Having Key Exchange Patents (Class 713/171)
-
Patent number: 12069169Abstract: A management controller of a computer platform, determines whether an ownership history of management firmware for the management controller represents multiple owners. The management controller includes a set of one-time programmable elements that represent a first secret. The management controller manages use of the first secret based on the ownership history. The management includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, generating, by the management controller, a second secret to replace the first secret. The management further includes, responsive to determining, by the management controller, that the ownership history represents multiple owners, storing, by the management controller, the second secret in a non-volatile memory and generating, by the management controller, cryptographic keys based on the second secret.Type: GrantFiled: January 31, 2022Date of Patent: August 20, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Luis E. Luciani, Jr., Douglas R. Hascall, Michael R. Garrett
-
Patent number: 12063206Abstract: A framework for transferring workloads between security regions of an infrastructure service. For example, techniques for transferring workloads between security regions across a private network based on signatures associated with the security regions.Type: GrantFiled: November 30, 2021Date of Patent: August 13, 2024Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Danne Lauren Stayskal, Robert Thomas Schumaker
-
Patent number: 12058243Abstract: In one embodiment, a method comprises: receiving, by a network device, a request from a requesting party to register the network device as an endpoint device in a secure peer-to-peer data network; cryptographically generating a secure private key and a secure public key associated with the requesting party utilizing the network device; generating and sending a registration request, including the secure public key and an external network address for reaching the requesting party via an external data network, to a prescribed destination associated with the secure peer-to-peer data network; and selectively registering the network device as the endpoint device in response to verifying a validation response having been sent to the external network address and that includes the secure public key, including creating a federation identifier associated with the external network address and an endpoint identifier uniquely identifying the endpoint device, and associating the endpoint identifier with the federation identType: GrantFiled: June 9, 2021Date of Patent: August 6, 2024Assignee: WhiteStar Communications, Inc.Inventor: Billy Gayle Moon
-
Patent number: 12058263Abstract: A system and method are provided for generating access tokens on a user device rather than via a remote server computer. An access token can be generated on a second user device by combining and encrypting, with format preservation, a primary access identifier, variable value, and salt. The resulting value can be provided to a first user device that subsequently can provide the access token to an access device as a part of an interaction. The access device can generate an authorization request message that includes the access token and transmit the authorization request message to a remote server computer for processing. The remote server computer can process the access token to determine the primary access identifier despite not being involved in the generation of the access token, providing an improvement over conventional tokenization methods.Type: GrantFiled: January 6, 2023Date of Patent: August 6, 2024Assignee: Visa International Service AssociationInventors: Quan Wang, Yuexi Chen
-
Patent number: 12058262Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.Type: GrantFiled: December 22, 2022Date of Patent: August 6, 2024Inventors: Ranga S. Ramanujan, Deborah K. Charan, Barry A. Trent, Jordan C. Bonney
-
Patent number: 12050703Abstract: An authentication method is used in pairing a peripheral device to a companion device. The peripheral device sends a first identifier and a first value of a first counter to the companion device. The companion device verifies whether a pairing table stored in the companion device contains the first identifier. When the pairing table does not include the first identifier the companion device initiates a pairing session. When the pairing table includes the first identifier, the companion device compares the first value to a second value associated with the first identifier in the pairing table. In response to the first value being greater than the second value, the companion devices initiates a nominal session and in response to the first value being lower than or equal to the second value, execution of the method is stopped.Type: GrantFiled: July 11, 2023Date of Patent: July 30, 2024Assignee: STMicroelectronics International N.V.Inventors: Michael Peeters, Stephen D. Panshin, Jefferson P. Ward, Kyle L. Michel
-
Patent number: 12045623Abstract: A computing system is provided. The computing system a central processing unit (CPU) configured to run a basic input/output system (BIOS) service and an operating system (OS). The computing system further includes a baseboard management controller (BMC) and a first boot non-volatile memory coupled to both the CPU and the BMC. A first portion of the first boot non-volatile memory stores system settings and configuration in an open standard such that the BIOS and the BMC can access the system settings based on a temporal ownership of the first portion of the first boot non-volatile memory.Type: GrantFiled: March 15, 2022Date of Patent: July 23, 2024Assignee: QUANTA COMPUTER INC.Inventors: Ming-Hung Hung, Shu-Ming Chu
