Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
  • Patent number: 10291591
    Abstract: An anti-eavesdropping system for mobile phone communication is disclosed, wherein a mobile phone is paired with a Bluetooth headset for voice data encryption and decryption, the Bluetooth headset having a microprocessor unit to perform encryption and decryption of voice data, wherein the Bluetooth headset transmits the encrypted voice data to the mobile phone, and decrypts the voice data from the mobile phone and outputs the decrypted voice data to a speaker.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: May 14, 2019
    Assignee: Felicity Taiwan Corporation
    Inventors: Chun Te Yu, Chia-Chian Yu, Cheng-Hsien Yu
  • Patent number: 10282602
    Abstract: Methods and systems for generating electronic signatures are disclosed. In some embodiments, the method includes: storing pixel features of a signing device; capturing, via an imaging device, a plurality of image frames including the pixel features of the signing device; identifying in the plurality of image frames, by a processor, first pixels matching the stored pixel features of the signing device; generating, by the processor, a first image including the identified pixels; and connecting, by the processor, the identified pixels to form at least one line drawing representing a signature.
    Type: Grant
    Filed: September 13, 2018
    Date of Patent: May 7, 2019
    Inventors: Joshua Edwards, Michael Mossoba
  • Patent number: 10284568
    Abstract: Data acquired, for example by a mobile platform, such as a sequence of images observed by a mobile platform, is grouped. A signature is computed for each group and is transmitted along with frame data to a reception system, which verifies correct transmission based on the group signature. The signature may be a root value of a hash tree that has at least selected ones of each group as inputs. Transmission events may also be separately signed as a whole using an event validation system. Although the signature maybe computed for all frames in a group, it may also be computed based on only a subset, selected pseudo-randomly.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: May 7, 2019
    Assignee: Guardtime IP Holdings Limited
    Inventors: Garrett Day, Hema Krishnamurthy
  • Patent number: 10284740
    Abstract: An original has a first pattern on and a second pattern, and the first pattern and the second pattern include relatively lighter markings within a relatively darker background. The relatively lighter markings appear at a first spacing interval in the first pattern, and at a larger second spacing interval in the second pattern. The first pattern and the second pattern cover and equally block a region of the original from reflecting ultraviolet light. A scanner is only capable of detecting patterns of markings having a spacing interval larger than the first spacing interval, which causes a copy of the original to not include the relatively lighter markings appearing at the first spacing interval. Thus, the copy lacks markings at locations corresponding to where the relatively lighter markings appear at the first spacing interval in the original. The copy reflects the ultraviolet light more where the copy lacks markings.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: May 7, 2019
    Assignee: Xerox Corporation
    Inventors: Edward N. Chapman, Paul R. Conlon, Lee C. Moore
  • Patent number: 10275591
    Abstract: In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that includes a whitelist of permitted processes on the controller, the whitelist including (i) signatures for processes that are authorized to be executed and (ii) context information identifying permitted controller contexts within which the processes are authorized to be executed; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the determined signature with a verified signature for the particular process from the whitelist; identifying, by the security layer, a current context for the controller; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the current context with one or more permitted controller contexts for the particular process from the whitelist.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: April 30, 2019
    Inventors: Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai
  • Patent number: 10277332
    Abstract: A telecommunications device includes an electronic memory to store at least a network address and a random number code, and a sound unit to transmit the network address and the random number code via ultrasonic sound waves. The telecommunications device also includes a network interface to communicate via a data network using the network address and a processor to establish a communication session with another device over the data network based upon receipt of a response from the other device via the data network, the response including at least the random number code. The telecommunications device does not establish the communication session with the other device if the random number code is missing from the response or if the random number code in the response does not match the random number code transmitted in the ultrasonic sound waves.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: April 30, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Ragnvald Barth, Sverre Huseby, Dan Peder Eriksen, Bjornar Snoksrud
  • Patent number: 10270742
    Abstract: A method is provided for redirecting signed code images. The method includes the steps of receiving a code image from an origin device at a proxy machine, invoking a code signing client at the proxy machine, receiving signing request information indicating a requested cryptographic operation, sending a code signing request to a code signing server, receiving a signed code image at the code signing client from the code signing server, storing the signed code image in a restricted memory, invoking a software repository client at the proxy machine, and sending the signed code image from the restricted memory location to a software repository.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: April 23, 2019
    Assignee: ARRIS Enterprises LLC
    Inventors: Tat Keung Chan, Alexander Medvinsky, Ali Negahdar
  • Patent number: 10270597
    Abstract: Some embodiments provide a method for a first device to join a group of related devices. The method receives input of a password for an account with a centralized entity and a code generated by a second device in the group. When the second device determines that the code input on the first device matches the generated code, the method receives an authentication code from the second device for authorizing the first device with the entity as a valid device for the account. The method uses the password and information regarding the first device to generate an application to the group. After sending the application to the second device, the method receives information from the second device that enables the first device to add itself to the group. The second device verifies the generated application, and the method uses the information received from the second device to join the group.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: April 23, 2019
    Assignee: APPLE INC.
