Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
-
Patent number: 10757474Abstract: A system, method and apparatus for protecting a media program having a plurality of frames is disclosed.Type: GrantFiled: April 27, 2018Date of Patent: August 25, 2020Assignee: Twentieth Century Fox Home Entertainment LLCInventor: Ian Harvey
-
Patent number: 10756904Abstract: An apparatus in one embodiment includes at least one processing device comprising a processor coupled to a memory. The processing device is configured to implement a first ledger maintenance node. The first ledger maintenance node is configured to communicate over one or more networks with a plurality of additional ledger maintenance nodes, to identify a block for proposed addition to a distributed ledger collectively maintained by the first and additional ledger maintenance nodes, to apply a digital signature of the first ledger maintenance node to the block, and to receive digital signatures on the block from at least a subset of the additional ledger maintenance nodes. Responsive to receipt of sufficient digital signatures from respective ones of the additional ledger maintenance nodes to meet a specified quorum of digital signatures required for addition of the block to the distributed ledger, the first ledger maintenance node adds the block to the distributed ledger.Type: GrantFiled: February 22, 2018Date of Patent: August 25, 2020Assignee: EMC IP Holding Company LLCInventors: Radia J. Perlman, Charles Kaufman
-
Patent number: 10756924Abstract: A vehicle communication system that provides data between various objects (i.e., devices) within a vehicle communication network is disclosed. In one or more implementations, the vehicle communication system includes an accessor interface module that receives data encoded in an automotive connectivity communication protocol from another accessor module. The other accessor module is associated with an originating object within a vehicle communication network. The data encoded in the automotive connectivity communication protocol includes an object data portion defining a domain associated with a destination object and a payload data portion. The domain has a corresponding authentication protocol for authenticating the data. The accessor interface module authenticates the data according to the authentication protocol. The vehicle communication system also includes an object-specific protocol encoder module that determines an object-specific communication protocol associated with the destination object.Type: GrantFiled: April 12, 2017Date of Patent: August 25, 2020Assignee: DENSO International America, Inc.Inventors: Rene Sarabia, Akihito Iwai
-
Patent number: 10754944Abstract: To reliably protect users or systems from a program prepared by a malicious developer. Provided is a processing system configured to process a program transmitted from outside through a wired or wireless network. The processing system includes: a reception module configured to receive the program; an addition module configured to add to the program a gate component that restricts a process of attacking a user or the system; and an alteration module configured to alter, in the program, a code having a certain keyword or syntax to change a destination to be referred to by the code having the keyword or syntax to the gate component.Type: GrantFiled: December 13, 2016Date of Patent: August 25, 2020Inventor: Yuta Takeda
-
Patent number: 10756907Abstract: Embodiments of the present disclosure relate to a method for verifying an authenticity of a message. The method comprises acquiring a first hash value corresponding to the message, and acquiring a verification code corresponding to the message. The method further comprises computing a second hash value based on the verification code and the message, and verifying the authenticity of the message by comparing the first hash value with the second hash value.Type: GrantFiled: January 12, 2018Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Yin Xia, Yi Liu, Jun Su, Ying Cao
-
Patent number: 10754952Abstract: An example method of authenticating software executing in a computer system includes: receiving, from the computer system over a network at a server computer, a trusted platform module (TPM) quote, an event log, and a metadata database, the TPM quote provided by a TPM in the computer system, the event log including first checksums for the software executing in the computer system, and the metadata database including second checksums of binary files stored in packages from which the software is installed; establishing a root of trust in the computer system at the server computer based on the TPM quote and the event log; and determining, at the server computer in response to establishing the root of trust, integrity of the software executing in the computer system by comparing the first checksums with the second checksums.Type: GrantFiled: July 23, 2018Date of Patent: August 25, 2020Assignee: VMware, Inc.Inventors: Daniel Muller, Samyuktha Subramanian, Mukund Gunti
-
Patent number: 10742421Abstract: A method performing anonymous hardware attestation. A local software monitor is loaded at an originating device. The local software monitor may receive at least a command to execute at least a program and execute the at least a program by performing a series of authentications. Originating device activates a secure computing module located within originating device to generate a secure proof a device specific secret of the originating device. The originating device generates a digital signature conferring a credential on the local software module. The originating device deactivates the secure computing module upon generating the digital signature.Type: GrantFiled: November 13, 2019Date of Patent: August 11, 2020Inventors: Christian Wentz, Ilia Lebedev, Anna Iysyanskaya
