Having Key Exchange Patents (Class 713/171)
-
Patent number: 12213055Abstract: This disclosure provides systems, methods, and apparatuses for associating a wireless communication device such as a wireless station (STA) of a STA multi-link device (MLD) with an access point (AP) MLD that includes a first AP associated with a first communication link of the AP MLD and includes one or more secondary APs associated with one or more respective secondary communication links of the first AP MLD. The first AP includes one or more virtual APs, and the first AP and the one or more virtual APs of the first AP belong to a first multiple basic service set identifier (BSSID) set associated with the first communication link.Type: GrantFiled: November 28, 2023Date of Patent: January 28, 2025Assignee: QUALCOMM IncorporatedInventors: Abhishek Pramod Patil, George Cherian, Alfred Asterjadhi, Sai Yiu Duncan Ho, Lochan Verma, Yanjun Sun
-
Patent number: 12212667Abstract: A first network device may install a new receive key on a data plane of the first network device, and may provide, to a second network device, a first request to install the new receive key. The first network device may receive a first indication that the new receive key is installed by the second network device, and may install a new transmit key on the data plane of the first network device based on the first indication. The first network device may provide, to the second network device, a second request to install the new transmit key, and may receive a second indication that the new transmit key is installed and that an old receive key is deleted by the second network device. The first network device may delete the old receive key from the data plane of the first network device based on the second indication.Type: GrantFiled: May 9, 2022Date of Patent: January 28, 2025Assignee: Juniper Networks, Inc.Inventor: Sumeet Mundra
-
Patent number: 12212663Abstract: Embodiments for bounded broadcast encryption key management in a peer-to-peer network are described. To realize bounded broadcast encryption key management, a second peer of the peer-to-peer network receives a first broadcast message from a first peer. The first broadcast message includes at least a public key associated with the first peer. The second peer then generates a key seed in response to receiving the first broadcast message, and creates a second message that includes the key seed encapsulated with the public key. The second peer then transmits the second message to the first peer, and in response to the transmission of the second message, receives a packet from the first peer. The packet includes data encrypted using a secret key derivable from the key seed and one or more portions of the second message.Type: GrantFiled: October 31, 2022Date of Patent: January 28, 2025Assignee: GRAPHIANT, INC.Inventors: David Carrel, Stefan Olofsson, Neale Ranns, Ijsbrand Wijnands
-
Patent number: 12212560Abstract: A method for authorizing a secure access from a local device to a remote server computer is disclosed. At the local device having a unique identifier (UID), processor, and memory, a security software obtains a personal identification number (PIN) of a user, and the UID of the local device. Authenticity of the PIN and the UID is verified without communication over a network, using a credential code generated using the PIN, the UID and the security software. Upon verifying the authenticity of the PIN and the UID, access credentials to the remote server computer are retrieved, and the secure access to the remote server computer is authorized using the retrieved access credentials. The remote server computer has a copy of the security software, the PIN, the UID and the credential code.Type: GrantFiled: July 24, 2023Date of Patent: January 28, 2025Assignee: INBAT TECHNOLOGIES INC.Inventors: Nicolas Johannes Sebastian Bettenburg, Randy Kuang
-
Patent number: 12212960Abstract: A method and system for establishing two-way trust between a short-range communication device and a hub device. The method includes: obtaining, from a hub device, a digitally signed request for determining whether the hub device is a trusted communication device for a short-range communication device and a cryptographic key generated by the short-range communication device; generating a response to the request; encrypting the response to the request by using the cryptographic key provided by the short-range communication device, so that the encrypted response can be decrypted only by the short-range communication device; and providing the encrypted response to the hub device. The short-range communication device may decrypt the response and determine whether the hub device is the trusted communication device based on information indicated in the response.Type: GrantFiled: March 30, 2021Date of Patent: January 28, 2025Assignee: Amazon Technologies, Inc.Inventors: Shyam Krishnamoorthy, Lorenzo Tessiore
-
Patent number: 12210602Abstract: An unlocking method and an electronic device relate to the field of terminal technologies.Type: GrantFiled: June 19, 2020Date of Patent: January 28, 2025Assignee: Huawei Technologies Co., Ltd.Inventor: Ziyue Zhang
-
Patent number: 12206747Abstract: Methods and systems for a device connectivity services system. A method for using the device connectivity services includes receiving a request to connect with a device to perform one or more tasks at the device, processing the request with respect to connectivity factors related to the request and the device, scheduling the request based on the connectivity factors, instantiating a controller to execute the one or more tasks at the device, sending commands to the device over a connection to perform the one or more tasks, and receiving responses from the device over the connection after completing the one or more tasks.Type: GrantFiled: September 8, 2022Date of Patent: January 21, 2025Assignee: Charter Communications Operating, LLCInventors: James Ryan, John B. McManus, Michael McClure, Alan Robertson, Aklilu Gebreyesus
