Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
  • Patent number: 12082135
    Abstract: Apparatuses, methods, and systems are disclosed for repeater configuration for initial access. An apparatus includes a transceiver that that receives an initial setup configuration from a base station of a mobile wireless communication network for establishing a forwarding link with a user equipment (“UE”) device, receives an initial access configuration from the base station, the initial access configuration comprising one or more configuration parameters that allow the UE to establish access to the mobile wireless communication network, and transmits feedback to the base station that indicates reception of one or more of the initial setup configuration and the initial access configuration.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: September 3, 2024
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Ali Ramadan Ali, Ankit Bhamri, Sher Ali Cheema, Ahmed Hindy, Vijay Nangia
  • Patent number: 12081551
    Abstract: A method for providing online security may include: (1) receiving, by a validation computer program executed by a trusted entity backend for a trusted entity, a call from a web browser executed on a customer electronic device browsing a webpage for an online entity, the call comprising an online entity identifier for the online entity and a session identifier, wherein the webpage for the online entity may include a hidden <iframe> comprising code that causes the web browser to execute the call; (2) confirming, by the validation computer program, that a cookie for the trusted entity may be stored on the customer electronic device; and (3) returning, by the validation computer program, a first value indicating that the customer electronic device is known to the trusted entity or a second value indicating that the customer electronic device is not known to the trusted entity based on the confirmation.
    Type: Grant
    Filed: August 6, 2021
    Date of Patent: September 3, 2024
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventor: Howard Spector
  • Patent number: 12079367
    Abstract: A system and method for enabling social network users to grant their connections, granular visibility into their personal data without granting the same visibility to the network operator.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: September 3, 2024
    Inventor: Amod Ashok Dange
  • Patent number: 12072971
    Abstract: Disclosed embodiments provide systems and methods that can be used as part of or in combination with autonomous navigation, autonomous driving, or driver assist technology features. As opposed to fully autonomous driving, driver assist technology may refer to any suitable technology to assist drivers in the navigation or control of their vehicles. In various embodiments, the system may include one or more cameras mountable in a vehicle and an associated processor that monitors the environment of the vehicle. In further embodiments, additional types of sensors can be mounted in the vehicle and can be used in the autonomous navigation or driver assist systems. These systems and methods may include the use of a shared cache that is shared by a group of processing units to improve analysis of images captured by the one or more cameras.
    Type: Grant
    Filed: October 13, 2021
    Date of Patent: August 27, 2024
    Assignee: Mobileye Vision Technologies Ltd.
    Inventors: Eran Ben-Avi, Leonid Smolyansky
  • Patent number: 12072963
    Abstract: A system and method for affixing a signature using biometric authentication, is described herein. The system is configured for registering a user by receiving a set of biometric samples of the user, processing the set of biometric samples to compute a Secret-Key (S1) corresponding to the user, generating a Unique-Number (N1) using a random number generation algorithm, applying a Function (F1) to the Secret-Key (S1) and the Unique-Number (N1), to compute a Public-Key (P1), receiving a document signing request from an application. Once the user is registered, the system is configured to receive a biometric sample from the user in real-time and compute the Secret-Key (S2) for authenticating the user. Once the user is authenticated, the system may capture the user's approval to affix the user's signature to the document and transmit the user's signature to the application upon successful authentication of the user.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: August 27, 2024
    Inventor: Amod Ashok Dange
  • Patent number: 12073485
    Abstract: Example apparatus disclosed herein include a watermark detector to detect watermarks in a media signal. Disclosed example apparatus also include a controller to operate the watermark detector to (1) detect a first watermark in the media signal, and (2) cycle between sleep intervals and active intervals based on a repetition rate of the watermarks in the media signal to perform a detection operation for a second watermark at a second location in the media signal relative to a first location of the first watermark in the media signal. In some examples, the controller is to search a buffer of prior detected watermark symbols to detect a third watermark at a third location prior to the second location in the media signal in response to the second watermark not being detected at the second location in the media signal.
    Type: Grant
    Filed: June 14, 2023
    Date of Patent: August 27, 2024
    Assignee: The Nielsen Company (US), LLC
    Inventors: David Gish, Sadhana Gupta, Vladimir Kuznetsov, Wendell D. Lynch, Alan R. Neuhauser
  • Patent number: 12072989
    Abstract: Systems, methods, and devices configured to build and utilize an intelligent cipher transfer object are provided. The. intelligent cipher transfer object includes a set of participants protected by cloaking patterns. A portable dynamic rule set, which includes executable code for managing access to the protected set of participants, is included within the intelligent cipher transfer object. For a given user, the intelligent cipher transfer object may provide access to some of the participants while preventing access to other participants, based on the portable dynamic rule set therein.