-
Patent number: 12038838Abstract: In some embodiments, an integrated circuit may include a substrate and a memory array disposed on the substrate, where the memory array includes a plurality of discrete memory banks. The integrated circuit may also include a processing array disposed on the substrate, where the processing array includes a plurality of processor subunits, each one of the plurality of processor subunits being associated with one or more discrete memory banks among the plurality of discrete memory banks. The integrated circuit may also include a controller configured to implement at least one security measure with respect to an operation of the integrated circuit and take one or more remedial actions if the at least one security measure is triggered.Type: GrantFiled: February 11, 2022Date of Patent: July 16, 2024Assignee: NeuroBlade Ltd.Inventors: Elad Sity, Eliad Hillel
-
Patent number: 12041189Abstract: An electronic device is provided. The electronic device includes a memory, a communication circuit, a display, and a processor connected to the memory, the communication circuit, and the display, wherein the memory stores instructions which, when executed, cause the processor to acquire device information relating to a plurality of external electronic devices, on the basis of the device information, select a plurality of distribution storage devices for storing a distribution key from among the plurality of external electronic devices, generate a plurality of distribution keys obtained by dividing mnemonic information or a seed value for generating a key for electronically signing data to be transmitted to a blockchain network, and control the communication circuit such that the plurality of distribution keys are distributed and transmitted to the plurality of distribution storage devices.Type: GrantFiled: April 18, 2022Date of Patent: July 16, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Wooseok Jang, Moonsung Na, Sungwook Won, Sunghyuk Lee, Youna Lee, Euiheon Jeong, Seongmin Je, Jinsu Jo, Jongkeun Choi
-
Patent number: 12039089Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.Type: GrantFiled: May 1, 2023Date of Patent: July 16, 2024Assignee: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Patent number: 12033045Abstract: Described herein are systems and techniques for privacy-preserving unsupervised learning. The disclosed system and methods can enable separate computers, operated by separate entities, to perform unsupervised learning jointly based on a pool of their respective data, while preserving privacy. The system improves efficiency and scalability, while preserving privacy and avoids leaking a cluster identification. The system can jointly compute a secure distance via privacy-preserving multiplication of respective data values x and y from the computers based on a 1-out-of-N oblivious transfer (OT). In various embodiments, N may be 2, 4, or some other number of shares. A first computer can express its data value x in base-N. A second computer can form an ×N matrix comprising random numbers mi,0 and the remaining elements mi,j=(yjNi?mi,0) mod . The first computer can receive an output vector from the OT, having components mi=(yxi Ni?mi,0) mod .Type: GrantFiled: April 19, 2023Date of Patent: July 9, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Payman Mohassel, Ni Trieu
-
Patent number: 12034708Abstract: A method for sending registered secure messages via a messaging system to a receiver device that is to be tested includes: supplying first secure and still serialized messages from message packages for processing in a reproduction unit; in the first messages, reducing the data volume of the serialized messages; deserializing the reduced first messages and creating second secure messages by adding a second counter value in each case or, where applicable, by replacing a first counter value with the second counter value, and creating and adding a second authenticator in each case by using the second counter value, the encryption information, and the key, and by using the communication description or the information obtained by applying a data interpretation algorithm; and serializing the second secure messages and sending corresponding message packages to the receiver device to be tested.Type: GrantFiled: July 15, 2021Date of Patent: July 9, 2024Assignee: DSPACE GMBHInventor: Bjoern Mueller
-
Patent number: 12027001Abstract: An embodiment of an electronic access control system includes an electronic key, an electronic lock, and an access control administration program. The electronic key can include program code for switching between a lock mode and a computer mode. In some embodiments, the lock mode and computer mode allow for simplified administration and operation of the access control system. Some embodiments of the electronic key include a rechargeable battery. In some embodiments, the access control system includes a hybrid power supply system having a rechargeable battery and a generator. In some embodiments, the electronic lock includes a piezoelectric latch. In some embodiments, the electronic key is configured to act as a storage device for a computer system. Some embodiments provide an electronic access control system with a streamlined user interface.Type: GrantFiled: January 13, 2023Date of Patent: July 2, 2024Assignee: LockFOB, LLCInventor: Gregory Paul Kirkjan
-
Patent number: 12028447Abstract: A method includes extracting, by a computing system, movement intentions of an individual from neural signals; mapping, by a secure element of the computing system, the movement intentions to a character string; and generating, by the computing system, a symmetric encryption key using the character string as an input to a key exchange protocol.Type: GrantFiled: April 17, 2023Date of Patent: July 2, 2024Assignee: Wells Fargo Bank, N.A.Inventor: Phillip H. Griffin
