or more applications for accessing the contents stored in the storage while the one or more applications is installed, based on detecting at least one application of the one or more applications to access the contents, display, on the display, a message requesting changing at least one access authority of the at least one application of the one or more applications for accessing the contents, and based on an input associated with the message, change the at least one access authority of the at least one application of the one or more applications for accessing the contents.
    Type: Grant
    Filed: April 1, 2020
    Date of Patent: January 26, 2021
    Inventors: Okseon Lee, Yongseok Park, Jinho Lee, Youngki Hong
  • Patent number: 10891139
    Abstract: Technologies are disclosed herein that allow for utilization of firmware specific data through an Advanced Configuration and Power Interface (ACPI) Firmware Identification (FID) table in a computing system. The ACPI FID table can be loaded during a boot of a computer system. The ACPI FID table can be read after an operating system has been loaded on the computer system. Based upon firmware specific data in the ACPI FID table, functionality provided by the application can be restricted. The use of various features provided by the application can be restricted or the application can be restricted from executing entirely. Compatibility between the application and the firmware can be ensured based upon firmware specific data in the ACPI FID table.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: January 12, 2021
    Assignee: American Megatrends International, LLC
    Inventors: Paul Anthony Rhea, Stefano Righi, Oleksiy Yakovlev
  • Patent number: 10887089
    Abstract: A network node of a mobile communications network may need to generate at least one new Input Offset Value, IOV value, for use in protecting communications between the network node and a mobile station. The network node then associates a fresh counter value with the or each new IOV value; calculates a Message Authentication Code based on at least the at least one new IOV value, the fresh counter value associated with the or each new IOV value, and a constant indicating that the Message Authentication Code is calculated to protect the new IOV value; and transmits the at least one new IOV value, the fresh counter value associated with the or each new IOV value, and the calculated Message Authentication Code to the mobile station.
    Type: Grant
    Filed: June 2, 2017
    Date of Patent: January 5, 2021
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Vesa Torvinen, Nicklas Johansson, Atle Monrad, Gang Ren, Mikael Wass, Monica Wifvesson
  • Patent number: 10867056
    Abstract: The disclosure relates to a method and a system for data protection. The system provides a key server and a software sequence executed in a user device. The software sequence renders the method. In the method, a user value associated with a user's registered data in the key server is provided according to the user's input data; a server value is generated by the key server when the key server identifies the user; and a device value is generated according to the hardware information of the user device. The data in the user device can be effectively protected by an encryption process using the user value, the server value and the device value. A data protection mechanism with high-level security can be achieved when the data is protected in the encryption process incorporating the user-related user value, the device-related device value, and the server-related server value.
    Type: Grant
    Filed: January 10, 2018
    Date of Patent: December 15, 2020
    Assignee: IDGATE CORPORATION
    Inventor: Ke-Hsi Hsiang
  • Patent number: 10853501
    Abstract: Data processing systems and methods, according to various embodiments, are adapted for efficiently processing data to allow for the streamlined assessment of risk ratings for one or more vendors. In various embodiments, the systems/methods may use one or more particular vendor attributes (e.g., as determined from scanning one or more webpages associated with the particular vendor) and the contents of one or more completed privacy templates for the vendor to determine a vendor risk rating for the particular vendor. As a particular example, the system may scan a website associated with the vendor to automatically determine one or more security certifications associated with the vendor and use that information, along with information from a completed privacy template for the vendor, to calculate a vendor risk rating that indicates the risk of doing business with the vendor.
    Type: Grant
    Filed: August 30, 2019
    Date of Patent: December 1, 2020
    Assignee: OneTrust, LLC
    Inventor: Jonathan Blake Brannon
  • Patent number: 10846438
    Abstract: A controller includes a host interface and a processor. The host interface is configured for communicating with a host. The processor is configured to receive from the host, via the host interface, instructions for execution in a Non-Volatile Memory (NVM), to identify among the instructions an instruction, which pertains to a secure monotonic counter and is intended for execution in an NVM having a secure monotonic counter embedded therein, and to execute the identified instruction, and respond to the host responsively to the instruction, instead of the NVM.
