Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
-
Patent number: 10846373Abstract: The present invention provides a method for securing a client's access to a DRM agent's services. The method comprising, by the DRM agent, the steps of: receiving a get-token request, applying a function to generate a decryption request identifier Request ID and a token value Token, returning Request ID and Token to the client, inserting, into a hash table of token values with get-token requests identifiers as keys, a record comprising the token value Token associated to the key Request ID, receiving a decryption request comprising Request ID, a multimedia content encrypted chunk and a digest of the encrypted chunk, retrieve Token from hash table based on Request ID, processing digest using a public key and Token, checking match between the processed digest and the at least part of the encrypted chunk and, only in case of match: decrypting the encrypted chunk and returning the decrypted chunk to the client.Type: GrantFiled: December 3, 2015Date of Patent: November 24, 2020Assignee: ORCA INTERACTIVE LTDInventor: Yaacov Toueg
-
Patent number: 10848907Abstract: A device may receive basic safety message (BSM) data from vehicles, and may determine, based on a quantity of the vehicles and speed data identified in the BSM data, a primary geofence area that includes a first set of the vehicles. The device may determine a secondary geofence area based on the speed data and the quantity of the vehicles, wherein the secondary geofence area is greater in size than the primary geofence area. The device may determine a difference between the primary geofence area and the secondary geofence area to generate a difference geofence area that includes a second set of the vehicles that is different than the first set of the vehicles. The device may generate a multicast message based on the BSM data associated with the second set of the vehicles, and may broadcast the multicast message to the first set of the vehicles.Type: GrantFiled: December 5, 2019Date of Patent: November 24, 2020Assignee: Verizon Patent and Licensing Inc.Inventor: Mourad B. Takla
-
Patent number: 10848306Abstract: The present disclosure provides a system and method of implementing a security algorithm using a reconfigurable processor, the method including: determining a plurality of sub-algorithms for constructing the security algorithm; and configuring the reconfigurable processor to implement the security algorithm according to a first configuration information of each sub-algorithm of the plurality of sub-algorithms and a first combination configuration information indicating a combination connection relationship of each of the sub-algorithms. The present disclosure also provides a system and method of implementing a decryption algorithm using a reconfigurable processor.Type: GrantFiled: February 7, 2019Date of Patent: November 24, 2020Assignee: Wuxi Research Institute of Applied Technologies Tsinghua UniversityInventors: Leibo Liu, Min Zhu, Shaojun Wei
-
Patent number: 10846806Abstract: Systems and methods for annotation of construction site images are provided. For example, image data captured from a construction site using at least one image sensor may be obtained. Further, at least one construction plan associated with the construction site and including information related to an object may be obtained. The at least one construction plan may be analyzed to identify a first region of the image data corresponding to the object. The at least one display device may be used to present at least part of the image data to a user with an indication of the identified first region of the image data corresponding to the object. Further, the at least one display device may be used to present to the user a query related to the object. A response to the query may be received from the user. The response may be used to update information associated with the object in at least one electronic record associated with the construction site.Type: GrantFiled: February 15, 2019Date of Patent: November 24, 2020Assignee: CONSTRU LTDInventors: Michael Sasson, Ron Zass, Shalom Bellaish, Moshe Nachman
-
Patent number: 10848325Abstract: A method, system, and apparatus for managing digital certificates, managing a certificate authority (CA), and cross-referencing CA heirarchies. The method includes receiving, by a processor of a CA computing system, at least one of a digital certificate generation request and a digital certificate revocation from a user via a user computing device, the digital certificate generation request including a user public key and a user identity. The method further includes generating a digital certificate for the user and signing the digital certificate with a CA private key, wherein the CA private key is associated with a known CA public key. The method further includes publishing the digital certificate signed with the CA private key to a digital certificate blockchain, determining a certificate status of the digital certificate, and publishing an update to the digital certificate blockchain to reflect the certificate status of the digital certificate.Type: GrantFiled: October 30, 2019Date of Patent: November 24, 2020Assignee: Wells Fargo Bank, N.A.Inventors: David V. Duccini, Phillip H. Griffin, Jeffrey J. Stapleton
-