    Inventors: Yannick L. Sierra, Mitchell D. Adler
  • Patent number: 10271202
    Abstract: A document signing platform implemented on one or more computers implements a process for capturing data evidencing valid execution of a document. The process comprises: receiving, from an originator computing device, a submission comprising a document to be signed by a signatory; providing the signatory electronic access to the document and to an indication of a set of one or more substantiation actions to be performed; and receiving and recording event data from a signatory device associated with the signatory. The event data includes data associated with affixation of an electronic signature to the document, and additionally includes substantiation event data representing performance of the set of one or more substantiation actions on the signatory device. The process further comprises validating completion of the set of substantiation actions based on the received event data; and generating a certificate of evidence that comprises at least some of the event data.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: April 23, 2019
    Assignee: Zava Global Partners LLC
    Inventors: Faizaan Sharif, Zachary L. Lovelady
  • Patent number: 10263783
    Abstract: A method for authenticating a data stream includes selecting a number of data fragments of the data stream, defining at least two granularity levels for the selected data fragments, dividing each of the selected data fragments according to the granularity levels, generating a hierarchical authentication structure including elements representing hash values of the divided selected data fragments on the different granularity levels, selecting at least a portion of the hash values of the hierarchical authentication structure for transmission to a receiver, reconstructing the granularity value on the top level of the hierarchical authentication structure based on the transmitted hash values, and performing authentication of the data fragments of the data stream based on comparing the reconstructed value on the top granularity level of the hierarchical authentication structure with the signed value on the top granularity level of the generated hierarchical authentication structure.
    Type: Grant
    Filed: August 23, 2013
    Date of Patent: April 16, 2019
    Assignee: NEC Corporation
    Inventors: Jens-Matthias Bohli, Wenting Li
  • Patent number: 10262118
    Abstract: A digital marking module in a first computer memory receives a data file including original media content. The digital marking module accesses, from a second computer memory, identifying information corresponding to a recipient of the data file. The digital marking module generates altered media content to include the identifying information and substantially include the original media content. The data file with the altered media content is transmitted to a recipient device. The altered media content is received by a digital mark reader. The identifying information corresponding to the recipient of the data file is read from the altered media content.
    Type: Grant
    Filed: January 6, 2016
    Date of Patent: April 16, 2019
    Inventor: Robert Antonius Adrianus Van Overbruggen
  • Patent number: 10250393
    Abstract: Techniques allow for automatic signing of a digital document in response to some event and/or when the document satisfies some predefined condition. The document may be, for example, an agreement, a technical paper for publication, a press release or marketing materials, or any other digital document that might need to be assented to, approved by, and/or attributed to one or more persons or representatives. The techniques may further provide support for automatic signature tracking and notification in order to assist with auditability. In one example embodiment, the techniques are implemented in the context of an e-signature application or service, which may be installed locally on the user's computer or provided to the user via a network from a server. In one example embodiment, the e-signature service is configured to automatically impress a signer's signature into a given document, if the signer's pre-established auto-sign criteria is met.