    Type: Grant
    Filed: July 4, 2019
    Date of Patent: November 24, 2020
    Assignee: NUVOTON TECHNOLOGY CORPORATION
    Inventors: Ziv Hershman, Dan Morav, Moshe Alon
  • Patent number: 10841103
    Abstract: Aspects of the technology described herein enable a client device to access a web service in a claims-based identity environment thorough an Internet Protocol (IP) address, rather than the web service's domain name service (DNS). In a claims-based identity environment, a client device will authenticate a relying party's server SSL certificate before providing the token to the relying party by following an authentication process. Current authentication processes include a name-chaining operation, which compares a subject field of a token provided with the Uniform Resource Identifier (URI) used to request the resource (e.g., RP application). When the IP address is used as the URI, then the URI in the certificate will not match the URI in the request and the authentication will fail. Accordingly, aspects of the technology use an alternative authentication method that allows access to a web service through an IP address, when the default client-side token validation is DNS-name based.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: November 17, 2020
    Inventors: Chandan R. Reddy, Kahren Tevosyan, Hieu Trung Nguyen
  • Patent number: 10834120
    Abstract: Systems, methods, and software described herein provide security actions based on related security threat communications. In one example, a method of operating an advisement system includes identifying a security threat within the computing environment, wherein the computing environment comprises a plurality of computing assets. The method further provides obtaining descriptor information for the security threat, and retrieving related communication interactions based on the descriptor information. The method also includes generating a response to the security threat based on the related communication interactions.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: November 10, 2020
    Assignee: Splunk Inc.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 10831391
    Abstract: Embodiments are described for performing file restores from remote high-latency storage tiers by reading available data from a local low-latency tier in a deduplication appliance. A request to restore a previously segmented and deduplicated file can be received by a storage appliance from an application, each segment having a fingerprint. The name of the file can be looked up in an index on the storage appliance, and a first batch of fingerprints of segments of the file can be retrieved from the index. Each fingerprint can be looked up in metadata in the index to determine whether the segment corresponding to the fingerprint is available locally and therefore need not be retrieved locally. A list of local and remote prefetch segments is generated, and a prefetch request is generated for each list, if non-empty. Use of the prefetch scheme can be dynamically turned on or off.
    Type: Grant
    Filed: April 27, 2018
    Date of Patent: November 10, 2020
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Nitin Madan, Srikant Viswanathan, Kedar Godbole, Kalyan C. Gunda, Kalidas Balakrishnan
  • Patent number: 10831460
    Abstract: A method of administering a computing system, including a plurality of computing devices. The method includes selecting an application for download to a computing device, prior to downloading the application, decompiling the application, searching for string patterns in the decompiled application, replacing the string patterns in the decompiled application with another string pattern, the another string pattern being configured to intercept at least one of a system event or an Application Programming Interface (API) call, and associating logic with the application. The logic is configured to interact with the application via the at least one system event or API call, the logic is configured to provide additional functions to the application, the logic is configured to be shared between the application and at least one other application, and the logic is stored separate from the application.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: November 10, 2020
    Assignee: BMC Software, Inc.
    Inventors: Adam Charles Cooper, George Thucydides, Geoffrey Ross Mair, Caleb Peter Buxton
  • Patent number: 10831934
    Abstract: An embodiment includes an apparatus comprising: an out-of-band cryptoprocessor coupled to secure non-volatile storage; and at least one storage medium having firmware instructions stored thereon for causing, during runtime and after an operating system for the apparatus has booted, the cryptoprocessor to (a) store a key within the secure non-volatile storage, (b) sign an object with the key, while the key is within the cryptoprocessor, to produce a signature, and (c) verify the signature. Other embodiments are described herein.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: November 10, 2020
    Assignee: Intel Corporation
    Inventors: Vincent J. Zimmer, Nicholas J. Adams, Giri P. Mudusuru, Lee G. Rosenbaum, Michael A. Rothman
  • Patent number: 10824731
    Abstract: A secure Basic Input/Output System (BIOS) attribute system includes a secure server system coupled to a computing device through a network. The computing device receives a first BIOS attribute modification request, and authenticates the first BIOS attribute modification request using a first certificate that was previously stored in the computing device in response to validating the first certificate based on a key provided by the secure server system. In response to authenticating the first BIOS attribute modification request using the first certificate, the computing device modifies at least one BIOS attribute stored in the computing device.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: November 3, 2020
    Assignee: Dell Products L.P.