Patent number: 10841098Abstract: A method for preventing counterfeiting of an object includes capturing an image of at least a portion of the object that is at least partially transparent. The captured image includes features of the internal structure of the object. Based on the image, a code is generated that encodes features of the internal structure of the object. The code is recorded. Generating the code includes applying a filter to the image to obtain a filtered image, and processing the filtered image to obtain a binary code. A random key, k, is generated, and a codeword fp is obtained by applying an error-correction encoding scheme, ErrorCC, to the random key according to fp=ErrorCC(k), wherein fp has the same size as the binary code fa. An encrypted binary code, r, is computed according r=fa?fp, where ? denotes modulo-2 addition. A hash value, h, is computed according to h=H(k), where H is a one-way hash function. Recording the code comprises recording the encrypted binary code r and the hash value h.Type: GrantFiled: April 28, 2020Date of Patent: November 17, 2020Assignee: University of Newcastle Upon TyneInventors: Feng Hao, Ehsan Toreini, Siamak F. Shahandashti
-
Patent number: 10841394Abstract: When a cache miss occurs for a connection request from a client, a server calculates predicted next connection time which is the sum of time related to reception of the latest connection request from the client and a connection request period of the client. At least when the cache area is full, the server determines whether to cache, in the cache area, a session information set including a session ID associated with the latest connection request on the basis of the predicted next connection time calculated for the client.Type: GrantFiled: February 26, 2019Date of Patent: November 17, 2020Assignee: HITACHI, LTD.Inventors: Kota Ideguchi, Nobuyoshi Morita, Kota Seki
-
Patent number: 10838778Abstract: A system and method for accessing native device hardware features, such as a camera or a microphone, using a mobile application is described. The mobile application has an internal browser and at least one program file having instructions used by the internal browser to access the at least one native device hardware features. The mobile application has software configured to enable access to the at least one native device hardware feature for at least one external website configured to work with the mobile application, hosted on an external web server, and rendered in the internal browser, by receiving information from the external website to trigger serving at least one program file to the internal browser from the mobile application as a localhost.Type: GrantFiled: February 3, 2017Date of Patent: November 17, 2020Assignee: MOBILE TAPPESTRY, LLCInventor: Scott Michael Seitz
-
Patent number: 10841343Abstract: A system server includes a memory and a processor in communication with the memory. The processor is configured to process a request to lower a security level of one or more communication channels of a secure communication system, where the request is responsive to a problem in the secure communication system. The processor is also configured to generate a message to inform connected devices associated with the one or more communication channels that the security level is to be lowered. The processor is further configured to lower the security level. The processor is further configured to commence a timer to control an amount of time that the security level is to remain lowered.Type: GrantFiled: March 9, 2018Date of Patent: November 17, 2020Assignee: Xerox CorporationInventors: Peter J. Zehler, Lawrence W. Meyer
-
Patent number: 10841439Abstract: Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. In some embodiments, when a signer user receives a hard copy (e.g., paper) signature document, the signer may capture an image of the signature document with a camera of a mobile device. The signer can then import the captured image into the ESS for signature, storage, and/or transmission to other parties.Type: GrantFiled: November 6, 2019Date of Patent: November 17, 2020Assignee: DocuSign, Inc.Inventors: Thomas H. Gonser, Donald Grant Peterson
-
Patent number: 10839816Abstract: Systems and methods for data communication using audio patterns are described. The methods include encoding a message into an audio pattern, mixing the audio pattern with an audio content to obtain a mixed audio content, wherein the audio pattern is inaudible in the mixed audio content, and transmitting the mixed audio content.Type: GrantFiled: November 6, 2017Date of Patent: November 17, 2020Assignee: PAYPAL, INC.Inventors: Ng Woo Hong, Yiqun Hu, Ider Cheng
-
Patent number: 10832255Abstract: Consistent with the disclosed embodiments, systems and methods are provided herein for autonomously responding to customer problems. In one example implementation, a system performing a method is provided. The system may receive a customer utterance associated with a customer and define, based on the customer utterance, a first customer narrative comprising a first customer goal. The system may also determine whether the first customer narrative is sufficient to identify a first customer problem corresponding to at least a first problem of a plurality of problems. Responsive to determining that the first customer narrative is sufficient, the system may identify a first response corresponding with the first problem. The system may also customize the first response for the customer based on at least the first customer narrative, and execute the customized response.Type: GrantFiled: February 10, 2020Date of Patent: November 10, 2020Assignee: Capital One Services, LLCInventors: Alexandra Coman, Erik T. Mueller, Margaret Mayer
-