-
Patent number: 10742420Abstract: An example method includes receiving a messageDigest attribute value comprising a hash of content. The messageDigest attribute value is digitally signed with a first private key associated with the message computing system using a quantum-resistant signature algorithm to generate a quantum-resistant digital signature value. A QSignerinfo type is generated that includes at least one of a public key identifier of the public key and the quantum-resistant digital signature value. A QSignerinfo attribute is generated that identifies the QSignerinfo type. The QSignerinfo attribute is transmitted to a recipient. the recipient digitally signs the QSignerinfo attribute with a second private key associated with the recipient using a quantum-vulnerable signature algorithm to generate a double signature value. Origin authenticity of the double signature value can be determined by using a second public key of the recipient, the second public key of a second public/private key pair including the second private key.Type: GrantFiled: March 9, 2018Date of Patent: August 11, 2020Assignee: WELLS FARGO BANK, N.A.Inventor: Phillip H. Griffin
-
Patent number: 10735199Abstract: Embodiments of the invention are directed to a system, method, or computer program product for file transmission validation and failure location identification. The invention provides a cryptographic hashing function to generate a unique hash for each block in a file being transmitted. The hash from the previous block is included along with the contents of the next block to create the hash for the next block. Similarly the hash from the previous blocks is used with the data of that block to generate the hash forming onto a block chain. The files can only be transmitted to a select group of servers forming a private block chain network within the entity server systems after the files are transmitted to the target location. As such, the system can recalculate the hashes and match hash blocks to identify an exact file location of a transmission failure.Type: GrantFiled: January 2, 2018Date of Patent: August 4, 2020Assignee: BANK OF AMERICA CORPORATIONInventor: Siten Sanghvi
-
Patent number: 10735189Abstract: The present disclosure relates to exchanging data for multi-party computation. In some aspects, a server generates a first random number set, a second random number set, a third random number set, and a fourth random number set based on a first random seed, a second random seed, a third random seed, and a fourth random seed, respectively. The sever generates a fifth random number set and a sixth random number set, respectively, based on the first random number set, the second random number set, the third random number set, and the fourth random number set. The random numbers in the random number sets satisfy a predetermined condition. The server sends the first random seed, the second random seed, and the fifth random number set to a first device. The server sends the third random seed, the fourth random seed, and the sixth random number set to a second device.Type: GrantFiled: January 30, 2020Date of Patent: August 4, 2020Assignee: Alibaba Group Holding LimitedInventors: Huazhong Wang, Lichun Li, Yuan Zhao
-
Patent number: 10733645Abstract: Example embodiments of systems and methods for secure online order pick up and data transmission system between transmitting and receiving devices are provided. In an example embodiment, a user may be required to confirm his or her identity prior to using an application, utilizing enhanced or restricted features of an application or device, viewing sensitive information, or taking certain actions. A transmitting device, such as a contactless card, may be employed as means for confirming a user's identity and access these features.Type: GrantFiled: October 2, 2019Date of Patent: August 4, 2020Assignee: CAPITAL ONE SERVICES, LLCInventors: Jeffrey Rule, Kaitlin Newman, Steve Blanchet, Timur Sherif
-
Patent number: 10726102Abstract: According to an example embodiment of the invention, there is provided a system for providing access to access restricted content to a user, the system including a communication arrangement operable to receive a content request message, the content request message including a content identifier, a processor configured to cause a first determination to be performed to yield a positive or a negative result, a validation module configured to, in response to the first determination yielding a positive result, obtain a first digital rights management key, the processor being further configured to cause a second determination to be performed to yield a positive or a negative result, and responsive to the first and second determinations yielding a positive result, the validation module is configured to cause access to the access restricted content to be provided to the user.Type: GrantFiled: January 8, 2015Date of Patent: July 28, 2020Assignee: IPRA Technologies Oy Ltd.Inventors: Lauri Valjakka, Jukka-Pekka Jussila, Jari Tapio
-