    Inventors: Wei G. Liu, William Carl Munger
  • Patent number: 10819503
    Abstract: An example operation may include one or more of joining, by a host device, a blockchain managed by one or more devices on a decentralized network, the blockchain is configured to use one or more smart contracts that specify transactions among a plurality of end-users, creating on the blockchain the smart contract defining authentication parameters for an authentication of an end-user from the plurality of the end-users, executing the smart contract to perform the authentication of the end-user associated with a transaction based on the authentication parameters by generating an authentication challenge for the transaction, and recording an authentication log produced by the authentication challenge into a metadata of a transaction payload for analytics.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: October 27, 2020
    Assignee: International Business Machines Corporation
    Inventors: Karthik Nandakumar, Nalini K. Ratha, Sharathchandra Pankanti
  • Patent number: 10798082
    Abstract: This application relates to the field of communications technologies, and discloses a network authentication triggering system, method and a related device. The method includes: receiving a first message from a terminal, where the first message carries first identity information and identifier information, the first identity information is encrypted identity information, and the identifier information is used to identify an encryption manner of the first identity information; and sending a second message to a first security function entity, where the second message is used to trigger authentication for the terminal, and the second message carries the identifier information. This application provides a solution of triggering an authentication process when identity information is encrypted.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: October 6, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: He Li, Jing Chen, Huan Li, Yizhuang Wu
  • Patent number: 10764040
    Abstract: A method of dynamically generating a domain based public group key and private member keys using a domain key agent, a domain key service of a domain key broker, and a domain key distribution center. The method includes: sending to the domain key service of a domain key broker a request for a private member key for the domain, wherein the request includes proof of possession of a vehicle private key associated with a vehicle certificate and a vehicle public key; receiving from the domain key service a private member key and a public group key; sending a message digitally signed using the member private key; verifying the digital signature on the received message using the public group key; and dynamically renewing the public group key and private member key based on the domain.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: September 1, 2020
    Assignee: MOCANA CORPORATION
    Inventors: Srinivas Kumar, Atul Gupta, Pramod Malibiradar, Shreya Uchil
  • Patent number: 10755237
    Abstract: A method for creating and registering authentication information is provided. The method includes steps of: (a) an intermediate server determining whether a specific user's public key is registered if (i) the specific user's public key and (ii) a hash value of the specific user's information or its processed value are acquired from a biometric authentication server which received a request for registration; (b) the intermediate server, if the specific user's public key is unregistered, creating and transmitting to a database a transaction whose outputs include (i) the specific user's public key and (ii) the hash value or its processed value (c) the intermediate server acquiring a transaction ID representing location information indicating where the transaction is stored in the database; and (d) the intermediate server notifying the biometric authentication server of a successful registration of (i) the specific user's public key and (ii) the hash value or its processed value.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: August 25, 2020
    Assignee: Coinplug, Inc.
    Inventors: Joo Han Song, Jay Wu Hong, Joon Sun Uhr
  • Patent number: 10747900
    Abstract: Disclosed embodiments relate to systems and methods for discovering and controlling sensitive data stored in temporary access memory. Techniques include identifying an application configured to perform one or more secure functions using sensitive data, wherein the application is configured to store or access the sensitive data in a temporary access memory accessible to the application; analyzing one or more processes associated with runtime activity of the application; detecting, based on the analyzing, an instance of the sensitive data, wherein the detecting is based on at least one of: analyzing input from a user to the application, or analyzing attributes of the application; and automatically implementing, based on the detecting, a control action to limit the accessibility of the sensitive data in the temporary access memory.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: August 18, 2020
    Assignee: CyberArk Software Ltd.