    Type: Grant
    Filed: July 16, 2021
    Date of Patent: August 27, 2024
    Assignee: Sertainty Corporation
    Inventors: Gregory Scott Smith, Melani Leigh Smith Weed, Daniel Michael Fischer, Elke M. Ridenour
  • Patent number: 12067112
    Abstract: Disclosed herein are systems, methods, and storage media for distributed system security. In an example embodiment, a computer-executable method includes receiving a first item of executable code, calculating a hash of the first item of executable code, and comparing the calculated hash to a database of hashes. Responsive to a determination that the calculated hash does not match any hash in the database of hashes, a first security policy is applied to the first item of executable code. Triggering of the first policy indicates that the first item of executable code should be blocked from execution. If the first item of executable code does not trigger the first security policy, the method includes executing the first item of executable code and intercepting a request initiated by the first item of executable code during execution. In the request matches a second security policy, the request is blocked and/or filtered or sanitized, based on attribute-based access control policies.
    Type: Grant
    Filed: April 3, 2023
    Date of Patent: August 20, 2024
    Assignee: Data Security Technologies LLC
    Inventors: Fahad Shaon, Sazzadur Rahaman
  • Patent number: 12069188
    Abstract: Methods and systems for detecting and responding to fabricated or unauthorized events received by serverless computing environments are provided. In one embodiment the method is provided that includes receiving an event from an event source external to the serverless computing environment for execution by function. The method may then include creating a message that includes the events and signing the message with an identifier of the event source. The message may then be received at the function and the identifier of the event source may be validated. The event may then be executed with the function of the serverless computing environment if the identifier of the event sources successfully validated. However, if the identifier of the event source is not successfully validated, execution of the event with the function may be prevented.
    Type: Grant
    Filed: December 28, 2021
    Date of Patent: August 20, 2024
    Assignee: RED HAT, INC.
    Inventors: Huamin Chen, Michael Hingston Mclaughlin Bursell
  • Patent number: 12069207
    Abstract: A mobile application and a method are described for servicing a second line service (“SLS”) based communication request originating from a subscriber's telecommunications device (“TD”) even if the call signal does not include sufficient information to identify the phone number from which the subscriber initiated the call. The method involves associating the SLS phone number of the subscriber, the primary number of the subscriber and the primary number of a third party via a special relationship number.
    Type: Grant
    Filed: February 9, 2023
    Date of Patent: August 20, 2024
    Assignee: Movius Interactive Corporation
    Inventors: George Backhaus, Jignesh Gandhi, Julio Gonzalez, John Green, Philip Lowman, Paul Rubenstein, Mike Speanburg
  • Patent number: 12067152
    Abstract: A storage unit stores a size of a free area of storage of target equipment, and software saved in the storage. The generation unit generates a graph including a number of nodes according to the size of the free area of the storage, and transmits the graph to the target equipment. The calculation unit calculates a hash value corresponding to each software block saved in the storage. The verification unit verifies the presence or absence of tampering of the storage of the target equipment using the hash value corresponding to the block calculated, a response calculated using the graph returned to a challenge that specifies a node of the graph, and a hash value corresponding to the block returned as the response to the challenge that specifies the block.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: August 20, 2024
    Assignee: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
    Inventors: Manami Ito, Kimihiro Yamakoshi, Hiroyoshi Takiguchi, Takeshi Nakatsuru
  • Patent number: 12063506
    Abstract: The present disclosure relates to a method for detecting unauthorized data traffic in a packet-oriented data network of a motor vehicle, wherein at least one data packet is read out of the data network by a processor circuit, and header data of each data packet is checked for link information indicating that the data packet belongs to a communication link that is permitted for the operation of the motor vehicle. If the data packet is recognized as belonging to a permitted communication link, payload data of the data packet is checked to determine whether data values of the payload data have a value profile that is provided for the communication link. If a permitted communication link or a permitted value profile for the data packet is missing, a detection signal is generated to identify the data packet as unauthorized data traffic.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: August 13, 2024
    Assignee: AUDI AG
    Inventors: Christopher Corbett, Felix Baumann
  • Patent number: 12061702
    Abstract: This document describes systems and techniques for deriving identity and root keys for embedded systems. In aspects, a boot process and key manager of an embedded system may implement a secure or trusted boot process for embedded systems in which code of next-level boot loader or software image is verified using root keys or other protected information before execution of the boot process is passed to the next stage in the boot process. Alternatively or additionally, the key manager may enable sealing and attestation of various levels of root and identity keys to enable respective verification of software or hardware throughout a life cycle of a device to prevent unauthorized access to protected or private code of an embedded system. By so doing, the described aspects may enable an embedded system with a secure boot process and robust identity and root key management system.