-
Patent number: 12205699Abstract: Systems, methods and devices are described for establishing trusted connections among two or more therapy devices that form, or form part of, a medication therapy system. A medication delivery electronics may include a first communication interface, a connection manager, and a therapy management application. A first communication interface may be configured to establish and communicate over one or more communication links. A connection manager may be configured to generate a candidate shared secret key and provide the shared key to a first therapy device over a first communication link established by a first communication interface. A candidate shared key may be generated responsive to one or more shared secret parameters.Type: GrantFiled: October 29, 2019Date of Patent: January 21, 2025Assignee: Bigfoot Biomedical, Inc.Inventors: Aaron Kim, Bryan Mazlish
-
Patent number: 12206766Abstract: A method and device for establishing a communication along a communications channel between a first device (200A) and a second device (200B) is disclosed. The method comprises mutually discovering the first device (200A) and the second device (200B), validating (F5, F6, F7) the communications channel between the first device (200A) and the second device (200B) by exchange of data messages, exchanging a secret between the first device (200A) and the second device (200B) and then exchanging encrypted messages along the communications channel.Type: GrantFiled: January 19, 2023Date of Patent: January 21, 2025Assignees: INESC TEC—INSTITUTO DE ENGENHARIA DESISTEMAS E COMPUTADORES, TECNOLOGIA E CIÊNCIA, U.PORTO—UNIVERSIDADE DO PORTOInventors: João Miguel Maia Soares de Resende, Rolando da Silva Martins, Luís Filipe Coelho Antunes, Patrícia Raquel Vieira Sousa
-
Patent number: 12200127Abstract: Aspects of the disclosure are directed to point-to-point generation and rotation of security tokens to provide anti-spoof protection in a virtual network stack. Existing public key infrastructure can be leveraged to establish secure connections for control plane purposes. The hosts can run local daemons on machines and can establish secure connections to a control plane as well as to other hosts.Type: GrantFiled: August 16, 2022Date of Patent: January 14, 2025Assignee: Google LLCInventors: Dmitri Rubakha, Alejandro Cornejo
-
Patent number: 12197612Abstract: This disclosure relates to, among other things, systems and methods for managing and/or verifying the integrity and/or provenance of digital content and/or media. Embodiments of the systems and methods disclosed herein may provide a mechanism for generating a secure records relating to digital content and/or other media by capturing records relating to creation and/or modification actions performed in connection with digital content and/or media and storing such records in a ledger. Trusted services that examine captured information recorded in trusted databases and/or ledgers and generate derivative information relating to associated content and/or media. When viewing content, trusted content applications may query the trusted service for derivative information relating to the content and/or media, providing users with an indication of the derivative information in connection with content and/or media playback.Type: GrantFiled: October 4, 2022Date of Patent: January 14, 2025Assignee: Intertrust Technologies CorporationInventors: Jarl Nilsson, Eric Swenson, Michael Manente
-
Patent number: 12200138Abstract: A node in a distributed network computes a hash of content for a service received in a data packet. The node verifies the data packet by comparing the hash of the content of a service received from a neighboring node to a hash of the content computed by the node. An amount of content of the service having a same identification is accumulated in a trusted execution environment (TEE) of the node, and a signature based on code stored in a TEE of the node is generated. The node then sends the data packet to the next neighboring node, where the service-related information includes the service ID, a hash of the service content and the signature. The service records with the accumulated amount of service content, accumulated hash values, and nodes' signatures are sent to the validation nodes to reach consensus for the service provided.Type: GrantFiled: June 3, 2022Date of Patent: January 14, 2025Assignee: Huawei Technologies Co., Ltd.Inventors: Lifeng Liu, Jian Li
-
Patent number: 12200100Abstract: This document describes systems and techniques for using secure MPC to select digital components in ways that preserve user privacy and protects the security of data of each party that is involved in the selection process. In one aspect, a method includes obtaining, by a first computer of a secure multi-party computation (MPC) system, at least a first share of a set of contextual properties of an environment in which a selected digital component will be displayed at a client device. For each digital component in a set of digital components, at least a first share of an eligibility expression that defines a relationship between a set of eligibility criteria for the digital component is obtained. A determination is made, based on the at least first share of the set of contextual properties and the at least first share of the eligibility expression, a first share of an eligibility parameter.Type: GrantFiled: August 22, 2022Date of Patent: January 14, 2025Assignee: Google LLCInventors: Gang Wang, Marcel M. Moti Yung