    Type: Grant
    Filed: November 29, 2016
    Date of Patent: April 2, 2019
    Assignee: Adobe Inc.
    Inventor: Benjamin D. Follis
  • Patent number: 10251054
    Abstract: Systems and methods for validating and applying modifications to a policy control function (PCF) of a station. The methods include generating a PCF package including a modification to a PCF, and determining whether the PCF package is to be transmitted to the station by a first or second entity. The methods further include when the PCF package is to be transmitted by the first entity, including a first signature of the first entity in a deliverer field of the PCF package, and when the PCF package is to be transmitted by the second entity, including the first signature in an owner field and a second signature of the second entity in the deliverer field. The methods further include receiving the PCF package from the first or second entity, determining whether the PCF package is valid, and applying the modification to the PCF when it is determined the PCF package is valid.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: April 2, 2019
    Assignee: APPLE INC.
    Inventors: Mehdi Ziat, Christopher Sharp, Kevin P. McLaughlin, Li Li, Jerrold V. Hauck, Yousuf H. Vaid
  • Patent number: 10248442
    Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Virtual machines may be automatically provisioned with configuration information, such as the encryption keys, when the virtual machine is started. The provisioning information may be created based on a template stored on a configuration server.
    Type: Grant
    Filed: July 12, 2012
    Date of Patent: April 2, 2019
    Assignee: Unisys Corporation
    Inventors: David S Dodgson, Ralph Farina, James A Fontana, Robert A Johnson, David Maw, Anthony Narisi
  • Patent number: 10248958
    Abstract: Techniques for integrating advertising content into client applications are presented. Events occurring within client applications are monitored and when a predefined event is encountered and external advertising service is consulted for acquiring external content. The external content is then integrated into one or more portions of presentations associated with the client applications.
    Type: Grant
    Filed: October 15, 2010
    Date of Patent: April 2, 2019
    Assignee: Iconix, Inc.
    Inventors: Eric Robert Lindblom, Scott A. Sachtjen
  • Patent number: 10243951
    Abstract: A system for information confirmation using a cloud computing platform to provide a service by which an individual's video recorded and fingerprint authenticated sworn affidavit or statement called a “Confirmation” can be given upon request of another individual and stored in a third party service provider's cloud based vault for future retrieval in the case of any legal or other forms of action that may need to be taken in the future.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: March 26, 2019
    Inventor: Thomas Szoke
  • Patent number: 10235619
    Abstract: A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: March 19, 2019
    Assignee: Capital One Services, LLC
    Inventors: Joshua Edwards, Jiawei Zhao
  • Patent number: 10237441
    Abstract: A system and method for automated MFP notarization includes a display and a user input for receiving a notary request for document notarization. A device controller with processor and associated memory commences electronic notarization upon receipt of a notary request. A tangible document is scanned into electronic form under direction of the controller. The processor confirms acceptability of the electronic document relative to preset acceptance criteria and commences document verification when acceptability is confirmed. The user is prompted for execution of a verified document. User input corresponding to execution of the verified document is obtained and an electronic notarization is executed. A notarized electronic document comprised of the executed, electronic document inclusive of indicia corresponding to applied electronic notarization.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: March 19, 2019
    Assignees: Kabushiki Kaisha Toshiba, Toshiba TEC Kabushiki Kaisha
    Inventors: Christopher Nguyen, Louis Ormond
  • Patent number: 10230527
    Abstract: The authenticity of a program executed by a processor is determined by a security element that computes a hash code over re-ordered segments of a known-to-be-authentic copy of a program executed by the processor. The authenticity of the same segments are re-ordered by and provided by the processor to the security element, which computes a second hash code for the re-ordered segments received from the processor. If the hash values for the segments are identical, the program segments are identical. If the hash values for any segment are different, the two programs are different. When a processor's program is determined to be different from a known good copy, the processor can be stopped or an alarm signal generated.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: March 12, 2019
    Assignee: Continental Automotive Systems, Inc.