    Type: Grant
    Filed: October 6, 2021
    Date of Patent: August 13, 2024
    Assignee: Google LLC
    Inventors: Miguel Angel Osorio Lozano, Timothy Jay Chen
  • Patent number: 12056185
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to identify media. An example method includes: in response to a query, generating an adjusted sample media fingerprint by applying an adjustment to a sample media fingerprint; comparing the adjusted sample media fingerprint to a reference media fingerprint; and in response to the adjusted sample media fingerprint matching the reference media fingerprint, transmitting information associated with the reference media fingerprint and the adjustment.
    Type: Grant
    Filed: June 6, 2022
    Date of Patent: August 6, 2024
    Assignee: GRACENOTE, INC.
    Inventors: Robert Coover, Matthew James Wilkinson, Jeffrey Scott, Yongju Hong
  • Patent number: 12056549
    Abstract: A system includes a first device to select and transmit a first code by a transmitter to a remote device controlling a mechanism or access to a database or a computing device. The remote device implements a switching device based on the first code; the transmitter in the first device generates a first sequence of signals based on the first code; the switching device in the remote device processes the first sequence of signals and activates the mechanism based on the processing of the first sequence of signals. The first device may be a smartphone, a fob, an access card, or any other computing device.
    Type: Grant
    Filed: April 26, 2021
    Date of Patent: August 6, 2024
    Assignee: LCIP JV
    Inventor: Peter Lablans
  • Patent number: 12056220
    Abstract: The present disclosure relates to systems and methods for embedding concealed meta-data into DNNs. Specifically, the system and method presented consists of receiving a trained neural network that includes one or more layers each having weights. The disclosed process includes transforming at least one layer to a transformed domain, adding information to the layer(s) in the transformed domain, and performing an inverse domain transform on at least one layer such that the layer(s) has new weights with an embedded watermark.
    Type: Grant
    Filed: August 23, 2022
    Date of Patent: August 6, 2024
    Assignee: Ciena Corporation
    Inventors: Firouzeh Golaghazadeh, Petar Djukic
  • Patent number: 12056260
    Abstract: A software verification method and apparatus are provided. The method includes: reading flag information, where the flag information is used to indicate a target digital certificate; selecting one of a plurality of digital certificates as a target digital certificate based on the flag information, where the plurality of digital certificates include a first digital certificate and a second digital certificate, and the target digital certificate includes a cryptographic resource; and verifying software deployed on a device based on the cryptographic resource. Using the foregoing technical solution can ensure continuity of the software verification service in the device.
    Type: Grant
    Filed: April 22, 2022
    Date of Patent: August 6, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Haiwu Chen, Bin Cao, Mengnan Zhang, Jianying Qian
  • Patent number: 12056242
    Abstract: A system is provided for configurably signing a secure data image that includes software code that interprets cryptographic atomic code. In the system, a code signing engine includes an interpreter that interprets atomic code signing operations presented in a recipe defined by a system administrator according to configuration parameter values supplied with the input image.
    Type: Grant
    Filed: May 8, 2023
    Date of Patent: August 6, 2024
    Assignee: ARRIS Enterprises LLC
    Inventors: Tat Keung Chan, Ting Yao, Alexander Medvinsky
  • Patent number: 12050670
    Abstract: Techniques for embedding watermarks are described. In accordance with various embodiments, a server (e.g., a cloud in a core network) generates a profile for an encoded media content item and packages the profile as corresponding watermark metadata. The server then transmits the encoded media content item and the corresponding watermark metadata to at least one edge node in an edge cloud. A respective edge node in the edge cloud, upon receiving a request from a client device for the encoded media content item, where the request includes a client identifier associated with the client device, obtains a first portion of the encoded media content item and the corresponding watermark metadata. A watermark embedder of the edge node then embeds the client identifier in the embedded media content item according to the watermark metadata and transmits the watermark embedded media content item to the client device.