Patent number: 10833877Abstract: A method of authenticating a target apparatus by an authentication apparatus that holds a first original key out of a plurality of original keys, and an identifier of the first original key, the target apparatus holding a first value and a plurality of derived keys generated by the plurality of original keys and the first value as inputs to a one-way function, the method includes: the target apparatus selecting a selected key from the plurality of derived keys based on the identifier and generating authentication data based on challenge data and a first generated key based on the selected key; and the authentication apparatus generating an authentication key by the first original key and the first value using the one-way function and generating comparison data based on the challenge data and a second generated key based on the authentication key.Type: GrantFiled: October 10, 2018Date of Patent: November 10, 2020Assignee: Canon Kabushiki KaishaInventors: Hirotaka Ittogi, Kenjiro Hori, Tsutomu Ishida
-
Patent number: 10831843Abstract: Embodiments described herein provide a solution for optimizing a generating of query search results. A filtering search term (e.g., a search term that is used in a query to perform filtering aggregations of the query search results) is identified. A filtering bitmap that has a plurality of mapped locations corresponding to data values for the filtering search term is created. As a data value in the filtering search term is encountered during a scan of the query search results, the corresponding mapped location is updated. Each mapped location in the filtering bitmap is read to determine whether the value corresponding to the mapped location satisfies the filtering aggregation. The filtering aggregation can then be performed (e.g., prior to any grouping aggregation) by removing any of the query search results determined, based on the filtering bitmap, as having data values for which the filtering aggregation is not satisfied.Type: GrantFiled: November 1, 2017Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Wenbin Ma, Liping Zhang, Calisto Zuzarte
-
Patent number: 10826975Abstract: A system and method for providing JAVA cloud services for use with a cloud computing environment. In accordance with an embodiment, a cloud environment, such as ORACLE Public Cloud (OPC), can include a JAVA cloud services (JCS) infrastructure, which allows a suite of software applications, middleware, and database offerings to be delivered to customers in a self-service, elastically scalable manner. In accordance with an embodiment, the JCS infrastructure can orchestrate, in combination with other cloud environment components, the creating and/or updating of a platform instance of a JAVA cloud service, including provisioning and deployment of the platform instance and/or deployment of software applications, and one or more personality injection or application deployment processing. Additional resources and/or services, such as a database service, can be wired to or otherwise associated with the JAVA cloud service, for use by customer applications that are deployed to the cloud.Type: GrantFiled: February 1, 2019Date of Patent: November 3, 2020Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Naresh Revanuru, William Arthur Jackson, III, Nilesh P. Junnarkar
-
Patent number: 10824737Abstract: Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.Type: GrantFiled: February 21, 2018Date of Patent: November 3, 2020Assignee: ASSA ABLOY ABInventors: François-Eric Michel Guyomarc'h, Francois Menard
-
Patent number: 10824914Abstract: An apparatus for generating data based on generative adversarial networks (GANs) is provided. The apparatus includes a first generator configured to receive input data and generate a first fake image, a first discriminator configured to receive the first fake image generated by the first generator and a first real image and verify whether an image is fake or real, a second generator configured to receive the first fake image and generate a second fake image; and a second discriminator configured to receive the second fake image and a second real image and verify whether an image received by the second discriminator is fake or real. The apparatus improves an object recognition performance as compared with a typical object recognition algorithm by generating an image of a class of which a sufficient database is not secured so as to reduce an object misrecognition caused by an insufficient amount of data.Type: GrantFiled: December 4, 2018Date of Patent: November 3, 2020Assignee: KWANGWOON UNIVERSITY INDUSTRY-ACADEMIC COLLABORATION FOUNDATIONInventors: Ji Sang Yoo, Ju Won Kwon
-
Patent number: 10820176Abstract: Concepts and technologies of remote user equipment assessment for network connection provisioning are provided herein. In an embodiment, a method can include receiving, by a server from a network connection client executing on a user equipment, a network connection request to authorize connection to a network. The method can also include determining, by the server, whether the user equipment can support communication via an internet protocol-based advanced service of the network. In response to determining that the user equipment can support communication with an internet protocol-based advanced service of the network, the method can further include authorizing, by the server, a network connection for the user equipment while prohibiting the user equipment from using the internet protocol-based advanced service during the network connection.Type: GrantFiled: December 22, 2017Date of Patent: October 27, 2020Assignees: AT&T Intellectual Property I, L.P., Cricket Wireless LLCInventors: Ronak Shah, Judith Espejo, Yakun Gao
-