-
Patent number: 12028707Abstract: A first apparatus includes a processor, a memory, and communication circuitry. The first apparatus is connected to a communications network via its communication circuitry. The first apparatus further includes computer-executable instructions stored in the memory of the first apparatus which, when executed by the processor of the first apparatus, cause the first apparatus to: receive voice content or other biometric content of a user; prepare a message including the voice or other biometric content; send the message to the communications network or a second apparatus through a control plane of the communications network in order to authenticate and authorize the first apparatus and the user; receive a response message from the communications network or the second apparatus, wherein the response message includes authentication and authorization results for the first apparatus and identification information that identifies the user.Type: GrantFiled: December 10, 2019Date of Patent: July 2, 2024Assignee: CONVIDA WIRELESS, LLCInventors: Hongkun Li, Michael Starsinic, Rocco Di Girolamo, Catalina Mladin, Chonggang Wang, Quang Ly, Dale Seed
-
Patent number: 12026999Abstract: According to a first aspect, it is provided a method for requesting access to a physical space secured by a lock. The method is performed in a mobile device of a user and comprises the steps of: authenticating the mobile device with an authentication server, resulting in a token, being a data item, indicating one or more access groups to which the user belongs, wherein the token is cryptographically signed by the authentication server; storing the token in the mobile device; obtain a lock identifier of the lock; and transmitting an access request to an access control device, the access request comprising the token and the lock identifier.Type: GrantFiled: October 14, 2020Date of Patent: July 2, 2024Assignee: ASSA ABLOY ABInventors: Fredrik Einberg, Fredrik Lindersson, Anders Wallbom
-
Patent number: 12021955Abstract: A method comprises allocating a data buffer in a shared memory region of a computing device, writing communication data comprising a header portion and a body portion into the data buffer, generating a modified header portion by appending the header portion of the communication data with address data that determines an address of the communication data in the data buffer, processing the modified header portion through the network protocol stack, and storing the body portion in the data buffer in a compatible data format for communication according to the networking protocol stack.Type: GrantFiled: January 31, 2022Date of Patent: June 25, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Shiqing Fan, Guoli Wang
-
Patent number: 12021850Abstract: Embodiments of the invention relate to efficient methods for authenticated communication. In one embodiment, a first computing device can generate a key pair comprising a public key and a private key. The first computing device can generate a first shared secret using the private key and a static second device public key. The first computing device can encrypt request data using the first shared secret to obtain encrypted request data. The first computing device can send a request message including the encrypted request data and the public key to a server computer. Upon receiving a response message from the server computer, the first computing device can determine a second shared secret using the private key and the blinded static second device public key. The first computing device can then decrypt the encrypted response data from the response message to obtain response data.Type: GrantFiled: July 8, 2022Date of Patent: June 25, 2024Assignee: Visa International Service AssociationInventors: Eric Le Saint, Upendra Mardikar, Dominique Fedronic
-
Patent number: 12021995Abstract: A system may comprise one or more processors, a memory in communication with the one or more processors, and storing instructions, that when executed by the one or more processors, are configured to cause the system to perform a method for decrypting an encrypted message. The method may include providing an encrypted code to a first user, receiving one or more first images comprising the encrypted code from a first user device associated with the first user. The method may include determining whether the first user device is a trusted device for the encrypted code. The method may include mapping the encrypted code to a first sequence of alphanumeric characters associated with the encrypted code. The method may include providing the first decrypted code comprising the first sequence of alphanumeric characters to the first user device for display in augmented reality proximate the encrypted code.Type: GrantFiled: March 31, 2021Date of Patent: June 25, 2024Assignee: CAPITAL ONE SERVICES, LLCInventors: Jonatan Yucra Rodriguez, Sahil Verma, Jonathan Guan, Jennifer Chu
-