    Type: Grant
    Filed: October 5, 2021
    Date of Patent: July 30, 2024
    Assignee: Synamedia Limited
    Inventors: Assaf Yosef Tamir, Vered Anikster, Steven Jason Epstein, Gwenaël Jacques Doërr
  • Patent number: 12052233
    Abstract: In an identity verification method for a network function service, a network element receives from a requesting network element a network function (NF) service request that includes a token, The token includes first certificate information. The network element verifies the first certificate information to determine whether an identity represented by the first certificate information is consistent with an identity of the requesting network element. When the network element determines that the identity represented by the first certificate information is inconsistent with the identity of the requesting network element, the network element rejects the NF service request.
    Type: Grant
    Filed: October 27, 2021
    Date of Patent: July 30, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bo Zhang, Fei Li
  • Patent number: 12052239
    Abstract: A system for authenticating an individual's location activity includes a mobile communications device connected to a network and in electronic communication with at least one other computer. The mobile communications device is configured to authenticate the individual's presence at a location using biometric data entered by the individual. The mobile communications device has applications stored thereon to access location information for the mobile communications device using a GPS application stored on the mobile communications device and to access time information for the mobile communications device from a clock application stored on the mobile communications device. The mobile communications devices creates a digital signature that authenticates an individual's location activity by storing an encrypted digital certificate comprising a hash calculation using the biometric data, a validation key generated by authenticating the biometric data, the location information, and the time information.
    Type: Grant
    Filed: September 19, 2022
    Date of Patent: July 30, 2024
    Assignee: University of South Florida
    Inventors: Sriram Chellappan, Balaji Padmanabhan, Tanvir Hossain Bhuiyan, Arup Kanti Dey, Shaminur Rahman
  • Patent number: 12052446
    Abstract: Methods and apparatus for monitoring locally inserted media are disclosed. A disclosed apparatus includes instructions to detect, at a media device at an end user location, a frequency of a watermark that was spliced into a primary media stream received at the media device after the primary media stream was received at the end user location, associate identifying tags with segments of the primary media stream that were spliced, in response to the detection of the watermark, determine an advertisement associated with the segments of the primary media based on the identifying tags, present the primary media at a first time and the advertisement at second times, record a log including first identifying information including an identity of the content of the primary media and second identifying information including a change in the frequency of the watermark corresponding to the advertisement; and transmit the log to a data collection facility.
    Type: Grant
    Filed: October 17, 2022
    Date of Patent: July 30, 2024
    Assignee: The Nielsen Company (US), LLC
    Inventors: Arun Ramaswamy, Paul C. Kemper
  • Patent number: 12047511
    Abstract: An information processing system includes an image capturing device and a display device, wherein the image capturing device includes a biometric information acquisition part that acquires biometric information, an authenticating part that authenticates whether or not the biometric information matches registered biometric information registered in advance, an image capturing part that permits capturing of an image on a condition that authentication by the authenticating part is successful, an encryptor that encrypts image data captured by the image capturing part to generate encrypted data, and a data output part that outputs the encrypted data to the display device via a connecting terminal connected to the display device. The display device includes an acquisition part that acquires the encrypted data via a terminal connected to the image capturing device, a decryptor that decrypts the encrypted data, and a display that displays the image data decrypted and acquired by the decryptor.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: July 23, 2024
    Inventors: Madoka Sakaitani, Kenichi Mogi
  • Patent number: 12045376
    Abstract: An example apparatus includes: memory; instructions in the apparatus; and at least one processor to execute the instructions to: check for proof of trust information in one or more pre-determined positions in a trusted digital image, the proof of trust information including a secure output marker, the secure output marker indicative of information corresponding to a trusted output area of the trusted digital image; decrypt the secure output marker using one or more security keys from a trusted execution environment (TEE), the TEE isolated from a computing application; and enable activation of a trusted output indicator in response to a match between first data corresponding to the secure output marker and second data corresponding to the trusted output area of the trusted digital image.