    Inventors: Brian J. Farrell, Jason Schwegler, Sanjaya K. Dash
  • Patent number: 10225323
    Abstract: A system and method for providing Java cloud services for use with a cloud computing environment. In accordance with an embodiment, a cloud environment, such as Oracle Public Cloud (OPC), can include a Java cloud services (JCS) infrastructure, which allows a suite of software applications, middleware, and database offerings to be delivered to customers in a self-service, elastically scalable manner. In accordance with an embodiment, the JCS infrastructure can orchestrate, in combination with other cloud environment components, the creating and/or updating of a platform instance of a Java cloud service, including provisioning and deployment of the platform instance and/or deployment of software applications, and one or more personality injection or application deployment processing. Additional resources and/or services, such as a database service, can be wired to or otherwise associated with the Java cloud service, for use by customer applications that are deployed to the cloud.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: March 5, 2019
    Inventors: Naresh Revanuru, William Arthur Jackson, III, Nilesh P. Junnarkar
  • Patent number: 10223048
    Abstract: An image forming apparatus which eliminates a need for a user to operate a mobile terminal each time he or she sends an image file from the image forming apparatus using a cloud service and therefore enhances ease of operation. First user authentication of the user is performed for the image forming apparatus. Image data read from a scanner is converted to an image file, which in turn is sent to a destination set on a transmission destination setting screen. Based on the authenticated user, an access token to be used is selected from at least one access token managed in a hard disk of the image forming apparatus so as to use a function of an external server. Second user authentication for the external server is performed using the selected access token. After that, the image file is sent using the function of the external server.
    Type: Grant
    Filed: September 22, 2017
    Date of Patent: March 5, 2019
    Inventor: Nobuyuki Tonegawa
  • Patent number: 10223240
    Abstract: In one embodiment, a method for automating regression testing of a software application is disclosed. The method includes receiving, by a test automation system, input data associated with the regression testing of the software application and predicting, by the test automation system, a test automation framework for execution of a regression test suite by analyzing the input data. Further, the method includes obtaining, by the test automation system, test scenarios from execution of historical regression test suites upon predicting the test automation framework and identifying, by the test automation system, availability of devices for executing each test scenario based on one or more device parameters. Further, the method includes transmitting, by the test automation system, information corresponding to the test scenarios to the identified devices based on the availability to automate the regression testing of the software application.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: March 5, 2019
    Assignee: Wipro Limited
    Inventor: Rajkumar Joghee Bhojan
  • Patent number: 10223156
    Abstract: In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: March 5, 2019
    Assignee: Apple Inc.
    Inventors: David Michael Chan, John Iarocci, Gaurav Kapoor, Kit-man Wan, Phillip Stanley-Marbell, Jonathan J. Andrews, Matthew E. Shepherd, Amit K. Vyas, Anand Ramadurai, Lee Russell, Brittany D. Hughes, David B. Myszewski, Andrew M. Matuschak, Joshua V. Graessley, Marc Krochmal, Daniel Vinegrad, Stephen C. Peters
  • Patent number: 10212567
    Abstract: A method of utilizing an audio signal to transmit data for conducting electronic transactions includes in a user device, converting user identification data into a first audio signal and transmitting the first audio signal to a base device; in the base device, converting the first audio signal into the user identification data; in the base device, transmitting the user identification data and transaction content to a server device; and in the server device, obtaining authorization of a validation entity by utilizing the user identification data and the transaction content, for obtaining a transaction number and transmitting the transaction number to the base device.
    Type: Grant
    Filed: October 30, 2012
    Date of Patent: February 19, 2019
    Assignee: Eason Tech. Co., Ltd.