-
Patent number: 12190315Abstract: Systems and methods to at least provide access control for execution of smart contract functions (methods) through consensus mechanisms are disclosed. A first smart contract is stored on a blockchain network. During execution, the first smart contract performs operations that include: aggregating a threshold number of signed blockchain transactions from authorized blockchain addresses, receiving a set of signed blockchain transactions calling a function of a target smart contract from a set of blockchain addresses, verifying that each blockchain address of the set of authorized blockchain addresses is authorized to make the call, and calling the function of the target smart contract when a number of signed blockchain transactions calling the function exceeds a threshold number.Type: GrantFiled: May 26, 2021Date of Patent: January 7, 2025Assignee: Coinbase, Inc.Inventor: Peter Jihoon Kim
-
Patent number: 12190966Abstract: A method of processing a memory system that includes a substrate with a connector and a semiconductor memory chip connected to the connector is provided. The method includes detaching the semiconductor memory chip from the connector, performing an annealing process with respect to the semiconductor memory chip detached from the connector, and after the annealing process, attaching the semiconductor memory chip to the connector on the substrate.Type: GrantFiled: August 30, 2022Date of Patent: January 7, 2025Assignee: Kioxia CorporationInventors: Tomoya Sanuki, Hitomi Tanaka, Tatsuro Hitomi, Yasuhito Yoshimizu, Masayuki Miura, Yoshihiro Ohba
-
Patent number: 12192340Abstract: This disclosure relates to protecting the security of information in content selection and distribution. In one aspect, a method includes receiving, from a client device and by a first computing system of multi-party computation (MPC) systems, a digital component request including first secret shares of data identifying user groups that include a user of the client device as a member. The first computing system transmits a contextual digital component request to a content platform. The first computing system receives, from the content platform, selection data for multiple digital components. The selection data includes first vector data defining a contextual-based vector of values selected based in part on the set of contextual signals. The first computing system obtains, for each digital component, second vector data defining a user group-based vector of values selected based in part on a respective user group corresponding to the digital component.Type: GrantFiled: January 6, 2022Date of Patent: January 7, 2025Assignee: Google LLCInventors: Gang Wang, Ardian Poernomo, Marcel M. Moti Yung
-
Patent number: 12184652Abstract: Systems and methods for network security are provided. Various embodiments issue single use certificates for validating remote endpoints access to the private network. Some embodiments use a triage zone (or triage gateway) to which remote device can calls into using a static issued certificate. However, instead of granting complete access to the virtual private network, the use of this static certificate only grants access to the triage zone where further validation of the endpoint without any access to sensitive content on the private network. The endpoint can be connected to an ID manager within the triage zone. The endpoint can then send the username and password to the ID manager that can create a single use certificate (e.g., valid for a limited period of time). While valid, the single use certificate can be used by the remote device to gain access to the production zone using a VPN tunnel.Type: GrantFiled: June 26, 2023Date of Patent: December 31, 2024Assignee: SAILPOINT TECHNOLOGIES, INC.Inventors: Cameron Williams, Ryan Privette, Christopher Chad Wheeler, Andrew John Cer, Joseph Nathan Zendle
-
Patent number: 12182774Abstract: The combination of virtual payment cards (tokens) and 3D Secure to transparently transport information to an issuing authority between mutually independent transactions. Furthermore, the virtual payment card standard digital information is transformed by embedding the mandated URL/SESSION ID without the need for the card schemes, acquirers, or payment gateways to make any modifications to their system or message formats.Type: GrantFiled: October 28, 2020Date of Patent: December 31, 2024Assignee: ZILCH TECHNOLOGY LIMITEDInventor: Philip Belamant
-
Patent number: 12184753Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.Type: GrantFiled: July 11, 2022Date of Patent: December 31, 2024Assignee: Live Nation Entertainment, Inc.Inventor: Adam Meghji
-
Patent number: 12184630Abstract: A method and system of managing third-party access to insurance information is disclosed. An insurer maintains an insurance information repository that can be accessed only by authenticated third-party partners. The authentication system generates a code for the insured member. The insured member can share the code to their selected third-party service provider. The selected provider will submit the code to the authentication system when requesting access to validated information about the insured member. The code, if valid, will authenticate the service provider and enable access to the requested information.Type: GrantFiled: March 31, 2022Date of Patent: December 31, 2024Assignee: United Services Automobile Association (USAA)Inventors: Mitchell Wade Palermo, Cynthia Saldana, Ryan Juichi Wakabayashi, Francisco Tomas Garcia, Hanna Elizabeth Rafferty