    Type: Grant
    Filed: July 12, 2021
    Date of Patent: July 23, 2024
    Assignee: McAfee, LLC
    Inventors: Oleg Pogorelik, Ned Smith, Igor Muttik, Alex Nayshtut
  • Patent number: 12047510
    Abstract: Bitcoins and the underlying blockchain technology are one of the main innovations in building decentralized applications. The effects of quantum computing on this technology are analyzed in general. Provided herein are effective solutions to address security vulnerabilities in a blockchain-based system that can be exploited by a quantum attacker.
    Type: Grant
    Filed: June 2, 2023
    Date of Patent: July 23, 2024
    Inventor: Jintai Ding
  • Patent number: 12045797
    Abstract: Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can include any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments for the appliance, and managing access to the appliance accordingly. In some embodiments, the appliance being controlled is a mobile phone that also includes third party operating system software. Various methods for preventing alteration or replacement of the third party operating system are also described.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: July 23, 2024
    Assignee: Payjoy Inc.
    Inventors: Douglas James Ricket, Jaideep Mirchandani
  • Patent number: 12045908
    Abstract: Digital watermarking is adapted for the variable data printing. A reference signal serves as a proxy for optimizing the embedding a watermark in a host image to be printed. Using the reference signal, embedding parameters are generated, which are a function of constraints such as visual quality and robustness of the machine readable data. Adjustments needed to embed a unique payload in each printed piece are generated using the embedding parameters. These adjustments are stored in a manner that enables them to be efficiently obtained and applied within the RIP or press during operation of the press. Various other methods, system configurations and applications are also detailed.
    Type: Grant
    Filed: July 8, 2022
    Date of Patent: July 23, 2024
    Assignee: Digimarc Corporation
    Inventors: Tomas Filler, Matthew M. Weaver, Tony F. Rodriguez, Donald Haaga
  • Patent number: 12038952
    Abstract: A system and method for creating avionic databases is disclosed. The system may receive an avionic database of an area, surveyed coordinate points of the area, and new satellite imagery of the area. The system may georeference the new satellite imagery using the surveyed coordinate points as ground control points, generating georeferenced coordinate points of the new satellite imagery in different locations of the area. The system may create a second avionic database based on the georeferenced coordinate points.
    Type: Grant
    Filed: December 19, 2022
    Date of Patent: July 16, 2024
    Assignee: Rockwell Collins, Inc.
    Inventors: Daniel Y. Chiew, Christopher A. Scherer, Ryan L. Niehaus, Roger L. Yum
  • Patent number: 12039072
    Abstract: Data protection techniques are provided that use encryption and inserted execution code. One method comprises obtaining, by a user device, a request from a user to access data, wherein the requested data comprises (i) an environment-based signature indicating an environment where the data can be accessed and (ii) execution code that interacts with a data protection agent; in response to the request to access the data: determining whether the user device comprises a data protection agent; and providing, via the data protection agent, the requested data based on an evaluation of an environment-based signature generated by the data protection agent relative to the environment-based signature included in the requested data. The requested data may be created by a given data protection agent that generates the environment-based signature using identifiers of hardware elements, software elements and/or network elements associated with a device that executes the given data protection agent.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: July 16, 2024
    Assignee: EMC IP Holding Company
    Inventors: Yevgeni Gehtman, Tomer Shachar, Maxim Balin
  • Patent number: 12041318
    Abstract: A method, apparatus, article of manufacture, and a memory structure for managing media content having group watermarking data is disclosed. The method comprises transmitting a request to receive the media content from a content playback device, receiving a response to the transmitted request, fetching, by the content playback device according to the response, the requested media content and a watermark schema, the watermark schema fetched from cloud-based storage, identifying, by the content playback device, the group watermarking data in the media content according to the fetched watermarking schema, determining, by the content playback device if the media content is authorized for provision according to the group watermarking data and the fetched watermarking schema, and providing the media content for playback according to the determined authorization.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: July 16, 2024
    Assignee: ARRIS Enterprises LLC
    Inventors: Virendra Singh, Vinod Jatti
  • Patent number: 12032684
    Abstract: A method for detecting a fault injection is described. The method includes providing a secondary code, the secondary code including a predetermined function with a known expected result when the secondary code is executed with a known tested input. A primary code is executed in the data processing system. The primary code may be a portion of code that requires protection from a fault injection attack, such as for example, security sensitive code. The secondary code is executed in parallel with the primary code execution in the data processing system to produce an output. The output is compared with the known expected result to detect the fault injection attack of the data processing system. In one embodiment, the secondary code is not related to the primary code.