    Inventor: Arthur Bendersky
  • Patent number: 10742617
    Abstract: A system for and method of transmitting verifiable e-mail includes a message ID sent to a recipient of the e-mail. A system for and method of transmitting encrypted files using email and other electronic communication channels includes a computer program for storing encrypted files supplied by a user, creating a link to 5 the encrypted files to be e-mailed to a recipient, allowing download of the encrypted files when an authorization code is provided after the link is used to go to a system server, wherein the authorization code is sent to a telephone of the recipient, via text or aurally.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: August 11, 2020
    Assignee: ESIPCO, LLC
    Inventor: Edward B. Scheinuk
  • Patent number: 10705820
    Abstract: A system includes a processor controlling a vehicle module (VM) in communication with a telematics control unit (TCU) over a bus. In this embodiment, the processor is configured to receive an authentication request, including a counter value, from the TCU. The processor is also configured to respond to the authentication request based on comparison of the counter value to a stored counter value stored by the VM. The processor is further configured to receive a command corresponding to the authentication request and including the counter value, responsive to the approved authentication request and process the command based on comparison of the counter value to the stored counter value.
    Type: Grant
    Filed: February 2, 2017
    Date of Patent: July 7, 2020
    Assignee: Ford Global Technologies, LLC
    Inventors: Daniel Joseph Madrid, Sangeetha Sangameswaran, Jason Michael Miller, Xin Ye
  • Patent number: 10680812
    Abstract: A method for validating an electronic device 2 includes receiving attestation information provided by the electronic device 2 attesting that the electronic device 2 has received a plurality of event attestations. Each event attestation provides a cryptographically authenticated attestation to the occurrence of a respective event during a lifecycle of the electronic device. A validation result is determined that indicates whether the attestation information is valid. Providing separate cryptographically authenticated attestations for respective events in the lifecycle of the device can simplify manufacturing of the devices in a multistage manufacture process compared to an approach using a single device-specific attestation attesting that the entire process is trusted.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: June 9, 2020
    Assignee: Trustonic Limited
    Inventors: Richard Hayton, Chris Loreskar, Donald Kenneth Felton
  • Patent number: 10681039
    Abstract: System and methods are described for authenticating users across multiple environments within a cloud-computing environment. A system may receive an indication that a user authenticated within a first environment has performed an action specific to a second environment. The system determines whether a previous action was performed by the user specific to the second environment. In response to determining that no previous action was performed, the system retrieves a first token from an authentication database, wherein the first token is associated with authentication of the user within the first environment. The system then validates the first token, and then generates a second token associated with authentication of the user within the second environment.
    Type: Grant
    Filed: January 8, 2018
    Date of Patent: June 9, 2020
    Assignee: salesforce.com, inc.
    Inventors: Sebastian Alzate, Venkatesh Baskar, Brandon Gupton, Vamsi Krishnam Raju Chiluvuri, Ryan McDaniel
  • Patent number: 10666434
    Abstract: Providing verification of the identity of a digital entity may include including receiving information and a public key of the digital entity, the information having been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address, the centralized or distributed ledger providing a record of transactions. The system may derive an attestation address using the information and the public key of the digital entity. The system may verify the existence of the attestation transaction at the attestation address in the centralized or distributed ledger and verify that the attestation transaction has not been revoked. The processor associated with the user may receive a cryptographic challenge nonce signed by the digital entity's private key; and may verify the digital entity's identity with the cryptographic challenge nonce signed by the digital entity's key.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: May 26, 2020
    Assignee: Civic Technologies, Inc.
    Inventors: Jonathan Robert Smith, Vinodan Karthikeya Lingham, John Driscoll, Iain Charles Fraser
  • Patent number: 10666628
    Abstract: Systems, methods, and computer-readable media may be provided for securely authenticating device identification and/or user identification for low throughput device-to-device wireless communication.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: May 26, 2020
    Assignee: APPLE INC.
    Inventors: Julien F. Freudiger, Andrew J. Ringer, Yannick L. Sierra, Farouk Belghoul, Samuel D. Post
  • Patent number: 10650448
    Abstract: The systems and methods described herein allow consumers to lock or unlock their credit files at multiple credit bureaus in real-time or near real-time. The service may allow a consumer to provide identifying information, such as a personal identifier to lock or unlock credit files at a plurality of credit bureaus over a network. Upon receiving the personal identifier, the system may use the personal identifier to translate the identifier into a plurality of access codes for respective credit bureaus, for example by accessing a data structure, such as a database or table, that stores a personal identifier and access codes that are associated with a consumer. The system may then use the access codes to automatically initiate locking or unlocking of credit files for the consumer at the respective credit bureaus.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: May 12, 2020
    Assignee: Experian Information Solutions, Inc.