-
Patent number: 12184632Abstract: Systems and methods for using JavaScript Object Notation (JSON) Web Tokens for information security for a particular software-controlled application are disclosed. Exemplary implementations may: store information electronically, including different types of client-provided information, hardware information, key information, and permission information; provide individual JWTs that include individual expiration dates to individual users; receive a user request for continued access and/or use of the particular software-controlled application; perform different types of (automated) verification based on the client-provided information in the user request; and, responsive to particular results from the different types of verification, perform some combination of transferring a response to the user request and accepting or denying continued access and/or use of the particular software-controlled application.Type: GrantFiled: November 1, 2023Date of Patent: December 31, 2024Assignee: Shayre, Inc.Inventors: Christopher John Woodward, Christopher Joseph Monte, Matthew Lyle Comeione
-
Patent number: 12174979Abstract: In general, one aspect disclosed features a media-capture device, comprising: one or more sensors; a hardware processor; and a non-transitory machine-readable storage medium encoded with instructions executable by the hardware processor to perform a method comprising: initiating acquisition of one or more sensor data samples representing analog phenomena captured by the one or more sensors; receiving the one or more sensor data samples; encoding the one or more sensor data samples; generating a to-be-signed data structure comprising at least one of: the one or more encoded sensor data samples, or one or more cryptographic hashes of the one or more encoded sensor data samples; generating a cryptographic hash of the to-be-signed data structure; determining whether a time-stamping server is reachable over a network connection by the media capture device; and configuring a second data structure based on the determination of whether the time-stamping server is reachable.Type: GrantFiled: April 22, 2022Date of Patent: December 24, 2024Assignee: TruePic Inc.Inventors: Sherif Hanna, Thomas Zeng, Chi Shing Chan, Matthew Robben
-
Patent number: 12170719Abstract: An electronic device includes a memory storing data from an external source, an application processing unit (APU) transmitting a secret key and public key generation command, an isolated execution environment (IEE) generating a secret key in response to the secret key generation command, generating a public key based on the secret key in response to the public key generation command, and storing the secret key, and a non-volatile memory performing write and read operations depending on a request of the APU. When the data are stored in the memory, the APU transmits a public key request to the IEE and in response the IEE transfers the public key to the APU through a mailbox protocol. The APU generates a ciphertext by performing homomorphic encryption on the data based on an encryption key in the public key, and classifies and stores the public key and the ciphertext in the non-volatile memory.Type: GrantFiled: October 12, 2023Date of Patent: December 17, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Ju-Young Jung, Jiyoup Kim, Changkyu Seol, Pilsang Yoon, Jinsoo Lim, Myunghoon Choi
-
Patent number: 12170727Abstract: Provided in embodiments of the present application are a a key generation and terminal provisioning method, an apparatus, and a device thereof. The method for generating a key includes: sending, by an enrollee, a first request message to a configurator, the first request message comprising a first identifier, and the first identifier used to instruct the configurator to perform a network reconfiguration operation; receiving, by the enrollee, a first message sent by the configurator and including first key information; generating, by the enrollee, a session key according to the first key information; sending, by the enrollee, a second message to the configurator, the second message comprising second key information, thus allowing the configurator to generate the session key according to the second key information.Type: GrantFiled: August 31, 2020Date of Patent: December 17, 2024Assignee: Alibaba Group Holding LimitedInventors: Xiaobo Yu, Yuezhen Xiao, Hao Wang
-
Patent number: 12170726Abstract: A method for personalizing embedded secure elements, eSE, allows for simplified manufacturing before being integrated into host devices. An eSE implements services executed by an embedded operating system, OS, whereupon it is loaded into the eSE. The non-personalized eSE comprises an OS loader and a master cryptographic key common to a plurality of secure elements. It can therefore be produced in large numbers. The OS loader obtains an operating system package from a server and installs it. In response to the installation, the OS loader generates a derivation cryptographic key by diversifying the master cryptographic key, and then the OS generates personalized data by deriving pre-personalization data with the derivation key. The eSE, deployed in the field in a simple non-personalized state, is fully personalized without exchanging secret personalized data.Type: GrantFiled: July 25, 2022Date of Patent: December 17, 2024Assignee: IDEMIA FRANCEInventors: Maxyme Dupuy, Dominique Cardoso, Tomasz Wozniak
-