    Type: Grant
    Filed: January 14, 2022
    Date of Patent: July 9, 2024
    Assignee: NXP B.V.
    Inventors: Lars Kaufmann, Nikita Veshchikov
  • Patent number: 12028325
    Abstract: Methods, systems, and apparatuses are described herein for improving computer authentication processes through the exclusion of certain merchants that may cause confusion. Indications of a plurality of different merchants, including merchant logos may be received. The indications may be processed to identify at least one similarity between a first merchant and a second merchant. A request for access to an account associated with a user and transaction data corresponding to the account may be received. Based on the similarity between the first merchant and the second merchant, at least one transaction corresponding to the first merchant may be removed to generate processed transaction record. An authentication question may be generated and a candidate response to the authentication question may be received. Based on the candidate response, access to the account may be provided.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: July 2, 2024
    Assignee: Capital One Services, LLC
    Inventors: Tyler Maiman, Viraj Chaudhary, Joshua Edwards, Jenny Melendez, Samuel Rapowitz, Daniel E. Miller, David Septimus
  • Patent number: 12022003
    Abstract: One example method includes sending, by a sender, a commitment message, wherein the commitment message is digitally signed by the sender but is not verifiable by a recipient until a public key is revealed by the sender, transmitting, by the sender, the commitment message to the recipient, confirming, by the sender, that the commitment message has been received by the recipient, and only after receipt of the commitment message has been confirmed by the recipient, revealing in a second message, by the sender, the public key, wherein the public key is usable by the recipient to verify that the commitment message was validly signed by the sender.
    Type: Grant
    Filed: December 23, 2021
    Date of Patent: June 25, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Radia J. Perlman, Charles W. Kaufman
  • Patent number: 12020519
    Abstract: Systems and methods for determining the authenticity of vehicle operational data provided by telematics or other devices are provided. Vehicle performance and/or operational data may be collected and the authenticity of the data stream may be determined based on the whether the data stream includes a watermark in a predetermined location of the data stream or whether the data stream includes a data key comprising a predetermined false vehicle performance data reading. A second data recording device may also record vehicle performance and/or operational data. Both the first and second data recording devices may provide the respective vehicle performance data to a computing device. The computing device may compare the vehicle performance data from the first and second data recording devices to determine authenticity of the vehicle measurement data.
    Type: Grant
    Filed: May 20, 2022
    Date of Patent: June 25, 2024
    Assignee: Allstate Insurance Company
    Inventor: Mark V. Slusar
  • Patent number: 12019788
    Abstract: Method for registering and updating an electronically stored and versioned alpha digital document (A) in a digital document register by storing, for each version, not the document but a public ownership key; a digital document hash value; and a digital document signature. The invention is characterised by the steps a) providing a first document version, defined in a document description language to have a defined rendered graphic representation; b) registering said first version; c) providing a second document version by adding a reversibly added part to said first document version, said second version comprising a second set of metadata; and d) registering said second version, in that said second metadata is embedded in the second version without affecting said graphic representation, in that at least a part of the reversibly added part can be unambiguously generated based on the second metadata, and in that the registering in step d comprises storing a hash of the second metadata.
    Type: Grant
    Filed: February 28, 2022
    Date of Patent: June 25, 2024
    Assignee: ENIGIO AB
    Inventors: Hans Almgren, Lars Hansén, Krisztian Mangold, Mats Stengård
  • Patent number: 12022006
    Abstract: A method for verifying that event can take place before the event is executed is disclosed. A verification system is incorporated into an event processing network, such that the verification system can identify newly proposed events and determine whether they can be completed. The verification system can inform the network about verification results through distributed blockchain records. Other changes in event status can also be communicated through and stored in blockchain records.
    Type: Grant
    Filed: April 21, 2023
    Date of Patent: June 25, 2024
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Sukrit Handa, Suman Mukherjee, Timothy P. Tidwell, Ajith Thekadath
  • Patent number: 12021983
    Abstract: A control plane management node of a multiple node environment includes a storage and a processor. The processor detects a user of the multiple node environment and provides a plurality of key management configurations to the user. The key management configurations include first and second key management configurations. In response to a first key management configuration being selected, the node creates a private key for the user, and stores the private key within a storage of the node. In response to the second key management configuration being selected, the node configures the user node to create the private key, and configures the user node to store the private key within a storage of the user node.
    Type: Grant
    Filed: April 27, 2022
    Date of Patent: June 25, 2024
    Assignee: Dell Products L.P.