    Inventors: Eric Haller, Kelly Kent
  • Patent number: 10642976
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to analyze data related to a digital certificate and assign a reputation to the digital certificate, where the reputation includes an indication if the data is proper. The analysis of the data can include determining if code signing for the digital certificate matches binary code for the digital certificate, if the digital certificate has been grafted to the data by modifying a portable executable file header, or the digital certificate is the same as another trusted digital certificate associated with different data.
    Type: Grant
    Filed: June 27, 2015
    Date of Patent: May 5, 2020
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, Ramnath Venugopalan
  • Patent number: 10630688
    Abstract: The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of Things (IoT). The present disclosure may be applied to intelligent services based on the above technologies, such as smart home, smart building, smart city, smart car, connected car, health care, digital education, smart retail, security and safety services. A method for controlling contents and an electronic device thereof are provided. An operation method of an electronic device includes the operations of setting an access authority for one or more contents, if there is a request for an access of at least one application to the contents, resetting the access authority for the contents, and controlling the access by the application to the contents in accordance with the reset access authority of the application for the contents.
    Type: Grant
    Filed: April 11, 2018
    Date of Patent: April 21, 2020
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Okseon Lee, Yongseok Park, Jinho Lee, Youngki Hong
  • Patent number: 10628615
    Abstract: An integrated circuit (IC) provisioned for asset protection has a primary circuit portion, such as a microprocessor or system-on-chip, that can be selectively disabled and enabled via an operability control input. The IC includes a secure register to store lock state indicia and unlock criteria, where a signal at the operability control input is responsive to the lock state indicia. In operation, a firmware data store receives and stores firmware code that includes a lock/unlock command, and firmware data that includes an unlock key. An authorization module verifies authenticity of the firmware code. A lock/unlock (LUL) module is operative to write lock state indicia to the secure register based on the lock/unlock command only in response to a positive verification of the authenticity of the firmware code by the authorization module, and to write lock state indicia to the secure register.
    Type: Grant
    Filed: May 21, 2018
    Date of Patent: April 21, 2020
    Assignee: Intel Corporation
    Inventors: Ramamurthy Krithivas, Donald C. Soltis, Jr., Bradley Burres
  • Patent number: 10616212
    Abstract: The invention is a method for managing a response generated by an application embedded in a secure token in response to a command requesting opening a proactive session. An applicative server relies on an OTA server to securely send the command to the application. The method comprises the steps of: the application retrieves a data from the command and derives a key using a preset function, the application generates the response to the command, builds a secured response packet comprising the response secured with the derived key and sends the secured response packet to the applicative server.
    Type: Grant
    Filed: August 21, 2015
    Date of Patent: April 7, 2020
    Assignee: THALES DIS FRANCE SA
    Inventors: Xavier Berard, HongQian Karen Lu
  • Patent number: 10614264
    Abstract: A system, computer-readable storage medium, and computer-implemented method for signing a document involving generating copies of the document in response to receiving actions to perform on the document. In particular, a web service can transmit a document for signing to a client device such that the document is viewable through graphical user interfaces while the underlying content of the document remains non-editable by the client devices through the web service. Responsive to receiving actions, the web service can generate one or more copies of the document that may include modifications that correspond to the received actions.
    Type: Grant
    Filed: March 21, 2016
    Date of Patent: April 7, 2020
    Assignee: DocuSign, Inc.
    Inventor: Glenn Shimkus
  • Patent number: 10614417
    Abstract: A system and a method provide a lead verification service. A lead generator contacts a verification server when a visitor lands on a hosting site of the lead generator to enter lead information into a form. The verification server issues a reference key (token) to the lead generator and collects information about the visitor and the hosting site of the lead generator, using the reference key to identify the collected information. When the visitor submits the form, the lead generator sends the form data, which includes the entered lead information and the reference key received from the verification server, to at least one interested party. When the verification server receives a request for the collected information from the interested party, the collected information is retrieved based on the reference key included in the request and sent to the requesting interested party.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: April 7, 2020
    Assignee: ActiveProspect, Inc.