    Inventors: Fu-Yu Huang, Min-Chun Lin, Feng-Hui Kuan
  • Patent number: 10210334
    Abstract: In accordance with embodiments of the present disclosure, an article of manufacture may include a non-transitory computer readable medium and computer-executable instructions carried on the computer readable medium, the instructions readable by a processor, the instructions, when read and executed, for causing the processor to receive software code for an executable file, receive a configuration file, output an executable file based on the software code and the configuration file, the executable file comprising one or more integrity windows of code embedded within the software code and not affecting operation of software code within the executable file, and output a map file setting forth metadata regarding the integrity windows.
    Type: Grant
    Filed: October 4, 2016
    Date of Patent: February 19, 2019
    Assignee: Dell Products L.P.
    Inventors: Ricardo L. Martinez, Balasingh P. Samuel, Garrett B. Oncale
  • Patent number: 10212597
    Abstract: In order for effectively ensuring security for direct communication in ProSe, a ProSe Function acquires from a 3rd party root keys for each of UEs to derive a pair of session keys for securely conducting direct communication with different UEs, and distributes the acquired root keys to each of the UEs. Each of the UEs derives the session keys by using one of the distributed root keys. Moreover, a plurality of UEs, which form a communication system, and are allowed to conduct direct communication with each other when the UEs are in proximity to each other, share public keys of the UEs therebetween through a node which supports the direct communication upon successfully registering the UEs with the node. Each of the UEs verifies at least a request for the direct communication by using one of the public keys.
    Type: Grant
    Filed: August 27, 2014
    Date of Patent: February 19, 2019
    Inventors: Xiaowei Zhang, Anand Raghawa Prasad
  • Patent number: 10212140
    Abstract: According to an example embodiment of the present invention there is provided an apparatus comprising a receiver configured to receive a pair of cryptographic keys comprising a public key and a secret key, the public key being cryptographically signed, a memory configured to store the secret key, and a transmitter configured to send the cryptographically signed public key to a correspondent node and participate in establishment of a cryptographic network protocol session based at least in part on the pair of cryptographic keys.
    Type: Grant
    Filed: February 18, 2014
    Date of Patent: February 19, 2019
    Assignee: Nokia Technologies Oy
    Inventor: Kim Blomqvist
  • Patent number: 10211976
    Abstract: Systems and methods for hash authenticated data are described. In one embodiment, the storage device includes a storage drive and/or a controller. In some embodiments, the controller is configured to identify data to be authenticated, compute a first hash of the data using a hash function, detect a trigger event associated with the storage drive, and authenticate, after the trigger event, the data based at least in part on the first hash of the data.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: February 19, 2019
    Inventors: Robert W. Moss, Stacey Secatch, Dana L. Simonson, Kristofer C. Conklin
  • Patent number: 10210715
    Abstract: A number of mechanisms can reduce transaction costs and increase the economic viability of a number of products. A combination instant lottery ticket and debit card makes it possible to issue prepaid debit cards having a relatively low monetary value. A combination on-line ticket or receipt and debit card can automate the prize paying process, simplifying the retailer's responsibilities while reducing the potential for fraud. Various cash flow and authentication techniques, such as age and location verification, nano payment methods and spam filters based on these mechanisms are also described. Instant lottery tickets, and in particular, losing tickets, can be provided with a small residual value by placing account information on the ticket. In another version, a lottery ticket can be combined with a payment card that operates as a closed payment system whereby the payment card can only be used with a specified vendor.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: February 19, 2019
    Assignee: LRB Patents LLC
    Inventors: Kenneth E. Irwin, Jr., Paul Mather Lindsay
  • Patent number: 10204148
    Abstract: A method for sharing data between blockchains in a multi-chain network comprising accessing a first block on a first blockchain of a multi-chain network, generating a cryptographic hash from the first block, defining a first anchor hash, recording the first anchor hash to a second block on a second blockchain of a multi-chain network, receiving a plurality of account addresses associated with the first and second blockchains and an account state for each account associated with the plurality of account addresses, a plurality of transactions, and a plurality of transaction receipts, generating a world state trie comprising a mapping between the first plurality of account addresses and the account states, a transactions trie comprising the plurality of transactions, and a transaction receipts trie comprising the plurality of transactions receipts, and root hashes thereof, and recording the root hashes to each block of the first and second blockchains.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: February 12, 2019
    Inventors: Vijay K. Madisetti, Arshdeep Bahga
  • Patent number: 10200199
    Abstract: At least one node in a distributed hash tree verification infrastructure is augmented with either a function of a signature of a child computational node, or of a child entity attestation value derived from an HMAC value of the child entity, or both. A data signature, which includes parameters for recomputation of a verifying value, and which is associated with a digital input record, will therefore also include data that identifies at least one child entity in the hash tree path used for its initial registration in the infrastructure.