Patent number: 12021379Abstract: An electronic device that has control electronics that have at least one program memory with a computer program stored therein and a processor for executing the computer program. The computer program has software control functions for controlling functions of the electronic device. The electronic device has at least one communication unit coupled to the control electronics, by means of which the electronic device is equipped for data communication with an external computer device. The communication unit is designed as a replaceable communication module. The communication module has a gateway functionality via which a bidirectional conversion takes place between an external communication protocol and/or physical layer used by the external computer device and an internal communication protocol and/or physical layer used between the communication module and the processor. The communication module supports either exactly one external communication protocol or multiple external communication protocols.Type: GrantFiled: September 24, 2021Date of Patent: June 25, 2024Assignee: Wago Verwaltungsgesellschaft MBHInventors: Janik Wiese, Stefan Oroel, Philipp Neugebauer
-
Patent number: 12015706Abstract: A security server storing a plurality of cryptographic keys to support device authentication, access control and proof of space plot farming. The cryptographic keys can include a first cryptographic key representative of an identity of a memory device, a second cryptographic key representative of a privilege to access a memory region in the memory device, and a third cryptographic key representative of a pool of proof of space plots. The security server can sign blocks in a blockchain created via plots in the pool, sign commands to access the memory region, and secure transfer of the second and/or third cryptographic key to the computer operated by an owner of the memory device.Type: GrantFiled: December 14, 2021Date of Patent: June 18, 2024Assignee: Micron Technology, Inc.Inventors: Luca Bert, Joseph Harold Steinmetz
-
Patent number: 12010102Abstract: A virtual private network (VPN) client generates a short-term key pair. The VPN client generates a short-term high security key pair. The VPN client transmits a request for a pre-shared key (PSK) to a VPN server. The VPN client receives a response that includes the PSK. The VPN client decrypts the response based on the short-term key pair to obtain a ciphertext. The VPN client decrypts the ciphertext based on the short-term high security key pair to obtain the PSK. A VPN tunnel is then established between the VPN client and the VPN server based on the PSK.Type: GrantFiled: September 26, 2023Date of Patent: June 11, 2024Assignee: 360 IT, UABInventors: Karolis Pabijanskas, Mantas Jonytis
-
Patent number: 12001690Abstract: According to one embodiment, a memory system includes a nonvolatile memory and a controller. The controller manages first account information to be used for authentication of a first account and second account information to be used for authentication of a second account. The controller receives third account information from a host device. When the third account information matches the first account information, the controller permits access to at least a partial storage area of the nonvolatile memory based on a request from the host device and transmits first data that includes the second account information to a first memory system.Type: GrantFiled: December 9, 2021Date of Patent: June 4, 2024Assignee: Kioxia CorporationInventor: Hirotomo Kobayashi
-
Patent number: 12003636Abstract: Proving reliability of a second public key of a second key pair generated in association with a first key pair. A generator 210 calculates and stores x·H(n) which is proof data and ax·H(n), when the second public key ax·g1 which is of the second key pair is generated (S301). The generator 210 provides the calculated proof data to a receiving apparatus 220 (S302) which has received the proof data, transmits a proof request to the proving apparatus 230 for requesting a proof that the second public key ax·g1 is generated by an owner of the first public key a·g1 (S303). In response to the proof request, the proving apparatus 230 verifies the proof data by calculating a verification formula for the proof data (S304). The proving apparatus 230 transmits the verification result as a response to the proof request from the receiving apparatus 220 (S305).Type: GrantFiled: May 10, 2019Date of Patent: June 4, 2024Assignee: BITFLYER BLOCKCHAIN, INC.Inventor: Takafumi Komiyama
-
Patent number: 11997486Abstract: Computer implemented methods, systems, and computer program products are provided including identifying a new reservation from an electronic device for automatic access to a network; conveying the credentials to the electronic device prior to arriving at a structure associated with the network; and granting access to a network once the electronic device is detected by the network.Type: GrantFiled: December 20, 2019Date of Patent: May 28, 2024Assignee: LENOVO (SINGAPORE) PTE. LTDInventors: John Carl Mese, Russell Speight VanBlon, Nathan J. Peterson
-
Patent number: 11995220Abstract: Aspects of the subject disclosure may include, for example, identifying, during a CPU's execution of a first program, a branching instruction of the first program that redirects execution to a second program. Responsive to the identifying of the branching instruction, a return address of a next instruction of the first program is encrypted. The encrypted return address is transferred to the second program without the CPU retaining a record of the return address. The encrypted return address is received from the second program responsive to its completion of execution. The received encrypted return address is decrypted to obtain the return address enabling a resumption of execution of the first program from the next instruction. Other embodiments are disclosed.Type: GrantFiled: June 6, 2022Date of Patent: May 28, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: William C. Cottrill, Sheldon Kent Meredith, Peter Hardie
-