Patent number: 10817573Abstract: The present invention is a computer implemented method comprising; receiving, by at least one processor, a request to sign a document, authenticating, by one or more processors, a user account, generating, by one or more processors, a coded signature, wherein the coded signature includes a set of data and the set of data is specific to the document and the user account, embedding, by one or more processors, the coded signature in the document, capturing, by one or more processors, an image of the image of signed document, and wherein a verification is requested of a signature, further comprising, analyzing, by one or more processors, the Coded Signature data and the document data to determine if the similarity of the data is within the predetermined tolerance.Type: GrantFiled: March 15, 2020Date of Patent: October 27, 2020Inventor: Nikitas Allan Alexiades
-
Patent number: 10812497Abstract: Systems and methods for detecting security threats using application execution and connection lineage tracing with embodiments of the invention are disclosed. In one embodiment, detecting suspicious activity in a network includes receiving at a collector server a first activity data including a first set of attributes, combining a first set of context information with the first activity data to generate a first activity record, comparing the first activity record to a set of baseline signatures, incrementing a count of a first matching baseline signature when the first activity record has the same values for all attributes, receiving a second activity data including a third set of attributes, combining a second set of context information with the second activity data to generate a second activity record, and generating an alert when the attributes of the second activity record differ from all baseline signatures.Type: GrantFiled: December 7, 2016Date of Patent: October 20, 2020Assignee: Prismo Systems Inc.Inventors: Anjan Venkatramani, Chihwei Chao
-
Patent number: 10812979Abstract: A control system and method are provided for a station to dispense fuel to a vehicle, including an electric vehicle, without requiring dedicated access to a communications network, with the advantage that authorization for fleet vehicles or individuals can be obtained from an access management system, using a portable, wireless device, such as a smart phone or a dashboard appliance. The authorization is wirelessly relayed to the station by the wireless device, to enable the dispensing of fuel. Subsequently, a log comprising the transaction is provided to the access management system, through the same or a different wireless, mobile computing device. The log may also report status and other events, such as load shedding.Type: GrantFiled: December 5, 2018Date of Patent: October 20, 2020Assignee: Liberty PlugIns, Inc.Inventors: Christopher Scott Outwater, William Gibbens Redmann
-
Patent number: 10812271Abstract: A method, system and computer program product for privacy control. A unique identifier for each data element of a group of data elements (e.g., driver's license contains a group of data elements, such as name, driver's license number) is created. These identifiers may be stored along with documentation (e.g., label) of the associated data elements in a manifest file. Alternatively, the identifiers may be stored in a file outside of the manifest file. In this manner, by utilizing a data element identifier which corresponds to a random number, security of privacy information is improved as one would only be able to obtain such sensitive information by obtaining such an identifier. Furthermore, the user only needs to send the requested data elements, as opposed to all the data elements of the group of data elements, to the challenger. In this manner, the user is preserving the security of other privacy information.Type: GrantFiled: May 17, 2019Date of Patent: October 20, 2020Assignee: International Business Machines CorporationInventors: William F. Abt, Jr., Daniel A. Gisolfi, Richard Redpath
-
Patent number: 10803013Abstract: A software application platform for uploading a file to a server is disclosed. The server receives a request from a user to upload a file thereto. An upload client extracts file information from the file. The server generates a file signature for the file. The server accesses one or more existing file signatures for each of one or more existing files on the server. The server determines whether any of the one or more existing file signatures are similar to the file signature. Responsive to determining that there is an existing file signature that is similar to the file signature, the server accesses a first hash signature for the existing file. The upload client generates a second hash signature for the file. Responsive to determining that the first hash signature does not equal the second hash signature, the upload client uploads the file to the server.Type: GrantFiled: January 22, 2018Date of Patent: October 13, 2020Assignee: SMUGMUG, INC.Inventors: Gabrielle Burns, Yuping He
-
Patent number: 10805502Abstract: In one or more embodiments, one or more systems, methods, and/or processes may redirect a request to open a document to a background process that controls access to the document; may determine policy information associated with the document and a user of an application; may provide the document to the application; may determine an area of a user interface of the application that displays information of the document; may determine watermark information based at least on the policy information; may generate one or more watermarks based at least on the watermark information; and may display the one or more watermarks, based at least on the watermark information, on the area of the user interface of the application that displays the information of the document.Type: GrantFiled: June 25, 2018Date of Patent: October 13, 2020Assignee: Dell Products L.P.Inventors: Luis Antonio Valencia Reyes, Ricardo Antonio Ruiz, James Darrell Testerman, Dongli Wu, Venkata Satya Narasimha Murthy Prayaga, Jonathan Nathan Yanez