    Type: Grant
    Filed: December 26, 2017
    Date of Patent: February 5, 2019
    Assignee: Guardtime Holdings Limited
    Inventors: Ahto Truu, Andres Kroonmaa
  • Patent number: 10192084
    Abstract: Objects are identified by authentication tags, each configured with an authentication key that includes a first dataset comprised of a random distribution of three-dimensional elements, and with a second dataset comprised of machine-readable data elements. The authentication keys are readable by image capture and/or RFID reading devices, at least one of which is authorized to read at least one of the keys under predetermined conditions. An object is deemed genuine when the device reading a key has been authorized, and when the reading is performed when the conditions have been met.
    Type: Grant
    Filed: January 24, 2018
    Date of Patent: January 29, 2019
    Assignee: Zortag, Inc.
    Inventors: Satya Prakash Sharma, Joseph Marino, Charles Gary Furedy
  • Patent number: 10193886
    Abstract: Conventional wireless interface (WiFi) controllers cannot resolve authentication for trusted client devices without calculation from a host processor. Leaving the host processor on or awaking it from a sleep state each time a non-authenticated trusted client device attempts to connect wastes power. A hostless authenticated wake service allows a host controller to enter a sleep state while the WiFi controller responds to multicast domain name service-service discovery (mDNS-SD) queries from trusted client devices. Once a client device is authenticated, the WiFi controller may respond to a trusted client request to awake the host processor for further command processing and service provision. Not only does this approach reduce power consumption by allowing the host processor to remain in the sleep state, it allows trusted client devices to discover its presence while ensuring security.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: January 29, 2019
    Assignee: GOPRO, INC.
    Inventors: Joseph Anthony Enke, David Boone, Jeffrey S. Youel, Bich Nguyen, Mark Petersen, Kevin Fry
  • Patent number: 10181953
    Abstract: Electronically signed data is persistently stored in data storage. After the passage of time, the data may be accessed and presented to a trusted entity for verification of the data. The trusted entity may have access to secret information used to sign the data. The trusted entity may use the secret information to verify an electronic signature of the data. One or more actions may be taken based at least in part on a response provided by the verification system.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: January 15, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Benjamin Elias Seidenberg, Gregory Branchek Roth, Benjamin Tillman Farley
  • Patent number: 10176545
    Abstract: The present disclosures relates generally to digital watermarking and data hiding.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: January 8, 2019
    Assignee: Digimarc Corporation
    Inventors: Alastair M. Reed, Ravi K. Sharma
  • Patent number: 10171461
    Abstract: A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives instructions from a first user identifying transfer data and a recipient identifier, creates a key, encodes the transfer data using the key, and communicates the key and the recipient identifier to a server. The server creates a secure package identifier and communicates such to the sender client. The recipient client receives and identifies the secure package identifier and the encoded transfer data, receives from a second user a user identifier, and communicates the user identifier and the secure package identifier to the server. The server communicates the key to the recipient client only if the secure package identifier received from the recipient client matches the secure package identifier created by the server and if the user identifier matches the recipient identifier.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: January 1, 2019
    Assignee: Ceelox Patents, LLC
    Inventor: Erix Pizano
  • Patent number: 10169209
    Abstract: Methods and systems for creating containers by composition are disclosed. For example, a container image includes multiple layers, including first and second layers, which an image engine determines are read only or unmodified by adding any other layers. Each layer is in either a broken or unbroken state. Layers remain unbroken if an associated identifying signature and contents of layer remain unmodified by any other layer. The layers adhere to a policy requiring each compliant layer to be read only and/or not to modify any other layer when added to container image. The policy requires compliant layers to only modify their own contents when updated and to remain unbroken. The first and second layers are compliant when a third layer replaces the first layer. The layers remain compliant after replacement.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: January 1, 2019
    Assignee: Red Hat, Inc.