Patent number: 12163404Abstract: A wellsite monitoring system includes a base station, a plurality of access points, and a wellsite communication interface. The base station is configured to provide communication between the wellsite and a remote system. Each of the access points is configured to communicate with base station. The wellsite communication interface is interfaced to well service equipment, and is configured to communicate with the access points via a wellsite protocol used by the base station, and to present an authentication credential to the base station. The base station is also configured to verify an identity of the wellsite communication interface via the authentication credential, and to enable communication with the wellsite communication interface based on verification of the identity of the wellsite communication interface.Type: GrantFiled: May 22, 2020Date of Patent: December 10, 2024Assignee: National Oilwell Varco, L.P.Inventor: Carl Fehres
-
Patent number: 12160525Abstract: Methods, systems, and apparatus, including a method for determining network measurements. In some aspects, a method includes receiving, by a first aggregation server and from each of multiple client devices, encrypted impression data. A second aggregation server receives, from each of at least a portion of the multiple client devices, encrypted conversion data. The first aggregation server and the second aggregation server perform a multi-party computation process to decrypt the encrypted impression data and the encrypted conversion data. Each portion of decrypted impression data and each portion of decrypted conversion data is sent to a respective reporting system.Type: GrantFiled: January 19, 2024Date of Patent: December 3, 2024Assignee: Google LLCInventors: Gang Wang, Marcel M. Moti Yung
-
Patent number: 12158944Abstract: A processing method implemented by a first device including receiving first data including a challenge datum; obtaining key data including an encrypted cryptographic key which is masked by executing a cryptographic masking function; receiving an unmasking key; determining the encrypted cryptographic key by executing a cryptographic unmasking function on the basis of the unmasking key; determining a decrypted cryptographic key by a decryption by executing a decryption algorithm with white-box implementation on the basis of the encrypted cryptographic key; determining an answer datum by a cryptographic operation by executing a predetermined cryptographic algorithm on the basis of the decrypted cryptographic key and the challenge datum; and sending the answer datum to authenticate the first device.Type: GrantFiled: March 30, 2022Date of Patent: December 3, 2024Assignee: IDEMIA FRANCEInventors: Emmanuelle Dottax, Luk Bettale, Nathan Reboud
-
Patent number: 12155678Abstract: In one embodiment, a discrepancy detection application automatically detects and addresses unauthorized activities associated with one or more authorization keys based on a request log and a provider log. The request log specifies activities that a client initiated, where the activities are associated with the authorization keys. The provider log specifies activities that a cloud provider performed, where the activities are associated with the authorization keys. In operation, the discrepancy detection application determines that one or more unauthorized activities have occurred based on comparing the request log to the provider log. The discrepancy detection application then performs an action that addresses the unauthorized activities.Type: GrantFiled: November 15, 2021Date of Patent: November 26, 2024Assignee: Cisco Technology, Inc.Inventor: Camille Gaspard
-
Patent number: 12155755Abstract: A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.Type: GrantFiled: November 26, 2020Date of Patent: November 26, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Lu Gan, Jianhao Huang, Xiaoshuang Ma, Chong Zhou
-
Patent number: 12147795Abstract: Disclosed herein are embodiments of systems, methods, and products comprising an analytic server for automated digital account/application enrollment. The analytic server may open a new account for a user during a registration process. The analytic server may facilitate automated digital enrollment to allow the user to manage the new account in a mobile application on the user's mobile device. The analytic server may send a text message comprising a direct link to the user's mobile device. The link may direct the user to the app store, where the user can download and install the mobile application automatically. The analytic server may also display a button that allows the user to activate a QR code and scan the QR code using the camera of the user's mobile device. Upon the mobile device scanning the QR code, the analytic server may automatically launch the mobile application and sign the user in.Type: GrantFiled: March 30, 2021Date of Patent: November 19, 2024Assignee: BANK OF MONTREALInventors: Muhammad Aun, Subashan Maheswaramoothy, Romulus Lucic, Devin Hewitt
-
Patent number: 12150206Abstract: A home network serves a wireless service to visiting User Equipment (UEs) affiliated with visited networks and authorizes the wireless service for home UEs that are visiting the visited networks. A gateway transfers home context to a distributed ledger and receives visited context from the distributed ledger. The gateway transfers the visited context to a controller. The controller exchanges authorization data with the visited networks based on the visited context and the home context. The controller authorizes the wireless data service for the home UEs and the visiting UEs responsive to the exchange of the authorization data. The controller transfers session signaling to wireless access nodes responsive to the authorization of the wireless data service for the visiting UEs. The controller transfers authorization signaling to the visited networks responsive to the authorization of the wireless service for the home UEs.Type: GrantFiled: January 6, 2022Date of Patent: November 19, 2024Assignee: T-MOBILE INNOVATIONS LLCInventors: Serge M. Manning, Gregory David Schumacher