-
Patent number: 10805081Abstract: In a general aspect, a supersingular isogeny-based cryptography process is performed. In some aspects, a cryptographic element is generated by executing a supersingular isogeny-based cryptography protocol. A generator of a first isogeny kernel is computed. A pre-determined tree topology is traversed. The tree topology includes nodes coupled by edges. A first set of edges represent scalar multiplications, and a second set of edges represent point evaluations. A plurality of isogeny kernels corresponding to respective nodes in the tree topology are computed by executing batches of operations. At least one of the batches includes a first point evaluation represented in the tree topology having a first domain and a first range, and a second point evaluation represented in the tree topology having a second domain and a second range. The first domain, the first range, the second domain and the second range are non-isomorphic elliptic curves.Type: GrantFiled: April 30, 2020Date of Patent: October 13, 2020Assignee: ISARA CorporationInventors: Victoria de Quehen, Shane Daniel Kelly
-
Patent number: 10805080Abstract: Aspects of the present disclosure relate to systems and methods for providing strong resource identification. When a resource is created, saved, or re-based, a cryptographic key pair with the resource. A public key of the cryptographic key pair may be used as a unique identifier. Information about the resource, such as the name of the resource and its actual location may be stored in an index based upon the resource's public key. Sharing the resource with other devices may comprise sending the resource's key, as opposed to information about the resource's actual location, to one or more recipient device.Type: GrantFiled: January 6, 2017Date of Patent: October 13, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Christopher L. Mullins, Robert Standefer, III
-
Patent number: 10803151Abstract: In a general aspect, a computer implemented method can include identifying, in a program code stored in computer memory, a location of a dynamic repair target code section for an assignment to a program variable, a value of which is known only at runtime. The method can also include modifying the program code at the identified location of the dynamic repair target code section to assign an immediate value different from a correct runtime value to the program variable. The method can further include inserting, into the program code in the computer memory, a dynamic repair probe code section that is executed before the dynamic repair target code and, at runtime, modifies the immediate value in the code to contain the correct runtime value when an attack has not occurred.Type: GrantFiled: May 31, 2017Date of Patent: October 13, 2020Assignee: VERIMATRIXInventors: Neil William Stewart, Graeme Kerr Harkness, Douglas McPherson Little
-
Patent number: 10798122Abstract: Systems and methods are presented which generate modified email messages, which are largely devoid of embedded functions, from original email messages, which have embedded functions. The embedded functions are amenable to self-executing codes such as viruses, worms, and Trojan programs. Thus, the modified email message without these embedded functions, and any argument associated with these functions, provides a more secure email environment.Type: GrantFiled: January 8, 2019Date of Patent: October 6, 2020Assignee: Uber Technologies, Inc.Inventors: W. Todd Daniell, Dale W. Malik
-
Patent number: 10791152Abstract: A method, apparatus and system related to automatic communications between networked devices such as televisions and mobile devices are disclosed. In one aspect a system includes a networked device configured to announce a networked service to a discovery service, and/or perform the discovery service for a private network; and/or a client device configured to execute a sandboxed program in a security sandbox. The system also includes automatically instantiating a connection between the sandboxed program and the networked device and/or the networked service. The discovery agent may be running with the sandboxed program is configured to query the discovery service for a service information associated with of the networked device and/or the networked service. The service information may include a global unique identifier (GUID), an alphanumeric name, a public address pair, and/or a private address pair.Type: GrantFiled: May 30, 2017Date of Patent: September 29, 2020Assignee: FREE STREAM MEDIA CORP.Inventor: David Harrison
-
Patent number: 10790976Abstract: Disclosed are systems and methods for recovering cryptocurrency assets which may be tied to a lost personal private encryption key. The disclosed system deploys a multi-signature wallet formed from a set of keys including the user's personal key, the key of an organization provides blockchain service for the user, and a reserve key stored by third-party escrow organization. To recover a lost user private key, the system generates and digitally signs with the appropriate private keys a blockchain transaction that includes a script configured, when executed by a node in a blockchain network, to replace the user key with a replacement key.Type: GrantFiled: August 1, 2018Date of Patent: September 29, 2020Assignee: BLOOMIO AGInventors: Alexey Raevsky, Max Lyadvinsky
-