    Inventors: Daniel McPherson, Stephen Tweedie, Benjamin Parees
  • Patent number: 10171478
    Abstract: This relates to a vehicle and, more particularly to, a vehicle configured to perform a secure firmware update. Some examples of the disclosure include receiving a firmware update package including updated firmware for one or more electronic control units (ECUs) of a vehicle. According to the disclosure, the firmware update package can be transmitted to and stored on an untrusted ECU and distributed to one or more target ECUs in a secure firmware update process monitored by a secure ECU.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: January 1, 2019
    Assignee: FARADAY & FUTURE INC.
    Inventors: Phillip McCauley, Jana Mahen Fernando, Nathan Coerper
  • Patent number: 10169564
    Abstract: Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: January 1, 2019
    Inventors: Peter Daniel Birk, Cesar Eduardo Gonzalez Borjon, Nader M. Nassar
  • Patent number: 10164777
    Abstract: A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license contains a group of data elements, such as name, driver's license number) is created. These identifiers may be stored along with documentation (e.g., label) of the associated data elements in a manifest file. Alternatively, the identifiers may be stored in a file outside of the manifest file. In this manner, by utilizing a data element identifier which corresponds to a random number, security of privacy information is improved as one would only be able to obtain such sensitive information by obtaining such an identifier. Furthermore, the user only needs to send the requested data elements, as opposed to all the data elements of the group of data elements, to the challenger. In this manner, the user is preserving the security of other privacy information.
    Type: Grant
    Filed: June 20, 2018
    Date of Patent: December 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: William F. Abt, Jr., Daniel A. Gisolfi, Richard Redpath
  • Patent number: 10158491
    Abstract: A Qualified Electronic Signature (QES) system configured to exchange data with first processing means of the requester configured to allow a requester to generate requests requesting a qualified electronic signature through said system to a recipient. The system comprises second processing means of the recipient configured to allow the recipient of the request to sign with his qualified electronic signature.
    Type: Grant
    Filed: April 8, 2013
    Date of Patent: December 18, 2018
    Inventor: Antonio Salvatore Piero Vittorio Bonsignore
  • Patent number: 10157386
    Abstract: In order to verify the authenticity of a product associated with a host device, the product contains, in segments of a non-volatile memory, several different functions stored in ciphered fashion. The host device sends a control signal for selecting and activating one of those ciphered functions. The product then deciphers and executes the function. The result of the function execution is then communicated back to host device when a decision on product authenticity is made.
    Type: Grant
    Filed: February 21, 2018
    Date of Patent: December 18, 2018
    Assignee: STMicroelectronics (Rousset) SAS
    Inventors: Denis Farison, Fabrice Romain, Christophe Laurencin
  • Patent number: 10154461
    Abstract: A personal identification device may conserve power by delegating one or more operations to another device. For example, the one or more operations may be associated with the authentication of the personal identification device. In one example, the personal identification device may determine an amount of power greater than a power threshold will be consumed by the personal identification device to perform the one or more operations. The personal identification device may determine it can communicate with a mobile device that is capable of performing the one or more operations, and may then delegate the one or more operations to the mobile device to conserve power. In one example, the personal identification device may receive the results of the one or more operations from the mobile device, and may provide data associated with the results to a personal identification device detector for authentication of the personal identification device.