Patent number: 11997204Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests across tenants of at least one multi-tenant database system. Authentication is facilitated using a central registry that is accessible by and independent from the tenants of the multi-tenant database system.Type: GrantFiled: February 22, 2021Date of Patent: May 28, 2024Assignee: Salesforce, Inc.Inventors: Matthew Bahrenburg, Alan Vangpat, Anupam Jain, William Charles Mortimore, Jr., Srinath Krishna Ananthakrishnan, Peter S. Wisnovsky
-
Patent number: 11997206Abstract: A system and method for identity-based access admission are provided. The method includes generating in a browser of a client device a unique identity key for the browser, wherein the identity key is generated in an internal frame (iFrame) thread, is executed in a main thread of the browser, and wherein the identity key includes a fingerprint characterizing in part the browser and the client device, an internet protocol address of the client device, and a public-encryption key; and registering the identity key with an admission controller, wherein access to a protected entity by the client device is enforced using the identity key.Type: GrantFiled: September 22, 2021Date of Patent: May 28, 2024Assignee: RADWARE, LTD.Inventors: Alon Tamir, Amir Marmor, David Aviv
-
Patent number: 11989205Abstract: Embodiments of the invention are directed to data replication in an active-active databases having a source site and a target site. Aspects include creating a subscription activation message in a capture address space, the subscription activation message having a timestamp after a latest committed timestamp of the active-active databases and transmitting the subscription activation message to a subscription activation module of the target site of the active-active databases. Based on a determination that one or more tables associated with the subscription activation message are inactive, aspects also include repairing the one or more tables. Based on a determination that all tables associated with the subscription activation message are active, aspects include initiate replication of the capture address space from the source site to the target site with a timestamp of the latest committed timestamp.Type: GrantFiled: June 2, 2022Date of Patent: May 21, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xin Xin Dong, Mai Zeng, Xing Jun Zhou, Ming Qiao Shang Guan, Wei Song, Cheng Fang Wang
-
Patent number: 11985225Abstract: A computer-implemented exchange method is provided. The method may be performed on one or more blockchains, such as the Bitcoin Cash blockchain. The method comprises the steps of: communicating a first veiled secret value (H(A0)) from a first user to a second user and a second veiled secret value (H(B0) from the second user to the first user; and constructing first and second blockchain transactions (tx1, tx2) each comprising the first veiled secret value and the second veiled secret value, the transactions arranged to be unlockable to transfer control of a respective first or second resource upon provision of both the first secret value (A0) and the second secret value (B0) to the respective blockchain transaction, wherein unlocking of the first blockchain transaction causes a first secret value to be revealed to the second user, and unlocking of the second blockchain transaction causes a second secret value to be revealed to the first user.Type: GrantFiled: May 8, 2019Date of Patent: May 14, 2024Assignee: nChain Licensing AGInventor: Craig Steven Wright
-
Patent number: 11985166Abstract: In some implementations, a network device may establish a secure connection between the network device and another network device based on a first set of keys generated by the network device, wherein the first set of keys are generated based on a first connectivity association key (CAK) and the secure connection is established based on a media access control security (MACsec) protocol. The network device may transmit a message to the other network device, wherein the message includes an indication of a second CAK. The network device may communicate data via the secure connection based on a second set of keys, wherein the second set of keys are generated based on the second CAK.Type: GrantFiled: March 18, 2022Date of Patent: May 14, 2024Assignee: Juniper Networks, Inc.Inventor: Nandan Debnath
-
Patent number: 11979488Abstract: A method for generating a key stream according to an embodiment includes generating r round keys that are each N-dimensional integer vectors including elements of an integer set defined based on a prime number t, based on a random bit string, an encryption counter, and a secret key that is an N-dimensional integer vector consisting of elements of the integer set , generating a first round output vector x1 by performing a modular addition operation on an initial vector and a first round key RK1 of the r round keys with the prime number t as a modulus, and generating a key stream that is an N-dimensional integer vector consisting of elements of the integer set from the first round output vector x1 by using a second to r-th round keys of the r round keys, and one or more first round functions and a second round function.Type: GrantFiled: October 29, 2021Date of Patent: May 7, 2024Assignees: Samsung SDS Co., Ltd., Korea Advanced Institute of Science and TechnologyInventors: Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Seong Kwang Kim, Joo Young Lee, Jin Cheol Ha
-