Patent number: 10728039Abstract: A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may act in cooperation with trusted components controlled and operated by the signer. The system employs a presentation authority for presenting an unsigned copy of an electronic document to a signing party and a signature authority for controlling a process for affixing an electronic signature to the unsigned document to create a signed electronic document. The system provides an applet for a signing party's computer that communicates with the signature authority.Type: GrantFiled: December 22, 2017Date of Patent: July 28, 2020Assignee: Signix, Inc.Inventor: Robert T. Oswalt
-
Patent number: 10719455Abstract: Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.Type: GrantFiled: August 24, 2018Date of Patent: July 21, 2020Assignee: Amazon Technologies, Inc.Inventors: Chesley B. Coughlin, Eric M. Wagner
-
Patent number: 10719276Abstract: A printing device receives a document to print directly from a device. The document is converted into a portable document format (PDF) file. The PDF converter separates the document into different groups that are processed separately to generate multiple PDF files for the document. The PDF files include a first page file and subsequent files for one or more pages separated according to criteria, such as page complexity or size. The separate PDF file is sent to the PDF interpreter to be printed without waiting for the subsequent data within the document.Type: GrantFiled: November 21, 2018Date of Patent: July 21, 2020Assignee: Kyocera Document Solutions Inc.Inventors: Hui Wang, Dilinur Wushour
-
Patent number: 10719277Abstract: A printing device receives a document to print directly from a computing device. The document is converted into a portable document format (PDF) file. The PDF converter separates the document into different groups that are processed separate to generate multiple PDF files for the document. The PDF files include a first page file and subsequent files for groups of pages separated according to criteria, such as page number or size. The separate PDF file is sent to the PDF interpreter to be printed without waiting for the subsequent data within the document.Type: GrantFiled: November 21, 2018Date of Patent: July 21, 2020Assignee: Kyocera Document Solutions Inc.Inventors: Hui Wang, Dilinur Wushour
-
Patent number: 10715338Abstract: A system includes determination of first public key certificate policies based on first data files, generation of a first public key certificate conforming to the first public key certificate policies, storage of the first public key certificate in a secret store system, reception of a second public key certificate, determination of second public key certificate policies based on second data files stored in the secret store system, determination of whether the received second public key certificate conforms to the second public key certificate policies, and storage of the second public key certificate in the secret store system if it is determined that the received second public key certificate conforms to the second public key certificate policies.Type: GrantFiled: February 21, 2018Date of Patent: July 14, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: John Michael Walton, Shawn Valentine Hernan, Shrikant Adhikarla
-
Patent number: 10715330Abstract: A system supports authorization and custody tracking for physical concessions. In some cases, a physical concession or other physical object may be tracked to ensure that custodians that gain possession of the physical concession have proper authorization. Further, custody tracking may ensure that a particular custodian is issued the authorized amount of physical concession(s). Authorization circuitry may, via a peer network, access proof of authorization and custody status stored on a blockchain. Based on the proof of authorization and custody status, the authorization circuitry may determine whether issuance of the physical concession to a receiving custodian is allowed. After allowing/disallowing issuance of the physical concession, tracking circuitry may send, via the peer network, a request to update the blockchain.Type: GrantFiled: April 23, 2019Date of Patent: July 14, 2020Assignee: Accenture Global Solutions LimitedInventors: Vivek Govekar, Mark Potts
-
Patent number: 10715345Abstract: According to an embodiment, a communication control device is connected to communication devices and includes a storage, a generator, and an output unit. The storage is configured to store group information containing a group ID of a group and device IDs of the communication devices belonging to the group. The generator is configured to generate compressed information in which the device IDs are compressed. The output unit is configured to output, when the group information is updated, to all communication devices identified by the device IDs included in the group information after updating and to a plurality of communication devices including one or more of the communication devices identified by the device IDs not included in the group information after updating, output information containing identification information for identifying the group after updating and compressed information in which the device IDs included in the group information after updating are compressed.Type: GrantFiled: January 5, 2015Date of Patent: July 14, 2020Assignee: Kabushiki Kaisha ToshibaInventors: Yoshikazu Hanatani, Toru Kambayashi, Yoshihiro Oba
-