-
Patent number: 12143374Abstract: A method of providing secure communication between first and second devices comprises the first device and the second device connecting to a server via a secure communication channel. Encryption keys for the devices are generated and data relating to the encryption keys are exchanged via the server in the secure communication channel. A peer-to-peer connection for exchanging data is generated using encrypted connection information for the devices.Type: GrantFiled: October 22, 2020Date of Patent: November 12, 2024Assignee: BAE Systems plcInventors: Ashley Kurtis, Kristian Daniel
-
Patent number: 12143387Abstract: In one example, a method for managing user access to data contained in a computing system, includes receiving a token from an authentication service, wherein the token includes an application role and associated privilege mask; receiving an authentication request from an entity seeking access to an application; comparing information in the authentication request with the token; approving the authentication request when the information in the authentication request matches the token, and granting access to the application when the authentication request has been approved, and denying access to the application when the information in the authentication request does not match the token. The receiving, comparing, approving, granting, and denying processes are performed by the application to which the entity is seeking access, and wherein when the entity, or a different entity, seeks access to another application, user access to the another application is controlled by the another application.Type: GrantFiled: January 15, 2020Date of Patent: November 12, 2024Assignee: EMC IP Holding Company LLCInventors: Michael G. Roche, Michal J. Drozd
-
Patent number: 12141328Abstract: Methods and systems for managing and/or processing a blockchain to maintain data security for confidential and/or personal data are provided. According to certain aspects, the disclosed data security techniques may enable access sharing functionality utilizing the blockchain. The data security techniques disclosed herein also enable the use of smart contracts to transfer funds associated with payment obligations. A node may receive a transaction indicative of a settlement condition of a smart contract being satisfied. Accordingly, the transaction may be compiled into a block of a blockchain and routed to the smart contract. The smart contract may direct a node to transfer funds in accordance with the payment obligations.Type: GrantFiled: January 22, 2018Date of Patent: November 12, 2024Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANYInventors: Melinda Teresa Magerkurth, Eric Bellas, Jaime Skaggs, Shawn M. Call, Eric R. Moore, Vicki King, Burton J. Floyd, David Turrentine, Steven T. Olson, Timothy Caleb Wells, Corin Rebekah Chapman, Edward W. Breitweiser, Robert Gomez, Shelia Cummings Smith
-
Patent number: 12137341Abstract: Message delivery in cellular roaming scenarios involves a user device activated with a home telecommunications service provider (TSP) that provides cellular service to the user device. The user device is located in a remote location and the user device is activated with a remote TSP providing roaming cellular service to the user device in a remote location on a cellular network of the remote TSP. A process includes, based on the user initiating a transaction with a remote application server that requires user authentication based on delivery of a transactional text message, receiving from the remote application server the transactional text message, encrypting the transactional text message to produce an encrypted transactional text message, and forwarding the encrypted transactional text message to the remote TSP for delivery as a short message service (SMS) text to the user device in the remote location via the cellular network of the remote TSP.Type: GrantFiled: August 31, 2021Date of Patent: November 5, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jignesh K Karia, Mukundan Sundararajan, Pankaj Satyanarayan Dayama, Shilpa Shetty, Neha Shah, Vishal Awal
-
Patent number: 12130772Abstract: A multi-processor device is disclosed. The multi-processor device includes interface circuitry to receive requests from at least one host device. A primary processor is coupled to the interface circuitry to process the requests in the absence of a failure event associated with the primary processor. A secondary processor processes operations on behalf of the primary processor and selectively receives the requests from the interface circuitry based on detection of the failure event associated with the primary processor.Type: GrantFiled: October 24, 2022Date of Patent: October 29, 2024Assignee: Rambus Inc.Inventors: Michael Raymond Miller, Evan Lawrence Erickson
-
Patent number: 12126993Abstract: Embodiments include methods performed by vehicle-to-everything (V2X) system for protecting proprietary data within misbehavior reports. Various embodiments may include detecting misbehavior conditions based on received sensor data, determining whether the received sensor data that supports a conclusion that a misbehavior condition has occurred is or includes proprietary information, and encrypting the sensor data that supports the conclusion that the misbehavior condition has occurred in response to determining that the received sensor data is or includes the proprietary information.Type: GrantFiled: September 22, 2021Date of Patent: October 22, 2024Assignee: QUALCOMM IncorporatedInventors: William Whyte, Jonathan Petit, Jean-Philippe Monteuuis, Mohammad Raashid Ansari, Cong Chen, Virendra Kumar