Patent number: 11979491Abstract: A method and apparatus for providing user key material from a server to a client is disclosed. The method comprises receiving a first message from the client in a server, the first message having a user key material request, an access token and an identifier of a transport key (TrK-ID), validating the user key material request according to the access token, generating a response having user key material responsive to the user key material request, encrypting the response according to the transport key (TrK), and transmitting a second message comprising the response from the server to the client. The client decrypts the second message according to the transport key (TrK) and validates the second message using the identifier of the transport key (TrK-ID).Type: GrantFiled: November 10, 2022Date of Patent: May 7, 2024Assignee: ARRIS Enterprises LLCInventor: Xin Qiu
-
Patent number: 11968192Abstract: This invention involves an encryption method that is mainly applied to network. The network could be both wireless or wired, the former is connected through a wireless router, and the latter is connected through a router. When the network receives a message requesting connection from at least one new networking device, it can authenticate and authorize the message through the key to form a fixed connection with the network, and at the same time, at least one connected device to the network can update the password connected to the network synchronously, or at least one connected device connected to the network can update the password connected to the network at any time, so as to improve the performance of network security and avoid hacking.Type: GrantFiled: January 14, 2022Date of Patent: April 23, 2024Assignee: SIAOBI INC.Inventor: Jheng-Hao Cyue
-
Patent number: 11968294Abstract: This application provide a data management method for a blockchain system, a medium, and an electronic device. The system includes an accounting node sub-network and a service node sub-network. The method includes: adding, after an accounting node generates a first data block, first key information used for verifying a block header of a second data block generated after the first data block to a block header of the first data block; generating a signature corresponding to the first data block, and adding the signature corresponding to the first data block to the block header of the first data block; and releasing the block header of the first data block to the service node sub-network, to cause a service node to verify the signature included in the block header of the first data block, and obtaining the first key information after a successful verification to verify the block header of the second data block.Type: GrantFiled: January 13, 2021Date of Patent: April 23, 2024Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Maocai Li, Zongyou Wang, Li Kong, Kaiban Zhou, Hu Lan, Yifang Shi, Changqing Yang, Jinsong Zhang, Yong Ding, Gengliang Zhu, Qucheng Liu, Qiuping Chen
-
Patent number: 11962704Abstract: A method including encrypting, by a user device based at least in part on utilizing a symmetric key, a folder stored on the user device; encrypting, by the user device based at least in part on utilizing an assigned public key specific to the folder, the symmetric key to determine a single-encrypted symmetric key; encrypting, by the user device based at least in part on utilizing a trusted device key specific to the user device, the single-encrypted symmetric key to determine a double-encrypted symmetric key; encrypting, by the user device based at least in part on utilizing a trusted user key specific to the folder, an assigned private key that is associated with the assigned public key; and storing, by user device, the double-encrypted symmetric key and the encrypted assigned private key in an associated memory is disclosed. Various other aspects and techniques are contemplated.Type: GrantFiled: August 13, 2022Date of Patent: April 16, 2024Assignee: UAB 360 ITInventor: Mindaugas Valkaitis
-
Patent number: 11960840Abstract: A method executed by a computing device includes determining a set of identigens for each query word of a query to produce sets of identigens, where a set of identigens represents different meanings of a word of the query. The method further includes obtaining a first identigen selection for a first query word from the first set of identigens. The method further includes interpreting, using identigen pairing rules and based on the first identigen selection, the sets of identigens to produce a query entigen group. The method further includes accessing a knowledge database utilizing the query entigen group to produce a response entigen group. The method further includes generating a response to the query using the response entigen group, where the response includes at least one response word.Type: GrantFiled: June 21, 2021Date of Patent: April 16, 2024Assignee: entigenlogic LLCInventors: Frank John Williams, Stephen Emerson Sundberg, Ameeta Vasant Reed, Dennis Arlen Roberson, Thomas James MacTavish, Karl Olaf Knutson, Jessy Thomas, Niklas Josiah MacTavish, David Michael Corns, II, Andrew Chu, Kyle Edward Alberth, Ali Fattahian, Zachary John McCord, Ahmad Abdelqader Abunaser, Gary W. Grube
-
Patent number: 11962681Abstract: Features for providing a secure method of symmetric encryption for private smart contacts among multiple parties in a private peer-to-peer network. The features include a master key representing a unique blockchain ledger. The master key may be shared among multiple participants in a private peer-to-peer network. Sharing of the master key may include communicating the master key in an encrypted message (e.g., email) using public key infrastructure (PKI). In some implementations, more complex distribution features may be includes such as quantum entanglement. The features support instantiation of a smart contract using a specific master key. The request may be submitted as an entry to the ledger with appropriate metadata and/or payload information for identifying and processing the request.Type: GrantFiled: April 4, 2023Date of Patent: April 16, 2024Assignee: Experian Information Solutions, Inc.Inventors: Vijay Mehta, Alexander Phan