Patent number: 10713714Abstract: The present invention, EscrowTab mobile application system and method comprises automating, reviewing, executing, and transmitting documents used in real estate financial transactions by providing document data visualization on a mobile device allowing for review and execution of financial closing documents, such as promissory notes, deeds of trust and financial documents on a mobile device such as a tablet and relaying these documents to and from the originating financial institution, via means of the internet or dedicated communications media.Type: GrantFiled: January 3, 2018Date of Patent: July 14, 2020Assignee: EscrowTab, Inc.Inventors: Kolin Blain Porter, Adam McCurry Carlson, Tim Gilker
-
Patent number: 10715531Abstract: A network topology is provided that includes multiple data centers for building blockchain blocks. The data centers can process different subgroups of blocks, and then send updates to one another with information about new blocks. Additionally, some data centers may protect sensitive block body information, and instead may only share block headers.Type: GrantFiled: August 10, 2017Date of Patent: July 14, 2020Assignee: Visa International Service AssociationInventors: Ajith Thekadath, Suman Mukherjee
-
Patent number: 10708065Abstract: The present disclosure relates to a service processing method, a service processing device and a service processing system, which belong to computer technologies. The method includes: a service execution request is transmitted to a service server; a verification notification carrying signature information is received from the service server; currently inputted biometric feature information is verified through a Trusted Execution Environment (TEE) system, when biometric feature information is consistent with pre-stored reference biometric feature information, a signature processing is performed on signature information, by using a pre-stored service private key, first to-be-verified signature information is obtained; and a verification request carrying first to-be-verified signature information is transmitted to the service server. By adopting the present disclosure, security may be enhanced.Type: GrantFiled: April 24, 2018Date of Patent: July 7, 2020Assignee: Tencent Technology (Shenzhen) Company LimitedInventors: Qiang Lu, Xuan Ye
-
Patent number: 10706196Abstract: A method for generating an FPGA implementation based on an FPGA design serving as an FPGA model and/or a hardware description, including the steps of synthesizing a net list from the FPGA design and generating the FPGA implementation from the net list. The method includes searching for a similar FPGA implementation, the step of generating the FPGA implementation from the net list takes place using the similar FPGA implementation, the method includes a step of generating a graph-based representation based on the FPGA design, and the step of searching for a similar FPGA implementation comprises comparing the graph-based representation of the FPGA design with a graph-based representation of the at least one similar FPGA implementation. A method for generating a bit stream based on an FPGA design is also provided, serving as an FPGA model and/or a hardware description.Type: GrantFiled: December 3, 2018Date of Patent: July 7, 2020Assignee: dSPACE digital signal processing and control engineering GmbHInventors: Dominik Lubeley, Heiko Kalte
-
Patent number: 10706959Abstract: Disclosed herein are various embodiments of computer-implemented methods and systems for parsing information from messages containing a standardized electronic document format, such as a continuity of care document (“CCD”), and for generating referrals and other documents using data parsed from the messages and/or standardized electronic document format. In some embodiments, a message containing a CCD may be received, the CCD and the message may be parsed to extract information (e.g., patient information), the patient information may be mapped into a document template, and an electronic document containing mapped referral parameters may be generated.Type: GrantFiled: December 21, 2016Date of Patent: July 7, 2020Assignee: The Advisory Board CompanyInventors: Russell Tevis, Marilyn Mamakai Agbeko, Louis Allen Parisi
-
Patent number: 10698869Abstract: A data structure management system includes a first database, a second database, and a processing engine. The first database includes a first file with a first term and a corresponding first metadata, and a second file with the first term and a corresponding second metadata. The processing engine extracts the first file and the second file from the first database in a first format. It links the first term with the first metadata from the first file and the second metadata from the second file. It transforms the extracted first file and second file from the first format into a second format while maintaining the link between the first term, the first metadata, and the second metadata. It then exports the transformed first file and second file to a second database in the second format with the link between the first term, the first metadata, and the second metadata intact.Type: GrantFiled: September 27, 2016Date of Patent: June 30, 2020Assignee: Bank of America CorporationInventors: Brad E. Romano, Shashi Thanikella
-