Patent number: 10785036Abstract: The present invention relates to a method for generating an electronic signature of a document associated with a condensate obtained by a given hash function comprising performing by data-processing means (11b) of a server (10b) of steps of: (a) Receiving said condensate and a zero-knowledge proof of the fact that said condensate is indeed the result of application of said given hash function to said document; (b) Verifying that said zero-knowledge proof is valid; (c) Generating an electronic signature of the document from said condensate.Type: GrantFiled: December 6, 2017Date of Patent: September 22, 2020Assignee: IDEMIA IDENTITY & SECURITY FRANCEInventors: Julien Paul Keuffer, Herve Chabanne, Emmanuel Prouff, Olivier Clemot
-
Patent number: 10783273Abstract: A method for controlling personal content on a media device includes establishing, at the media device, a wireless connection with a mobile user device using a wireless communication circuit of the media device; receiving, from the mobile user device, account information for an account associated with personal content, the personal content of the account accessible by the media device from a server computer over a communication network or from a memory of the media device; receiving, from the mobile user device, a usage term for accessing or using the personal content of the account; and controlling access to or usage of the personal content of the account by the media device based on the received account information and the usage term.Type: GrantFiled: August 20, 2018Date of Patent: September 22, 2020Assignee: Google LLCInventors: Lukasz Kowalik, Marcin Stanislaw Wielgus
-
Patent number: 10783282Abstract: Devices, systems and methods for distribution of digital content are provided. At least a security manager of a media block is located within a tamper-responsive enclosure, the security manager and/or the media block bonded to a transcoder in a security marriage based on a cryptographic certificate associated with at least the media block. The media block provides, to the transcoder via a data bridge, encrypted output generated from digital content and based on a first cryptographic key. The transcoder generates respective transcoded outputs associated with one or more tokens used for playback of the respective transcoded outputs at respective end-user devices, the respective transcoded outputs generated from the encrypted output decrypted using a second cryptographic key associated with the first cryptographic key. The respective transcoded outputs are output to the respective end-user devices associated with respective tokens.Type: GrantFiled: October 24, 2018Date of Patent: September 22, 2020Assignee: CHRISTIE DIGITAL SYSTEMS USA, INC.Inventors: Brian Claypool, Robert Ranucci, Craig Sholder, Ryan Terschluse, Kevin Draper, Alen Koebel, Peter Pekurar, Derek Scott
-
Patent number: 10785019Abstract: A data transmission method and apparatus are disclosed that resolves a technical problem where an existing data encryption algorithm offers poor security during transmission of data. The solution includes obtaining, by a first terminal, a data transmission request sent by a second terminal, the data transmission request at least carrying first encrypted data that is obtained by encrypting first exchange key of the second terminal by using a private key of the second terminal. The solution further includes decrypting, by the first terminal, the first encrypted data by using a public key of the second terminal to obtain the first exchange key, and obtaining a shared key of the first terminal and the second terminal according to the first exchange key. The solution further includes encrypting, by the first terminal, to-be-transmitted data by using the shared key to obtain encrypted to-be-transmitted data, and sending the encrypted to-be-transmitted data to the second terminal.Type: GrantFiled: September 20, 2017Date of Patent: September 22, 2020Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Li Yi Feng, Yuan Li Na, Wang Liang, Guo Ji Wei
-
Patent number: 10776490Abstract: An example device includes one or more memories; and one or more processors, communicatively coupled to the one or more memories, to, during a loading process of a boot process of an operating system, identify a file to be loaded for the operating system, where the operating system is being loaded during the boot process; identify a manifest of the file; verify the manifest of the file based on a supplied signature of the manifest; identify a fingerprint, associated with the file, in a fingerprint library; calculate a hash of the file; compare the hash of the file and the fingerprint; and verify the file based on the hash of the file matching the fingerprint associated with the file.Type: GrantFiled: December 28, 2017Date of Patent: September 15, 2020Assignee: Juniper Networks, Inc.Inventor: Simon J. Gerraty
-
Patent number: 10777211Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for audio watermarking and, more particularly, methods and apparatus to inspect characteristics of multichannel audio. An example apparatus disclosed herein includes an audio demultiplexer to obtain a first audio subchannel and a second audio subchannel of a multichannel audio signal and a watermark detector to detect watermarks in the first audio subchannel and watermarks in the second audio subchannel. The example apparatus further includes a channel characteristic inspector to compare a number of watermarks detected in the first audio subchannel and a number of watermarks detected in the second audio subchannel to determine whether the first and second audio subchannels were watermarked in accordance with a watermark encoder configuration and a result alerter to distribute an alert in response to a determination that the first and second audio subchannels were not watermarked in accordance with the watermark encoder configuration.Type: GrantFiled: March 25, 2019Date of Patent: September 15, 2020Assignee: The Nielsen Company (US), LLCInventor: Khaldun Karazoun