-
Patent number: 11954047Abstract: Systems, methods, and apparatuses to implement spatially unique and location independent persistent memory encryption are described. In one embodiment, a system on a chip (SoC) includes at least one persistent range register to indicate a persistent range of memory, an address modifying circuit to check if an address for a memory store request is within the persistent range indicated by the at least one persistent range register, and append a unique identifier value, for a component corresponding to the memory store request for the address, to the address to generate a modified address and output the modified address as an output address when the address is within the persistent range, and output the address as the output address when the address is not within the persistent range, and an encryption engine circuit to generate a ciphertext based on the output address.Type: GrantFiled: September 26, 2020Date of Patent: April 9, 2024Assignee: Intel CorporationInventors: Mahesh Natu, Anand K. Enamandram, Manjula Peddireddy, Robert A. Branch, Tiffany J. Kasanicky, Siddhartha Chhabra, Hormuzd Khosravi
-
Patent number: 11956348Abstract: A method for managing security keys for an I/O device may include loading a first security key from a primary memory to a security engine, performing a first data transfer operation between a host and the I/O device using the first security key with the security engine, loading a second security key from a secondary memory to the security engine, and performing a second data transfer operation between the host and the I/O device using the second security key with the security engine. The method may further include storing the first security key in the primary memory based on a frequency of use of the first security key. The frequency of use of the first security key may be determined by a pattern of transfers between the host and the I/O device.Type: GrantFiled: December 15, 2020Date of Patent: April 9, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Pyeongwoo Lee, Sumanth Jannyavula Venkata, Young Deok Kim
-
Patent number: 11943354Abstract: The technical problem of matching records in different datasets, for example a host dataset and a partner dataset storing records representing respective users, while maintaining the privacy of each dataset, is addressed by providing a privacy safe joint identification protocol. The privacy safe joint identification protocol computes respective anonymous joint identifiers for records in the two datasets. An anonymous joint identifier is generated such that the host-assigned and the partner-assigned identifies that have been determined to represent the same user are mapped to the same anonymous joint identifier.Type: GrantFiled: July 20, 2021Date of Patent: March 26, 2024Assignee: Snap Inc.Inventor: Apoorvaa Deshpande
-
Patent number: 11934542Abstract: A method may include transferring data from a host to an encryption offload engine through an interconnect fabric, encrypting the data from the host at the encryption offload engine, and transferring the encrypted data from the encryption offload engine to a storage device through a peer-to-peer connection in the interconnect fabric. The method may further include transferring the encrypted data from the storage device to the encryption offload engine through a peer-to-peer connection in the interconnect fabric, decrypting the encrypted data from the storage device at the encryption offload engine, and transferring the decrypted data to the host through the interconnect fabric. The method may further include transferring the encrypted data from the storage device to the host, and verifying the encryption of the encrypted data at the host.Type: GrantFiled: December 12, 2022Date of Patent: March 19, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventor: Sumanth Jannyavula Venkata
-
Patent number: 11934323Abstract: A symmetric key that is stored at a device may be received. A public key from a remote entity may also be received at the device. Furthermore, a derived key may be generated based on a one way function between the symmetric key that is stored at the device and the public key that is received from the remote entity. The derived key may be encrypted with the public key and transmitted to the remote entity. The encryption of the derived key with the public key may provide secure transmission of the derived key to an authorized remote entity with a private key that may be used to decrypt the encrypted derived key.Type: GrantFiled: June 21, 2021Date of Patent: March 19, 2024Assignee: Cryptography Research, Inc.Inventor: Ambuj Kumar
-
Patent number: 11936776Abstract: A unique transaction key (Tk) is established amongst multiple entities using a common hardware security module (HSM) with a common HMAC key (HK) and transaction scheme name (T). The transaction key (Tk) can be used for various cryptographic functions (e.g. encryption, MAC, HMAC, key management) with one or more messages at the transaction or session level.Type: GrantFiled: March 6, 2023Date of Patent: March 19, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 11924286Abstract: An information processing apparatus includes circuitry that detects reception of first data from a connection source apparatus. The first data includes information about establishment of a session for encrypted communication between the source apparatus using a service and a connection destination apparatus providing the service. The circuitry converts the first data into a first message following a communication protocol in the session establishment, and converts a second message from the destination apparatus into second data including at least information for generating a common key for the encrypted communication. Before the session establishment, the circuitry transmits the first message to the destination apparatus and transmits the second data to the source apparatus. After the session establishment, the circuitry transmits service data from the source apparatus to the destination apparatus and from the destination apparatus to the source apparatus in an unconverted state.Type: GrantFiled: September 7, 2022Date of Patent: March 5, 2024Assignee: Ricoh Company, Ltd.Inventor: Satoru Yamamoto