Patent number: 10691835Abstract: Implementations of the present specification include storing a data item in a consortium blockchain; generating a first data digest based on the stored data item; sending the first data digest to verification nodes to cryptographically signs it and stores the signed first data digest in a public blockchain; receiving a request to retrieve the stored data item; retrieving the requested data item from the consortium blockchain; generating a second data digest based on the retrieved data item; sending the second data digest to verification nodes so that each verification node signs the second data digest; receiving the signed second data digests from the plurality of verification nodes; retrieving the signed first data digests from the public blockchain; determining that the signed first data digests match the signed second data digests; and sending a response indicating the stored data item is unchanged to the request to retrieve the stored data item.Type: GrantFiled: February 3, 2020Date of Patent: June 23, 2020Assignee: Alibaba Group Holding LimitedInventors: Long Cheng, Yanpeng Li, Zhiyuan Feng
-
Patent number: 10693651Abstract: A process for completing transactions using biometric data, including include possible redundancies to ensure the accuracy of the transaction, and the system needed to perform the process. The process entails obtaining a biometric sample, extracting a biometric hash string from the biometric sample, converting the biometric hash string into an alpha numeric device, using the alpha numeric device to convey an identity, and equating the alpha numeric device to an identity with an account or membership.Type: GrantFiled: July 16, 2019Date of Patent: June 23, 2020Assignee: Sokken CorporationInventors: Paola Kennedy, James Kennedy
-
Patent number: 10693662Abstract: A method of securely serializing product units to provide a trusted basis for the recording of transaction events reflecting distribution actions within and between supply chain participant vendors. The method involves receiving vendor data including vendor public data descriptive of a given product unit, generating a unique serial number to be securely associated with the given product unit, the unique serial number including a public serial number and a unique nonce, generating a cryptographic hash of the unique serial number and the vendor public data, generating a cryptographic signature of the cryptographic hash using a predetermined private key, and returning marking data including the public serial number.Type: GrantFiled: February 22, 2018Date of Patent: June 23, 2020Assignee: IDLOGIQ INC.Inventors: Kelly D. X. Nguyen, Duc N. Pham
-
Patent number: 10686768Abstract: In a profile data delivery control apparatus, a storage unit stores therein a public key and a private key. A control unit obtains profile data including the identification information of a service provided using a server, and when the profile data satisfies a prescribed validity condition, attaches a signature to the profile data using the private key. The control unit embeds the public key to be used to verify the signature, in a client application that causes a client to perform an authentication process based on the profile data, and delivers the client application with the public key embedded.Type: GrantFiled: May 10, 2017Date of Patent: June 16, 2020Assignee: FUJITSU LIMITEDInventors: Junji Takagi, Ikuya Morikawa, Takao Ogura, Dai Yamamoto, Yumi Sakemi, Naoya Torii
-
Patent number: 10685061Abstract: Signals sensed from packaging of products are processed in a distributed reader and metadata routing system to provide metadata responses to mobile application programs. A routing system registers identifiers for different content ID schema. These identifiers are encoded packaging. Mobile device application programs are equipped with reader programs to extract identifiers from packaging. Metadata responses are identified by the ID provider of the content ID schema and extracted identifiers. The metadata routing system routes metadata responses to a requesting mobile device, supporting a variety of different ID providers and mobile device applications.Type: GrantFiled: February 12, 2018Date of Patent: June 16, 2020Assignee: Digimarc CorporationInventor: Kenneth L. Levy
-
Patent number: 10685119Abstract: A trusted co-processor can provide a hardware-based observation point into the operation of a host machine owned by a resource provider or other such entity. The co-processor can be installed via a peripheral card on a fast bus, such as a PCI bus, on the host machine. The co-processor can execute malware detection software, and can use this software to analyze data and/or code obtained from the relevant resources of the host machine. The trusted co-processor can notify the customer or another appropriate entity of the results of the scan, such that an appropriate action can be taken if malware is detected. The results of the scan can be trusted, as malware will be unable to falsify such a notification or modify the operation of the trusted co-processor.Type: GrantFiled: November 19, 2018Date of Patent: June 16, 2020Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Eric Jason Brandwine, Matthew John Campagna, Gregory Alan Rubin
-
Patent number: 10685323Abstract: Techniques facilitating blockchain ledgers of material spectral signatures for supply chain integrity management are provided. In one example, a computer-implemented method comprises validating, by a device operatively coupled to a processor, spectral signature data associated with a material, resulting in validated spectral signature data; and generating, by the device, a set of information corresponding to a transaction of the material in a blockchain associated with the material, wherein the set of information is related to the validated spectral signature data. In some embodiments, the computer-implemented method further comprises authenticating, by the device, a first party device associated with a first party to the transaction and a second party device associated with a second party to the transaction and including identities of the first party and the second party as indicated by the respective party devices in the set of information.Type: GrantFiled: December 11, 2017Date of Patent: June 16, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nicholas C. M. Fuller, Prabhakar Kudva, Deborah Ann Neumayer