    Inventors: Steven M. Rafferty, Rickie N. Benavidez, Alexander K. Wolfe, Michael Shapiro
  • Patent number: 10614207
    Abstract: Aspects described herein may allow for the application of generating captcha images using variations of the same object. A GAN model may generate objects and backgrounds of the captcha images and the model may be trained based on ground-truth images to obtain refined model parameters. Further aspects described herein may provide for generating variants of the objects based on the trained model and the refined model parameters. The synthetic captcha images may be created based on the backgrounds and variants of the objects. Finally, the synthetic captcha images and ground-truth images may be presented as security challenges and user access requests may be granted or denied based on responses to the security challenges.
    Type: Grant
    Filed: July 9, 2019
    Date of Patent: April 7, 2020
    Assignee: Capital One Services, LLC
    Inventors: Anh Truong, Jeremy Goodsitt, Galen Rafferty, Vincent Pham, Austin Walters
  • Patent number: 10594682
    Abstract: Method for managing data for connection to a device via a network. The method includes: receiving, by a referencing server, originating from the device, data for connection to the device and at least one authentication token constituting an authentication datum for the assembly constituted by the device and a user of the device; and referencing of the device by the referencing server by storage of the connection data received in association with at least one referencing key including the at least one authentication token.
    Type: Grant
    Filed: December 11, 2014
    Date of Patent: March 17, 2020
    Assignee: ORANGE
    Inventors: Alexandre Francois, Cyril Vizzari, Ludovic Eschard
  • Patent number: 10594873
    Abstract: In a method of payment for service of a portable communication unit, a customer prepays a dealer for said service, the dealer forwards transaction order information about the pre-payment to a prepaid management center (PMC); and the PMC provides a bank the transaction order information. The bank, upon receipt of the transaction order information from the PMC, determines whether there are sufficient funds in the dealer account to cover the transaction. If there is insufficient cash on hand, the dealer is notified and is provided an opportunity to replenish the account so that the transaction may proceed. If there are adequate funds in the dealer account, the bank automatically transfers the amount of the purchase transaction in the SPS account, less the dealer's fee for the purchase. After funds are transferred from the dealer account, the PMC is notified of the transfer, at which time the PMC generates codes and issues the codes to the dealer.
    Type: Grant
    Filed: February 26, 2019
    Date of Patent: March 17, 2020
    Assignee: Precis Group LLC
    Inventors: Peter D. Wendt, Daniel S. Karvonen
  • Patent number: 10587650
    Abstract: A method is provided for detecting an interception of a communications session established by a user over a network, comprising the steps of: (i) monitoring communications sessions by the user over a profile time period to capture information identifying distinct communications to one or more identified network addresses and their timing over the profile time period; (ii) monitoring communications sessions within the profile time period to capture information characterising the content of transactions initiated in respect of said one or more network addresses; (iii) using the captured information to generate a profile characterising communications sessions established in respect of said one or more network addresses over the profile time period; and (iv) monitoring communications sessions with said one or more network addresses within a configurable detection time period to determine one or more measures of deviation from the profile generated at step (iii) thereby to detect the presence of an interception oc
    Type: Grant
    Filed: December 19, 2014
    Date of Patent: March 10, 2020
    Assignee: Detica Patent Limited
    Inventors: Uday Krishna Kamath, Kevin O'Leary, Kilian Colleran
  • Patent number: 10572669
    Abstract: A computer-based method is disclosed for checking a target computer system for unnecessary privileges. The method includes receiving, at a computer-based privileges checking system, a listing of all privileges available the target computer system; receiving, at the computer-based privileges checking system, information about end-user activities on the target computer system over a specified period of time; for each respective one of the end-user activities, querying a computer-based entry point finder for any privileges that were checked at the target system for that activity; and removing the privileges that were checked at the target system for the end-user activities from the listing of all privileges available at the target system to produce a listing of unnecessary privileges at the target system.