-
Patent number: 12127152Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a first user equipment (UE) may receive a registration message including a decode key associated with a ranging service. The UE may receive, from a second UE, an encoded value and an identifier associated with the second UE. The UE may validate the identifier using the encoded value and the decode key. The UE may establish a ranging session associated with the second UE based at least in part on validating the identifier. Numerous other aspects are described.Type: GrantFiled: June 8, 2022Date of Patent: October 22, 2024Assignee: QUALCOMM IncorporatedInventors: Mayank Arora, Ankit Kumar, Rajat Aggarwal, Amar Kumar Nandan
-
Patent number: 12120176Abstract: A control method includes: receiving transaction data that includes (i) peer information used for connecting a first peer among peers in a P2P system to another peer among the peers and (ii) a signature added to the peer information by the first peer; verifying the received transaction data using the signature included in the transaction data; and storing the transaction data into the distributed ledger when the verifying is successful.Type: GrantFiled: February 1, 2022Date of Patent: October 15, 2024Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICAInventors: Masahiro Taguchi, Yuji Unagami, Tetsuji Fuchikami, Yuuki Hirose
-
Patent number: 12120097Abstract: A computer-implemented method according to one embodiment includes using a first symmetric key to encrypt a second symmetric key. The first symmetric key is securely loaded inside a hardware security module (HSM) by a key management service before the encryption of the second symmetric key, and a cloud provider only has access to encrypted bits of the first symmetric key. Key data of a key-value-pair of the second symmetric key is used as additional authenticated data (AAD) for the encryption of the second symmetric key. The second symmetric key is used to encrypt value data of the key-value-pair. The method further includes storing the encrypted second symmetric key, the AAD used in the encryption of the second symmetric key, and tag bits created during the encryption of the second symmetric key, to thereafter use for verifying node related data.Type: GrantFiled: August 17, 2022Date of Patent: October 15, 2024Assignee: International Business Machines CorporationInventors: Martin Schmatz, Navaneeth Rameshan, Patricia M. Sagmeister
-
Patent number: 12113898Abstract: Generally discussed herein are devices, systems, and methods for binding with cryptographic key attestation. A method can include generating, by hardware of a device, a device public key and a device private key, based on the device private key, signing a first attestation resulting in a signed first attestation, the first attestation claiming the device private key originated from the hardware, based on the device public key and the signed first attestation, registering the device with a trusted authority, generating, by the hardware, a first application private key and a first application public key, and based on the device private key, signing a second attestation resulting in a signed second attestation, the second attestation claiming the first application private key originated from the hardware, and based on the first application public key and the signed second attestation, registering a first application of the device to a first server.Type: GrantFiled: July 20, 2023Date of Patent: October 8, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Prabagar Ramadasse, Yordan Rouskov, Mick Healy, Gaurav Dhawan, Venkata Raghuram Pampana, Aleksandr Tokarev, Marc Shepard, Ramachandra Ravitej Vennapusa
-
Patent number: 12112332Abstract: Cost altering payment services (“CAPS”) system in association with a distributed enhanced payment (“DEP”) processing system includes a merchant point of sale (“POS”) terminal system and a remote enhanced payment management system (“EPMS”). The remote EPMS receives payment transactions including additional risk mitigating payment transaction (“RMPT”) information and based on that additional RMPT information provides altered transaction costs. The remote EPMS provides facilities for the merchant to review and revise payment management services so as to utilize additional RMPT information received from the merchant POS terminal system so as to alter transaction costs. Such facilities provide information to determine the relative potential transaction cost benefits of various payment management service sets utilizing cost profiles that represent the costs of archival, recorded and projected future transactions.Type: GrantFiled: October 29, 2021Date of Patent: October 8, 2024Assignee: Worldpay, LLCInventors: Matthew D. Ozvat, John Berkley, Kevin Oliver, William T. Cooper, Charles E. Watts, Rachel B. Cochran
-
Patent number: 12113890Abstract: There is provided a system of cryptography for securing data on a blockchain, comprising: at least one hardware processor executing a code for: obtaining at least one encrypted data item, encrypted with a public key compliant with a homomorphic encryption mechanism, feeding the at least one encrypted data item into a computational process that computationally processes the at least one encrypted data item with computations compliant with the homomorphic encryption mechanism, and providing at least one encrypted outcome of the computational process to a smart contract for posting on a blockchain, wherein the at least one encrypted outcome is compliant with the homomorphic encryption mechanism and decrypted with a private key corresponding to the public key.Type: GrantFiled: June 27, 2022Date of Patent: October 8, 2024Assignee: NEC Corporation Of AmericaInventors: Ori Yampolsky, Tsvi Lev, Yaacov Hoch