    Type: Grant
    Filed: October 18, 2016
    Date of Patent: December 11, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: David Kuochieh Su, Ning Zhang
  • Patent number: 10149153
    Abstract: A wireless communication system comprises two communication units (101, 03) which exchange public key identification data using both Near Field Communication (NFC) and Wi-Fi. Comparators (213) compare the public key identification data received over NFC to that received over Wi-Fi. If they do not match, communication controllers (203, 303) terminate a Wi-Fi communication, and specifically may terminate a secure Wi-Fi communication setup. If the public key identification data match, the communication controllers (203, 303) determine matching session keys and network keys from the public key identification data. The approach utilizes a full two-way device authentication based on two-way NFC communications to provide increased security and robustness to e.g. man-in-the-middle attacks.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: December 4, 2018
    Inventor: Johannes Arnoldus Cornelis Bernsen
  • Patent number: 10142374
    Abstract: Computer-implemented techniques include detecting, using a camera of a computing device having one or more processors, a digital watermark displayed by a display of a computing system. The digital watermark can be a visual indicator that is detectable by the camera of the computing device, and the computing system can further comprise a set of speakers and a set of cameras. The techniques can include determining, by the computing device, a unique identifier for the computing system based on the digital watermark. The techniques can also include automatically coordinating, by the computing device, an audio/video conference session between the computing device and the computing system using the unique identifier.
    Type: Grant
    Filed: July 18, 2016
    Date of Patent: November 27, 2018
    Assignee: Google LLC
    Inventor: Mark Chang
  • Patent number: 10142313
    Abstract: A user authentication system and method uses a contact list that may receive contact list information stored in an electronic device from the electronic device over a network. The system is further configured to store, in a database, and manage first contact list information received from a first electronic device of a user through the reception controller in association with an identifier of the user, compare second contact list information received from the first electronic device or a second electronic device to the first contact list information stored in the database in association with the identifier of the user, in response to a service request from the first electronic device or the second electronic device based on the identifier of the user; and determine whether to authenticate the user in response to the service request from the first electronic device or the second electronic device based on the comparison result.
    Type: Grant
    Filed: July 11, 2016
    Date of Patent: November 27, 2018
    Assignee: Line Corporation
    Inventors: Iryoung Jeong, Ho Sung Kang, Seonggu Huh
  • Patent number: 10135869
    Abstract: An information processing system includes a first information processing apparatus for setting a security policy, and a second information processing apparatus subject to a function restriction according to the security policy set by the first information processing apparatus. The first information processing apparatus includes a generation unit generating forced data based on the security policy to set. The forced data includes a setting value for determining an operation of the second information processing apparatus and control information for controlling prohibition of a change of the setting value in the second information processing apparatus.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: November 20, 2018
    Assignee: Canon Kabushiki Kaisha
    Inventor: Naoki Tsuchitoi
  • Patent number: 10135797
    Abstract: A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.
    Type: Grant
    Filed: August 16, 2017
    Date of Patent: November 20, 2018
    Inventors: Peter R. Dare, John Owlett, Imran F. Tyabji
  • Patent number: 10127005
    Abstract: The mobile cluster-based audio adjusting method and apparatus provides for a highly configurable sound management apparatus and process that combines standard computing devices such as laptops, tablets, and mobile phones to measure various aspects of sound waves across multiple points, allowing a single user to visualize and adjust sound output accordingly.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: November 13, 2018
    Inventor: Levaughn Denton
  • Patent number: 10127376
    Abstract: There is disclosed herein techniques for use in authentication. The techniques comprise providing multiple selectable image portions. The techniques also comprise selecting a first image portion of the multiple selectable image portions. The said selecting of the first image portion comprises performing a first operation to associate a first marking with the first image portion in an identifiable manner. The techniques further comprise generating information for use in authentication based on the first image portion and the first marking associated with the first image portion.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: November 13, 2018
    Assignee: EMC IP Holding Company LLC
    Inventor: Peter A. Robinson