    Type: Grant
    Filed: August 14, 2017
    Date of Patent: February 25, 2020
    Assignee: Onapsis, Inc.
    Inventors: Sergio Javier Abraham, Pablo Agustín Artuso
  • Patent number: 10560447
    Abstract: Provided is an authentication system that achieves simple single sign-on used by an MFP. A management application includes a first authentication-request unit that transmits an authentication request to a management server and delivers a token to an execution platform. The other application includes a second authentication-request unit that sends an authentication request together with the token to another server. The application-execution platform includes a token-delivery unit that delivers the token to the other application. The management server includes a first authentication unit that returns a token to the first authentication-request unit, a token-creation unit, and a second authentication unit that performs authentication for an inquiry from the other server that uses a token. The other server includes a third authentication-request unit that transfers an authentication request, and transfers an authentication OK message to the second authentication-request unit.
    Type: Grant
    Filed: January 10, 2018
    Date of Patent: February 11, 2020
    Assignee: KYOCERA Document Solutions Inc.
    Inventors: Takashi Oguma, Masafumi Sato, Zhenyu Sun
  • Patent number: 10555144
    Abstract: Systems and methods for providing inter-application communication in a network of moving things. As non-limiting examples, various aspects of this disclosure provide configurable systems and methods for providing inter-application communication in a network of moving things, for example in which clients may register for participation, subscribe to topics, publish different types of messages, etc.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: February 4, 2020
    Assignee: Veniam, Inc.
    Inventor: Henrique Cabral
  • Patent number: 10552618
    Abstract: A method for secured data transmission of visually encoded data from a mobile end device to a processing unit includes supplying on a security element of the end device a datum to be transmitted. The datum is encrypted in session-specific fashion through the security element. From the encrypted datum visually encoded image data are generated in the form of a bar code or a sequence of bar codes. The visually encoded image data are displayed through the end device.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: February 4, 2020
    Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventor: Vui Huang Tea
  • Patent number: 10547452
    Abstract: The present application relates to a methodology of verifying secret keys in a distributed network comprising a plurality of nodes connected to a shared medium. Each node of the plurality of nodes is member of at least one group of a plurality of groups. Each group is associated with a secret group key. A verification request is broadcast to the plurality of nodes and verification responses broadcast from the plurality of nodes are received. Each verification response comprises one code sequence for each logical group, of which the broadcasting node is member. Each code sequence of the verification request is generated on the basis of a secret group key associated with a respective logical group from a predefined data sequence. The code sequences are collected and the integrity of the plurality of nodes is confirmed by comparing the code sequences.
    Type: Grant
    Filed: January 10, 2018
    Date of Patent: January 28, 2020
    Assignee: NXP B.V.
    Inventor: Thierry G. C. Walrant
  • Patent number: 10541819
    Abstract: A forged command filtering system includes: a secure command generating device for performing a digital signature operation on a selected command to generate a command request; a command transmitting device for receiving and transmitting the command request; a target device; and a command authentication circuit. The command authentication circuit includes: a communication interface for communicating with the command transmitting device or the target device; a secure micro-controller for storing a signature verification key of the secure command generating device; a control circuit for cooperating with the secure micro-controller to authenticate the command request using the signature verification key; and a storage circuit for storing data required for the operations of the control circuit.
    Type: Grant
    Filed: August 3, 2017
    Date of Patent: January 21, 2020
    Assignee: JRSYS INTERNATIONAL CORP.
    Inventor: Jia-Hong Chen
  • Patent number: 10536570
    Abstract: A safety event is determined as affecting a user based at least in part context data collected at a user device associated with the user. In some aspects, context data is detected from sensors on the client device, the context data describing a present context of the user. A deviation of the present context from a historical context is determined to be beyond a threshold. Determining that the deviation is beyond the threshold can be determined to correspond to a safety event potentially jeopardizing safety of the user. In some aspects, an action can be launched in response to determining the safety event.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: January 14, 2020
    Assignee: McAfee, LLC
    Inventors: Srikanth Nalluri, Dattatraya Kulkarni, Raja Sinha, Venkatasubrahmanyam Krishnapur, Yogesh Jain, Kaushal Kumar Dhruw, Kamlesh Halder