-
Patent number: 11921839Abstract: Techniques are disclosed relating to sharing a user credential between computing devices. In some embodiments, a first computing device stores a set of user credentials usable to authenticate a user and receives, from a second computing device, a request for a user credential to be provided responsive to an authentication prompt associated with the second computing device. In such an embodiment, the request includes an indication of a service for which the authentication prompt is being presented. Based on the indication, the first computing device determines whether the stored set of user credentials includes a user credential relevant to the authentication prompt and presents a selection prompt asking a user of the first computing device to select a one of the stored set of user credentials to provide to the second computing device for authentication to the service, the relevant user credential being identified in the selection prompt.Type: GrantFiled: April 2, 2021Date of Patent: March 5, 2024Assignee: Apple Inc.Inventors: Richard J. Mondello, Chelsea E. Pugh, Maureen G. Daum, Morgan H. Winer, Shuchen Li
-
Patent number: 11914745Abstract: Handling personally identifiable information (PII) in data streams is provided. Processed sensor data is received, from a plurality of vehicles including sensors capturing raw sensor data, the raw sensor data including captured PII and non-PII. The processed sensor data includes simulated PII created based on the captured PII and one or more layers of the captured PII corresponding to the simulated PII. A request is received from a client device for a portion of the processed sensor data. Access keys corresponding to the request are identified. A result is constructed according to the access keys using the processed sensor data. The constructed result is sent to the client device responsive to the request.Type: GrantFiled: April 14, 2021Date of Patent: February 27, 2024Assignee: Ford Global Technologies, LLCInventors: David Michael Herman, Jon Speigle, Brian Tamm, Yashanshu Jain, Yogendra Singh
-
Patent number: 11917078Abstract: Methods, systems, and apparatus, including a method for determining network measurements. In some aspects, a method includes receiving, by a first aggregation server and from each of multiple client devices, encrypted impression data. A second aggregation server receives, from each of at least a portion of the multiple client devices, encrypted conversion data. The first aggregation server and the second aggregation server perform a multi-party computation process to decrypt the encrypted impression data and the encrypted conversion data. Each portion of decrypted impression data and each portion of decrypted conversion data is sent to a respective reporting system.Type: GrantFiled: December 11, 2020Date of Patent: February 27, 2024Assignee: Google LLCInventors: Gang Wang, Marcel M. Moti Yung
-
Patent number: 11917071Abstract: A universal tag linked to the content of a data file for protecting the authenticity of the data file and/or the owner/creator of a digital file. The universal tag is linked to the content in the data file via one or more input keys/seeds that are used to generate the universal tag and rely on data associated with the content. Once generated, the universal tag is registered on a distributed ledger of at least on distributed trust computing network, which acts as a source of truth to validate the universal tag and, as such, validate (i) an authenticity of the data file, and/or (ii) the user associated with the data file (e.g., rightful possessor and/or creator of the digital file).Type: GrantFiled: November 3, 2021Date of Patent: February 27, 2024Assignee: BANK OF AMERICA CORPORATIONInventor: Joseph Benjamin Castinado
-
Patent number: 11917520Abstract: A method for communicating amongst a plurality of peripherals within a mesh network including a first subnet and a second subnet including: receiving an advertisement from one or more peripherals of the plurality of peripherals, the advertisement including a hop count, a subnet identifier, and a unique subnet device identifier, the subnet identifier indicating the first subnet or the second subnet and the unique subnet device identifier indicating a specific peripheral of the plurality of peripherals within the mesh network; triggering a message send event; determining a desired stream direction within the mesh network; determining a desired subnet of the mesh network; determining a destination peripheral of the one or more peripherals within the desired subnet and in the desired stream direction in response to the hop count, the subnet identifier, and the unique subnet device identifier; connecting to the destination peripheral; and sending the message to the destination peripheral.Type: GrantFiled: September 10, 2020Date of Patent: February 27, 2024Assignee: CARRIER CORPORATIONInventors: Adam Kuenzi, Michael Lang, Randall Dow