-
Patent number: 10686835Abstract: The present disclosure provides a method for an authentication system to provide authentication information for a web page, comprising: receiving a request for authentication information from a web page; judging whether the web page is redirected to through a relevant search engine; judging whether the web page satisfies a condition of displaying the authentication information; and providing the authentication information to the web page satisfying the condition. By providing authentication information to a web site through a search engine, with the combination of the authentication system with the relevant search engine, the reliability and security of authentication information are enhanced. Besides, the user may autonomously edit and manage the displaying pattern of the authentication information, such that the authentication information may be displayed in real time on the web page.Type: GrantFiled: October 10, 2015Date of Patent: June 16, 2020Assignee: Baidu Online Network Technology (Beijing) Co., Ltd.Inventors: Jing Tan, Bingxin Chang, Yan Cui, Zhenping Zhang, Qi Zhou, Zheng Zhang, Changyang Dong, Xiaohang He, Kuan Shi
-
Patent number: 10686608Abstract: Secure, platform-independent code signing is disclosed. For example, a project file is associated with metadata, and a memory is communicatively coupled with one or more processors that execute to retrieve the metadata. A guest associated with a hosting platform of the project file is instantiated. A toolchain and a signature associated with the project file are loaded to the guest, where the toolchain is determined based on the metadata. The project file is built into an executable file. The executable file is signed with the signature, resulting in a certified executable.Type: GrantFiled: February 26, 2018Date of Patent: June 16, 2020Assignee: Red Hat, Inc.Inventors: Leonardo Rossetti, Leigh Griffin
-
Patent number: 10680825Abstract: A method for preventing counterfeiting of an object (e.g. paper) is described. The method comprises capturing an image of at least a portion of the object, wherein the portion of the object whose image is captured is at least partially transparent, and wherein the captured image includes features of the internal structure of the object (e.g. the texture of the paper resulting from the arrangement of fibres from which the paper is made). The method further comprises generating, based on the image, a code that encodes features of the internal structure of the object, and recording the code. Generating the code may comprise applying a filter to the image to obtain a filtered image, and processing the filtered image to obtain a binary code. The filter may be a Gabor filter, and processing the filtered image may comprise applying a Gray code to the filtered image. The method may further comprise encrypting the binary code, and recording the code may comprise recording the encrypted binary code.Type: GrantFiled: May 7, 2018Date of Patent: June 9, 2020Assignee: UNIVERSITY OF NEWCASTLE UPON TYNEInventors: Feng Hao, Ehsan Toreini, Siamak F. Shahandashti
-
Patent number: 10681045Abstract: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.Type: GrantFiled: August 26, 2016Date of Patent: June 9, 2020Assignee: China IWNCOMM Co., LTD.Inventors: Zhiqiang Du, Bianling Zhang, Qin Li, Zhenhai Huang, Qiang Zhang
-
Patent number: 10681772Abstract: Systems and methods are provided for facilitating wireless connections using a Bluetooth® low energy (BLE) beacon installed at a location. In particular, the provided systems and methods may facilitate wireless connections by providing credentials for accessing a wireless network at the location when a user checks in to the location using a user device in communication with the BLE beacon. The provided systems and methods may further facilitate wireless connections by establishing a Wi-Fi Direct connection with the user device to quickly provide content to the user device while at the location.Type: GrantFiled: October 1, 2018Date of Patent: June 9, 2020Assignee: PAYPAL, INC.Inventor: John Hastings Granbery
-
Patent number: 10681050Abstract: A method of executing an application in a direct launch mode includes receiving a user input to download an application from a remote server to a client computing device and to launch the application on the client computing device. Permissions requested by the application to utilize local resources of the client computing device during execution of the application by the client computing device are determined, and the determined permissions are compared to a list of predetermined permissions requiring modification of the execution of the application when the application is executed in a direct launch mode. The application is launched without additional input from the user, and the application is executed on the client computing device with at least one of the requested permissions not being granted in its entirety.Type: GrantFiled: August 29, 2018Date of Patent: June 9, 2020Assignee: GOOGLE LLCInventors: Thanh-Mai Diep, Ben Frederick Wells
-