-
Method and device for authenticating access stratum in next generation wireless communication system
Patent number: 12108250Abstract: The disclosure relates to a 5G or 6G communication system for supporting higher data transmission rates than 4G communication systems such as LTE systems. According to an embodiment, a method for operating a user equipment (UE) for a mutual authentication operation in an access stratum (AS) section comprises transmitting a first message including a first random value to a base station, receiving, from the base station, a second message including a second random value and a base station certificate for the base station, in response to the first message, and identifying information included in the base station certificate and verifying validity of the base station certificate, when the base station certificate is valid according to a result of the verification of the base station certificate.Type: GrantFiled: November 24, 2021Date of Patent: October 1, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Donghyun Je, Jungsoo Jung -
Patent number: 12088696Abstract: A client application and a local security controller (LSC) executing on a host computing device use a Multiparty Computation (MPC) cryptographic key generation technique to create two fragments of a split private key, which are held by the client application and LSC, respectively. The client application generates a certificate signing request (CSR). The client application and LSC sign the CSR with the split private key using an MPC technique. The LSC then signs a token from the client application to indicate that the private key corresponding to the CSR is MPC-backed. A package with the CSR and the first and second signatures is then sent to a remote device acting as a certificate authority. The remote device verifies the two signatures and issues a certificate to the client application. The second signature is verified using information sent to the remote device from the LSC during a registration process.Type: GrantFiled: January 31, 2022Date of Patent: September 10, 2024Assignee: Salesforce, Inc.Inventors: Prasad Peddada, Taher Elgamal
-
Patent number: 12088701Abstract: A method of validating a multi-party consensus over a limited connection comprising a validating device configured to transmit a query having a finite number of possible valid answers to a plurality of computing nodes via a unidirectional secure communication channel, receive a limited length string computed based on an aggregated response aggregating a plurality of responses each computed for a multi-party consensus answer to the query by each of at least some of the plurality of computing nodes using a respective secret component, compute a plurality of locally computed strings each computed based on a respective one of the finite number of possible valid answers using an aggregated secret aggregating the plurality of secret components, validate the multi-party consensus answer by comparing the received limited length string to each of the plurality of locally computed strings and initiating one or more operations according to an outcome of the validation.Type: GrantFiled: December 5, 2019Date of Patent: September 10, 2024Assignee: Galaxy Digital Trading LLCInventors: Shahar Shamai, Lior Lamesh
-
Patent number: 12081582Abstract: Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. In an embodiment, the transmitting device can signal an attack or potential attack through the counter value. The attack signaling can further include information relating to the attack or potential attack.Type: GrantFiled: April 11, 2023Date of Patent: September 3, 2024Assignee: CAPITAL ONE SERVICES, LLCInventors: William Duane, Srinivasa Chigurupati, Kevin Osborn
-
Patent number: 12081663Abstract: One example method includes continuously performing key related operations. Each data set in a storage system is encrypted with a different key. New keys are repeatedly introduced and new data is encrypted only with the newest or latest key. Data being rekeyed is re-encrypted with the latest key. By repeatedly introducing new keys and rekeying data sets associated with older keys, the overall key age of the system can be kept low and the data is less susceptible to being compromised.Type: GrantFiled: January 28, 2021Date of Patent: September 3, 2024Assignee: EMC IP HOLDING COMPANY LLCInventors: Jamie Pocas, Radia J. Perlman
-
Patent number: 12074983Abstract: A trusted computing device and an operating method thereof are provided. Provided is a trusted computing device including, a device driven by firmware, and a master controller generating an authentication value from the firmware and checking integrity for the authentication value at a first period, wherein the master controller includes, an authentication value generator generating the authentication value, an authentication value repository storing the authentication value, a security core blocking access from the outside with respect to the authentication value stored in the authentication value repository, and an integrity checker checking integrity for the authentication value stored in the authentication value repository.Type: GrantFiled: June 22, 2022Date of Patent: August 27, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventor: Eun Young Jung