-
Patent number: 10778667Abstract: A system is disclosed that includes a processor including watermark logic to output a first watermark to an output device that outputs a first watermark signal, based on the first watermark, to an acoustic transmission medium. The processor also includes recording logic to capture, at a first time period, an authentication submission comprising the first watermark signal convolved, via the acoustic transmission medium, with a first passphrase signal. The system also includes a dynamic random access memory (DRAM). Other embodiments are disclosed and claimed.Type: GrantFiled: November 15, 2019Date of Patent: September 15, 2020Assignee: McAfee, LLCInventors: Igor Muttik, Adam Marek, Alex Nayshtut
-
Patent number: 10771240Abstract: A dynamic blockchain system includes: at least one complete asset node server, including a complete asset manager and a complete asset storage; a plurality of hash asset node servers, each including a hash asset manager and an asset blockchain and; a dynamic blockchain management server, including a blockchain manager, a representation calculation function, and an asset map with a plurality of map records; and a blockchain management device; such that the dynamic blockchain management server validates a digital asset by lookup in the at least one complete asset node server and by verification of the digital asset by a random sampling in a statistically representative number of hash asset node servers in the plurality of hash asset node servers.Type: GrantFiled: June 11, 2019Date of Patent: September 8, 2020Assignee: Dynamic Blockchains IncInventors: James A. Carson, Ryuta Richard Makino, Susan H. Glenn-Joseph
-
Patent number: 10769252Abstract: A method and apparatus for watermarking digital content and a data extraction method are disclosed. The digital content watermarking method includes: generating private and public keys corresponding to the user terminal; generating watermark data containing user identity information corresponding to the user terminal and user details associated with the watermark data; generating encrypted data by encrypting the watermark data and the user details with the private key; transmitting the watermark data, the encrypted data, and the public key to a server; receiving digital content when authorized by the server; and watermarking the digital content with the watermark data.Type: GrantFiled: March 20, 2018Date of Patent: September 8, 2020Assignee: MARKANY INC.Inventors: So Won Kim, Ji Seop Moon, Min Soo Park, Hyungyu Kim, Euee Seon Jang
-
Patent number: 10769635Abstract: A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size; capturing audio of the user's voice; and performing voice recognition techniques to determine a correlation between the captured audio of the user's voice and one or more voice prints.Type: GrantFiled: August 5, 2016Date of Patent: September 8, 2020Assignee: Nok Nok Labs, Inc.Inventor: Rolf Lindemann
-
Patent number: 10771765Abstract: An information processing apparatus includes an acquisition unit configured to acquire image data, a generation unit configured to generate information about time as generated additional data, and a replacement unit configured to replace data at a plurality of pixel positions of the acquired image data with the generated additional data.Type: GrantFiled: April 23, 2018Date of Patent: September 8, 2020Assignee: Canon Kabushiki KaishaInventor: Hikaru Uchidate
-
Patent number: 10769289Abstract: To expedite electronic delivery and return of a document, the document is sent to an electronic mail system and stored in an electronic form thereat. The recipient is informed that the document is available thereto at any of a plurality of merchants where the document may be retrieved. The recipient visits one of the plurality of merchants and at the visited merchant retrieves the document in the electronic form from the mail system to a computing device at the visited merchant. The recipient then reviews and executes the document at the visited merchant, and sends the executed document in an electronic form to the organization by way of the visited merchant and the computing device thereat.Type: GrantFiled: May 15, 2019Date of Patent: September 8, 2020Assignee: United Services Automobile Association (USAA)Inventor: Miguel Antonio Arguello
-
Patent number: 10764035Abstract: Provided are control methods of a decryption key storage server, a biometric information storage server, and a matching server in an authentication system.Type: GrantFiled: March 13, 2017Date of Patent: September 1, 2020Assignee: SUPREMA ID INC.Inventors: Won Seok Ahn, Jin Wook Yi, Bo Gun Park, Jae Won Lee
-
Patent number: 10764491Abstract: An image processing apparatus includes an imaging unit configured to capture an image of a printed matter in which additional information has been embedded by an electronic watermark and an extraction unit configured to perform an extraction process of extracting the additional information from captured image information obtained by the imaging unit. The image processing apparatus further includes a notification unit configured to notify information indicating that the imaging unit is in a stage of preparation for the extraction process in a case where a positional relationship between the printed matter and the imaging unit satisfies some of conditions for starting the extraction process.Type: GrantFiled: June 18, 2018Date of Patent: September 1, 2020Assignee: Canon Kabushiki KaishaInventor: Yuichi Inoue