Patent number: 10681031Abstract: A method, system and computer-usable medium for performing an adaptive security operation comprising: performing an authentication operation via a first device, the authentication operation analyzing an obligation performed by a first user; establishing access to a protected resource by the first device based upon the obligation performed by the first user; generating an attribute list comprising at least one attribute of the first device; analyzing a second device to determine whether the second device comprises an attribute corresponding to the at least one attribute of the first device; and, allowing access to the protected resource by the second device when the second device comprises the attribute corresponding to the at least one attribute of the first device.Type: GrantFiled: November 2, 2015Date of Patent: June 9, 2020Assignee: International Business Machines CorporationInventors: Pranam C. Sreedhar, Patrick R. Wardrop
-
Patent number: 10679539Abstract: Two-dimensional compositing that preserves the curvatures of non-flat surfaces is disclosed. In some embodiments, a mapping is associated with a two-dimensional rendering that maps a potentially variable portion of the two-dimensional rendering to a canvas. The mapping is generated from a three-dimensional model of the potentially variable portion of the two-dimensional rendering. The potentially variable portion of the two-dimensional rendering is dynamically modified according to the mapping to reflect content comprising the canvas or edits received with respect to the canvas.Type: GrantFiled: August 10, 2017Date of Patent: June 9, 2020Assignee: Outward, Inc.Inventors: Clarence Chui, Christopher Murphy
-
Patent number: 10675123Abstract: The present invention relates to an RFID tag enabled needle shield assembly that provides a sterile enclosure of an injection needle and that can be fixedly attached to a pre-filled syringe for administering an injection of medicament to a patient after removal of the needle shield assembly. The RFID tag is fixedly attached to the needle shield through co-molding or another form of permanent attachment. The present invention also relates to a method of tracking the life cycle of a medicament injection device where the RFID tag enabled needle shield assembly is attached to an injection needle that is connected to a syringe barrel that is part of an injection device. Data is written to or read from the RFID tag during the entire life cycle of the injection device, including assembly, packaging, storing, distribution and use.Type: GrantFiled: June 22, 2017Date of Patent: June 9, 2020Assignee: SHL MEDICAL AGInventors: Markus Bauss, Thomas Dietl
-
Patent number: 10679223Abstract: The present disclosure relates to the field of anti-counterfeit protection of products. Specifically, the disclosure is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking. In particular, without limitation, such composite security marking can be used in connection with or can form a component of a multi-component security system, in particular of an anti-counterfeit protection system, which is also disclosed herein as part of an overall solution for anti-counterfeit protection. The composite security marking comprises a physical unclonable function, PUF, and a representation of a digital signature or of a pointer indicating a location where said digital signature can be accessed. The digital signature digitally signs a hash value resulting from application of a predetermined cryptographic hash function to data representing a response generated by the PUF in reaction to a challenge of a predetermined challenge-response authentication scheme.Type: GrantFiled: December 15, 2017Date of Patent: June 9, 2020Assignee: Merck Patent GmbHInventors: Thomas Endress, Daniel Szabo, Fabian Wahl
-
Patent number: 10681202Abstract: Exemplary embodiments relate to techniques for transmitting ephemeral content messages. A sending client may establish an end-to-end encrypted session with possible recipients of the message, using a first decryption key during initial session setup. The client may send an ephemeral content message, including encrypted content and a second key, to the recipients through a server. The server may be unable to retrieve the encrypted content due to a lack of the second key. The server may filter a list of intended recipients, and may forward the ephemeral content message to the recipients on the filtered list. The recipients may retrieve the second key from the message, and use the first and second keys to decrypt the encrypted content. The sending client may change the second key each time the recipient list changes from the perspective of the sending client, as determined at the time the ephemeral content message is transmitted.Type: GrantFiled: September 15, 2017Date of Patent: June 9, 2020Assignee: WHATSAPP INC.Inventors: Randall Sarafa, Eugene Fooksman, Brian Acton, Jan Koum, Michael B. Donohue, Ehren Andrew Kret
-
Patent number: 10673893Abstract: A method and associated systems for isolating a source of an attack that originates from a shared computing environment. A computer-security system tags outgoing packets originating from within the shared computing environment in a tamper-proof manner in order to identify which tenant of the shared environment is the true source of each packet. If one of those tenants transmits malicious packets to an external recipient, either because the tenant has malicious intent or becomes infected with malware, the transmitted malicious packets' tags allow the recipient to determine which tenant is the source of the unwanted transmissions. The recipient may then block further communications from the problematic tenant without blocking communications from other tenants of the shared environment.Type: GrantFiled: August 31, 2016Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Juan G. Lara, Mark A. McGloin, Olgierd S. Pieczul, Ralph L. Topete