    Inventors: Bradley Goodman, Kirk Hutchinson, Anurag Sharma
  • Patent number: 12014253
    Abstract: Systems and methods for constructing sets of synthetic data. A single data record is identified from a first set of data. The first set of data comprises a first plurality of data records, each of the data records including multiple items of data describing an entity. Using pattern recognition, the single data record is processed to identify a group of records from within the first set that have corresponding characteristics equivalent to the single data record. The identified group of records comprises a target set of variables and the group of records from the first set that are not identified comprises a control set of variables. The target set of variables and the control set of variables are processed, using probability estimation and optimization constraints, to determine a score for each of the records in the first set. The score describes how similar each of the records in the first set is to the single data record. The records associated with a percentage of the highest scores are identified.
    Type: Grant
    Filed: October 17, 2022
    Date of Patent: June 18, 2024
    Assignee: Cigna Intellectual Property, Inc.
    Inventors: David J. Fogarty, Jing Lin
  • Patent number: 12015725
    Abstract: Systems, methods, and computer program products are disclosed in regard to cryptographic containers or other on-chain modules. Some variants concern responding to on-chain metadata linkage disruption. Some concern confirming speculative on-chain module linkages. Some concern autonomy enhancement based on user-activity-related attributes. Some concern zero-knowledge proofs based on speculative on-chain module linkages. Some concern user-configurable privacy management or various considerations of efficiency or security.
    Type: Grant
    Filed: September 7, 2023
    Date of Patent: June 18, 2024
    Assignee: Yuga Labs, Inc.
    Inventors: Spencer Kimball Tucker, Christopher Renshaw Fortier
  • Patent number: 12013860
    Abstract: This disclosure provides various techniques that may allow for accessing values stored in a data structure that stores multiple values corresponding to database transactions using a skip list. A key may be used to traverse the skip list to access data associated with the key. The skip list maintains on ordering of multiple keys, each associated with a particular record in the data structure, using indirect links between data records in the data structure that reference buckets included in hash table. Each bucket includes pointers to one or more records in the skip list.
    Type: Grant
    Filed: January 3, 2023
    Date of Patent: June 18, 2024
    Assignee: Salesforce, Inc.
    Inventors: Patrick James Helland, James E. Mace, Thomas Fanghaenel
  • Patent number: 12013927
    Abstract: Various systems, methods, and computer program products are provided for generating and monitoring dynamic identifiers for data processing security. The method includes generating a dynamic identifier for a user request. The dynamic identifier changes based on a receiving node of the dynamic identifier. The method also includes updating the dynamic identifier in an instance in which the user request is transmitted from a first node to a second node. The method further includes generating a dynamic identifier change log. The dynamic identifier change log includes at least one historical dynamic identifier from a previous receiving node. The method still further includes determining whether the dynamic identifier change log matches an expected dynamic identifier change log. The method also includes causing a transmission of a dynamic identifier verification upon determining that the dynamic identifier change log matches the expected dynamic identifier change log.
    Type: Grant
    Filed: March 23, 2022
    Date of Patent: June 18, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Govinda Rajulu Nelluri, Srinivasa Rao Dakshinyam, Meenakshi MeenakshiSundaram, Nithya C
  • Patent number: 12013936
    Abstract: A threat response platform to act as a bridge between non-inline security programs and inline security programs. The threat response platform receives event reports, relating to client devices, from the non-inline security programs and creates incident reports for a user. The incident reports describe the event report and also additional data gathered by an active correlation system of the threat response platform. The active correlation system automatically gathers various types of data that are potentially useful to a user in determining whether the reported event is an incidence of malware operating on the client device or a false positive. The active correlation system places a temporary agent on the client device to identify indications of compromise.
    Type: Grant
    Filed: September 7, 2022
    Date of Patent: June 18, 2024
    Assignee: PROOFPOINT, INC.
    Inventors: Theron D. Tock, Michael P. Horn
  • Patent number: 12014576
    Abstract: Methods and systems for generating electronic signatures are disclosed. In some embodiments, the method includes: storing pixel features of a signing device; capturing, via an imaging device, a plurality of image frames including the pixel features of the signing device; identifying in the plurality of image frames, by a processor, first pixels matching the stored pixel features of the signing device; generating, by the processor, a first image including the identified pixels; and connecting, by the processor, the identified pixels to form at least one line drawing representing a signature.
    Type: Grant
    Filed: June 23, 2022
    Date of Patent: June 18, 2024
    Assignee: Capital One Services, LLC
    Inventors: Joshua Edwards, Michael Mossoba
  • Patent number: 12010215
    Abstract: Determining hash values based on at least two types of hash functions, utilizing a memory that is arranged to store at least one state to be used to determine hash values pursuant to a SHA-3 function, wherein hash values pursuant to any of a SHA-2 function or a SHA-1 function are determined based on the state.
    Type: Grant
    Filed: February 17, 2022
    Date of Patent: June 11, 2024
    Assignee: Infineon Technologies AG
    Inventor: Martin Schlaeffer
  • Patent number: 12008111
    Abstract: Methods and systems for managing the operation of data processing systems are disclosed. A data processing system may include a computing device that may enter various operating states by performing various types of startups. The startups may include use of code bases for which the computing device may not inherently be able to validate. To reduce risk of using the code bases, the computing device may perform processes to validate the code bases prior to using the code bases. The processes may include obtaining security information for a portion of the code base from a trusted source, and using the security information to validate portions of the code base ahead of use of the portions to complete startups.
    Type: Grant
    Filed: July 26, 2022
    Date of Patent: June 11, 2024
    Assignee: Dell Products L.P.
    Inventors: Wei G. Liu, Sanjeev Singh, Paul W. Vancil
  • Patent number: 12008146
    Abstract: A computer-implemented method receives at least two unique versions of program code of a program, generates a code-based key for each unique version of the program code, generates a code-based signature for each unique version of the program using a bi-homomorphic pseudorandom function selected from a family of bi-homomorphic pseudorandom functions. Each code-based signature is generated by the selected bi-homomorphic pseudorandom function based on the corresponding code-based key. Each generated code-based signature for each unique version of the program code is incorporated into the program code of the corresponding unique version of the program.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: June 11, 2024
    Assignee: SEAGATE TECHNOLOGY LLC
    Inventor: Vipin Singh Sehrawat
  • Patent number: 12008144
    Abstract: Provided is a method and a system for the tamper-proof storage of information about object-related measures which are contained as transactions in transaction blocks that are interlinked in a transaction block chain of the object to which the measures relate, the transaction block chain being stored in an object data memory allocated to the object.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: June 11, 2024
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventor: Rainer Falk
  • Patent number: 12008108
    Abstract: This application provides an extended authentication method and apparatus for a generic bootstrapping architecture and a storage medium. A first network element obtains a bootstrapping transaction identifier (B-TID) and a key lifetime; and the first network element sends the B-TID and the key lifetime to the terminal, so that the terminal performs extensible authentication protocol (EAP)-based generic bootstrapping architecture (GBA) authentication and key agreement (AKA) authentication with the first network element based on the B-TID and the key lifetime.
    Type: Grant
    Filed: February 8, 2021
    Date of Patent: June 11, 2024
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Bo Zhang, Philip Ginzboorg, Valtteri Niemi, Pekka Laitinen
  • Patent number: 12003617
    Abstract: A system for ensuring privacy of transactions is provided. The system may be performed by a computing system during execution of trusted code within a secure enclave of the computing system. The system receives an indication of a transaction. The system validates the transaction. The system encrypts the validated transaction using an encryption key of the trusted code. The system requests untrusted code of the computing system to store the encrypted validated transaction in a portion of a data store. The untrusted code cannot decrypt the encrypted validated transaction that is stored in the data store. Rather, only the trusted code can decrypt the encrypted validated transaction.
    Type: Grant
    Filed: August 20, 2021
    Date of Patent: June 4, 2024
    Assignee: R3 LTD.
    Inventor: Michael Christopher Hearn
  • Patent number: 12001544
    Abstract: Systems and methods for attacks, countermeasures, archiving, data leak prevention, and other novel services relating to active messages are disclosed. Among other things, a system can replace active content with static content in a message, can replace static content with active content in a message, and can use active messaging to provide enhanced on-hold message functions.
    Type: Grant
    Filed: December 17, 2021
    Date of Patent: June 4, 2024
    Assignee: Mimecast Services Ltd.
    Inventors: Simon Paul Tyler, Nathaniel S. Borenstein, Jackie Anne Maylor, Carlos da Silva, Kevin Slote, Herbert L. Roitblat, Florian P. Buetow, Chris Bamford