-
Patent number: 10761871Abstract: A method and system for managing dynamic runtime information provision for containers in a container management system. The method includes starting a container image load, determining whether a secret sub unit is present in the container image, determining secret value input source and destination of secret value, and providing secret values to destination sub unit of a container defined by the container image.Type: GrantFiled: November 14, 2017Date of Patent: September 1, 2020Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: James Donald Reno, Michael Brown, Akshay Rajesh Baheti
-
Patent number: 10764049Abstract: A method for determining approval for access to a gate through a network, a server, and computer readable recoding media using the same, and more particularly, to a method for determining approval for access to a gate through a network, a server, and computer readable recoding media using the same so as to determine access to a gate for using a service by allowing an authorizer (user) to determine an approval for a service access at the time of using the service without input of a password or the like. It is possible to use one-time and effective identification only when approval for the access to the corresponding gate is determined at the time of requiring the authority for the approval for the access to the service gate.Type: GrantFiled: July 6, 2017Date of Patent: September 1, 2020Assignee: AIRCUVE INC.Inventors: You Serk Han, Sang Hun Seok
-
Patent number: 10762566Abstract: Methods, devices, and systems for communicating market data with market participants involve obfuscating at least a portion of a first financial message. Communicating the market data also involves augmenting a second financial message with a key configured to remove the obfuscation from the obfuscated portion of the first financial message. The market data is ultimately communicated by transmitting the first financial message to a particular participant, and transmitting the second message to a plurality of participants. The particular participant may then use the key from the second financial message to remove the obfuscation of the first financial message.Type: GrantFiled: June 20, 2018Date of Patent: September 1, 2020Assignee: Chicago Mercantile Exchange Inc.Inventors: José Antonio Acuña-Rohter, Paul Callaway, Pearce Peck-Walden, Barry Galster
-
Patent number: 10764060Abstract: The disclosed computer-implemented method for authenticating a multimedia stream may include generating a metadata transcript based on at least a portion of a multimedia stream and digitally signing the metadata transcript. The method may also include transmitting both the digitally signed metadata transcript and the multimedia stream to a recipient device to enable the recipient device to authenticate the multimedia stream. The recipient device may authenticate the multimedia stream based on a comparison of the digitally signed metadata transcript with an observed metadata transcript. The observed metadata transcript may be locally generated by the recipient device based on the multimedia stream. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 6, 2018Date of Patent: September 1, 2020Assignee: NortonLifeLock Inc.Inventors: Ilya Sokolov, Keith Newstadt
-
Patent number: 10756898Abstract: Examples of the present disclosure describe systems and methods relating to content delivery verification. In an example, a root authority is used to provide aspects of content delivery verification. The root authority receives supplemental content from a content source, which it uses to generate secured content. The content source provides the secured content to a publisher (e.g., directly or indirectly, e.g., via a content marketplace). In examples, the root authority evaluates at least a part of the secured content and/or information associated with the publisher to determine whether the unsecured content should be displayed by the publisher on a client device. In other examples, the client device may perform verification aspects. If it is determined that the content should be displayed, the unsecured content may be provided for display. If, however, it is determined that the content should not be displayed, alternate content may instead be provided.Type: GrantFiled: June 12, 2018Date of Patent: August 25, 2020Assignee: Rebel AI LLCInventor: Emmanuel Puentes
-
Patent number: 10757112Abstract: Systems and methods for controlling object/document access in a content management system. The content management system may have several layers of access controls, which may include a layer of access control at the object level, a layer of access control at the row level and a layer of access control at the field level. Access may be controlled at the object level by a user's security profile, at the object record level (or row level) by the user's role, and/or at the object field level by the user's role or a state in a document lifecycle. In other words, the object level access control may grant access (e.g., Create, Read, Edit and Delete) on objects, the object record level access control may grant access (e.g., Read, Edit and Delete) on object records, and field level access control may grant access (e.g., Read, Edit and Hidden) on object field level.Type: GrantFiled: January 31, 2018Date of Patent: August 25, 2020Assignee: Veeva Systems Inc.Inventors: Peter Gassner, Peter Thorson, Jon Stone, Jean-Christophe Meriaux, George C. Lee