-
Patent number: 10671783Abstract: A method for generating an FPGA implementation based on an FPGA design serving as an FPGA model and/or a hardware description, including the steps of synthesizing a net list from the FPGA design and generating the FPGA implementation from the net list. The method includes searching for a similar FPGA implementation, the step of generating the FPGA implementation from the net list takes place using the similar FPGA implementation, the method includes a step of generating a graph-based representation based on the FPGA design, and the step of searching for a similar FPGA implementation comprises comparing the graph-based representation of the FPGA design with a graph-based representation of the at least one similar FPGA implementation. A method for generating a bit stream based on an FPGA design is also provided, serving as an FPGA model and/or a hardware description.Type: GrantFiled: December 3, 2018Date of Patent: June 2, 2020Assignee: dSPACE digital signal processing and control engineering GmbHInventors: Dominik Lubeley, Heiko Kalte
-
Patent number: 10673847Abstract: There is provided a system for creating a cryptographic non-fungible identity unique token (IUT), comprising code for: obtaining a private key linked to a public address of an electronic wallet, associated with a wallet address, obtaining a digital representation of a hashed genetic sequence of a user and an associated wallet address of the electronic wallet, storing in the cryptographic non-fungible IUT, an IUT identifier, the IUT identifier is an outcome of hashing a subset of the hashed digital representation and a unique password, storing the IUT in a genetic sequence record stored in a block of a blockchain dataset, wherein the genetic sequence record is associated with the IUT, the IUT is associated to the wallet address, wherein the user is authenticated by a match between a computed value of a password and the wallet address provided by the user, and the IUT identifier stored on the blockchain.Type: GrantFiled: August 28, 2018Date of Patent: June 2, 2020Inventor: Ofer A. Lidsky
-
Patent number: 10666639Abstract: Authenticating a networking appliance attempting to attach to a network includes receiving at least one value associated with an identity of the networking appliance; receiving a certificate signing request (CSR) from the networking appliance, wherein the CSR comprises credential data associated with the identity of the networking appliance; and generating an appliance certificate based on the credential data and a certificate authority (CA) certificate associated with the computer. The method also includes returning the appliance certificate to the networking appliance; receiving a request from the networking appliance to attach to the network; and authenticating the identity of the networking appliance based on both a) the at least one value associated with the identity of the networking appliance; and b) the appliance certificate.Type: GrantFiled: May 17, 2017Date of Patent: May 26, 2020Assignee: Avaya, Inc.Inventors: Seung Bong Han, Wu Miao, Sanket Ravindra Tandulwadkar, Sunil Menon, Carl Keene
-
Patent number: 10666423Abstract: A blockchain database employs cryptography and other methods to implement and protect a distributed, publicly-amendable ledger. Transactions in a blockchain ledger are intentionally anonymous; however, there are cases where it would be useful to be able to verify or disprove a claim of identity of a contributor of a blockchain transaction. Biometrics can be used to link a human being to digital information using their unique physical traits in a way that is analogous to a handwritten or digital signature. An exemplary embodiment disclosed herein describes methods to create and store data in a blockchain transaction such that it can be used in the future to biometrically verify the identity of the contributor of the transaction, and use encoded biometric data to determine whether the blockchain transaction was created or not created by a particular individual.Type: GrantFiled: September 8, 2016Date of Patent: May 26, 2020Assignee: AWARE, INC.Inventor: David Benini
-
Patent number: 10667111Abstract: In embodiments of virtual addressing for mesh networks, a node in a mesh network publishes packets and/or subscribes to packets using a virtual address that is derived from a unique identifier. The unique identifier has a larger address space than the destination address field of the packet. The unique identifier and an application key are hashed to elide the unique identifier from the destination address that is transmitted in the packet over the mesh network. A node receiving the packet can determine that the address is a virtual address, and disambiguate the destination address to determine that the virtual address corresponds to a unique identifier known to the receiving node.Type: GrantFiled: January 25, 2019Date of Patent: May 26, 2020Assignee: Google LLCInventor: Martin A. Turon
-
Patent number: 10667135Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.Type: GrantFiled: January 11, 2018Date of Patent: May 26, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman