Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
-
Patent number: 10044509Abstract: Systems and methods for securely uploading a data file are presented. A client generates a symmetric encryption key and an initialization vector; encrypts the data file using the symmetric encryption key and the initialization vector; places an upload request with a server to upload the encrypted data file to a first storage device; receives from the server via the communications network, asymmetric encryption components, a signed data file upload URL accessible by the communications network, and a signed key data upload URL accessible by the communications network; encrypts, using the asymmetric encryption components, the symmetric encryption key and the initialization vector, thereby creating encrypted key information; sends, via the signed data file upload URL, the encrypted data file to the first storage device; and sends, via the signed key data upload URL, the encrypted key information to a second storage device.Type: GrantFiled: August 14, 2017Date of Patent: August 7, 2018Assignee: FMR LLCInventor: Jake Kirshner
-
Patent number: 10037430Abstract: Methods and systems are provided for controlling the execution of business logic that allows features to be turned on or off at run time for each particular user entity of a plurality of user entities. Prior to run time a library is configured based on an administrator's interaction with an interactive control panel at a computer of the system. For each particular user entity and for each particular code block of an object that comprises a plurality of code blocks each corresponding to a particular feature and having an enabling predicate associated with that particular code block, the library can be configured by defining an on/off state for each feature of that particular code block via an enabling predicate associated with that particular feature. The library can then be cached in a custom settings cache of the system for use at run time.Type: GrantFiled: October 27, 2015Date of Patent: July 31, 2018Assignee: salesforce.com, inc.Inventors: Samarpan Jain, Reuben Comel
-
Patent number: 10033699Abstract: A first DNS server receives, from a client device, a DNS query for a domain name and transmits, to a second DNS server, the DNS query for the domain name. The first DNS server receives, from the second DNS server, an answer to the DNS query that is unsigned. The first DNS server signs the received answer to the DNS query and transmits, to the client device, the signed DNS answer.Type: GrantFiled: May 6, 2016Date of Patent: July 24, 2018Assignee: CLOUDFLARE, INC.Inventors: Nicholas Thomas Sullivan, Olafur Gudmundsson, Filippo Valsorda
-
Patent number: 10033705Abstract: A process for the processing of user inquiries in a data network saves user data anonymized at first in an independent process with an independent third-party vendor, which can then be accessed by the use of several incremental encryption and anonymization routines in such a way that, on the one hand the provider is not involved in the data exchange and in other respects even the independent third-party vendor does not have access to the user data at any time, albeit with the result that anonymized customer data, especially information about age, sex and partial postal code, can be kept ready in a database for the mobile end device being used.Type: GrantFiled: December 3, 2015Date of Patent: July 24, 2018Assignee: zeotap GmbHInventors: Daniel Heer, Jannik Podlesny
-
Patent number: 10027715Abstract: An electronic device for encrypting content and a method thereof are provided. First and second data segments of a content file may be received. The first data segment may be encrypted on the basis of a policy of a content provider providing the content file. The second data segment may be encrypted using an encryption scheme that differs from that used for the first data segment. The second encryption scheme may utilized a different key and/or algorithm than that used in the first encryption scheme.Type: GrantFiled: May 20, 2016Date of Patent: July 17, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Bong-Jun Kim, Se-Hoon Kim
-
Patent number: 10017067Abstract: The present invention relates to a method for ensuring functional reliability of components (5), which participate in a charging operation, of the electromobility technology of an actuator (4) which is formed in particular as an electric vehicle or electric charging station, in connection with the charging operation or during a test, wherein at least one of the participating components (5) comprises a module (6) for the implementation of security functions in which a first assigned certificate of a technical test station (3) concerning a means for carrying out a self-diagnosis of the component (5) and a second assigned certificate (11) of a manufacturer (2) are stored, characterized by the following steps to be carried out in the participating components (5): (1a) activating a self-diagnosis, (1b) providing a result of the self-diagnosis of the component (5) with a signature by means of the second assigned certificate (11) of the manufacturer (2), (1c) transmitting to the technical test station (3) the resultType: GrantFiled: August 9, 2012Date of Patent: July 10, 2018Assignee: TECHNISCHE UNIVERSITAT DORTMUNDInventors: Sven Gröning, Jens Schmutzler, Christian Wietfeld
-
Patent number: 10009334Abstract: A system and method for exchanging data among partitions of a storage device is disclosed. For example, data stored in a first partition is exchanged with an application included in the first partition or with a second application included in a second partition. In one embodiment, the second application is associated with a global certificate while the first application is associated with a different platform certificate. A verification module included in the first partition receives a request for data and determines if the request for data is received from the first application. If the request for data is not received from the first application, the verification module determines whether the request is received from the second application and whether the global certificate is an authorized certificate. For example, the verification module determines whether the global certificate is included in a listing of authorized certificates.Type: GrantFiled: November 7, 2016Date of Patent: June 26, 2018Assignee: Google Technology Holdings LLCInventors: Rashmi Chaudhury, Srinivas Attaluri, Fangge Liu, Lakshmi Thyagarajan
-
Patent number: 10007796Abstract: A device to apply a digital fingerprint to a digital signal comprises a means of intercepting or acquiring a signal, a storage element and a processor for executing computer implemented program code components in the storage element to effect the methods. The methods include transforming a plurality of signal samples onto a discrete orthonormal basis and ranking the transformed samples according to their magnitude. The n largest principal components of the ranked transformed samples are optionally permuted to generate a re-ordered set of principal components, which are then altered by a marking angle. The marked principal components and unmarked non-principal components are converted and combined and applying an inverse of the transform function to the combined principal and non-principal components to generate a fingerprinted digital signal. Methods to prepare the signal for marking, recover the digital fingerprint and verify the distributor and/or recipients of the signal are also disclosed.Type: GrantFiled: November 9, 2012Date of Patent: June 26, 2018Assignee: Optimark, L.L.C.Inventors: Oscar Moreno De Ayala, Anatol Zygmunt Tirkel
-
Patent number: 10007554Abstract: Provided herein are systems, methods, and software for implementing information management applications. In an implementation, at least a portion of an information management application is embodied in program instructions that include various task modules and a scheduler module. In some implementations the program instructions are written in accordance with a single threaded programming language, such as JavaScript or any other suitable single threaded language. When executed, each task module returns control to the scheduler module upon completing. The scheduler module identifies to which of the plurality of task modules to grant control based at least in part on a relevance of each task module to a user interaction.Type: GrantFiled: June 14, 2013Date of Patent: June 26, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Gautam Bhakar, Selvaraj Nalliah
-
Patent number: 10002362Abstract: The present invention relates to the field of anti-counterfeit protection of products. Specifically, the invention is directed to a composite security marking for a physical object, in particular to an anti-counterfeit product marking. In particular, without limitation, such composite security marking can be used in connection with or can form a component of a multi-component security system, in particular of an anti-counterfeit protection system, which is also disclosed herein as part of an overall solution for anti-counterfeit protection. The composite security marking comprises a physical unclonable function, PUF, and a representation of a digital signature or of a pointer indicating a location where said digital signature can be accessed. The digital signature digitally signs a hash value resulting from application of a predetermined cryptographic hash function to data representing a response generated by the PUF in reaction to a challenge of a predetermined challenge-response authentication scheme.Type: GrantFiled: February 9, 2017Date of Patent: June 19, 2018Assignee: Merck Patent GmbHInventors: Thomas Endress, Daniel Szabo, Fabian Wahl
-
Patent number: 10003964Abstract: A method for exchanging hidden secret messages includes generating a masking message comprising a quick phrase on a sender's mobile device; receiving a secret message and associating it with the masking message; encrypting the masking message; encoding the secret message using invisible symbols and embedding it into the masking message; sending the masking message to a recipient; receiving a response masking message from a recipient's mobile device; copying the response masking message and detecting the secret message by checking a clipboard content; decrypting the response masking message; and decoding the secret message and rendering it on a sender's keyboard screen. The secret message contains an invisible marker inserted after a first symbol of the masking message for detection and decoding.Type: GrantFiled: March 26, 2016Date of Patent: June 19, 2018Assignee: ACRONIS INTERNATIONAL GMBHInventors: Sergey Blintsov, Vitaly Halenchyk, Stanislav S. Protasov, Serguei M. Beloussov, Kirill Davydov
-
Patent number: 9996891Abstract: A digital watermarking system and method are disclosed. In one respect, the disclosed digital watermarking includes generating an extracted signal by applying a watermark extractor to an original image, generating a mixed signal by mixing the first signal with a periodic watermark signal using a local weighting factor for the periodic watermark signal that attenuates a strength of the watermark signal in proportion to a pixel luminance level, and replacing the extracted signal in the original image with the mixed signal to generate a marked image, wherein the watermark signal is extractable from the marked image using the watermark extractor.Type: GrantFiled: May 3, 2016Date of Patent: June 12, 2018Assignee: Deluxe Media Inc.Inventors: Ruopeng Wang, Joel Bigley
-
Patent number: 9998449Abstract: A method, an apparatus, and a computer program product for wireless communication are provided. A method includes transmitting a request to a serving network with a nonce and a signature request directed to a network function of the serving network, receiving a response to the request from the serving network, and authenticating the serving network based on the signature of the network function. The nonce may provide replay protection. The response may include a signature of the network function. The request sent to the serving network may include a radio resource control (RRC) message or a tracking area update (TAU) request. The serving network may be authenticated using a trusted third party to verify a certificate associated with the serving network.Type: GrantFiled: March 31, 2015Date of Patent: June 12, 2018Assignee: QUALCOMM IncorporatedInventors: Soo Bum Lee, Gavin Horn, Anand Palanigounder
-
Patent number: 9992174Abstract: Systems for forensic steganography. A server is interfaced with storage facilities that store an object accessible by two or more users, each of which users are associated with respective profiles comprising one or more user-specific attributes. A method detects a user request to view the object. User-specific attributes are encoded into a steganographic message, which is formatted for saving into one or more locations in the object, thus generating a protected object. The protected object is delivered to the requesting user. Encoding, application and formatting techniques are configured to make the steganographic message undetectable by human viewing of the protected object. A web crawler or other policing technique can detect misappropriation in the form of unauthorized dissemination by detecting the presence of the encoded steganographic message embedded in the protected object.Type: GrantFiled: November 11, 2015Date of Patent: June 5, 2018Assignee: Box, Inc.Inventors: Albert Fung Wu, Nazar Andrienko
-
Patent number: 9986280Abstract: A reference verification module identifies content items stored in a content repository that include at least a portion of the content included in a reference content item provided by an entity. The reference verification module classifies the reference content item based on the uneven distribution of the percentages of the identified content items that include each of the claimed portions. Specifically, if the average difference between the percentage of content items that include a given portion and the percentages of the remaining content items is above a threshold, then the reference verification module classifies the reference content item as having a higher than threshold likelihood of including third party content.Type: GrantFiled: April 11, 2015Date of Patent: May 29, 2018Assignee: Google LLCInventor: Krystof Hoder
-
Patent number: 9985788Abstract: The invention provides a method and apparatus for the secure electronic signing of electronic documents and data. The method comprises the steps of: obtaining a first digital representation in a high level first data format of the set of application data; generating a second digital representation in a low level second data format of the application data whereby the low level second data format is different from the high level first data format; presenting an analog representation of the set of application data to a user, whereby the second digital representation is a precise and accurate representation of said analog representation; obtaining an indication whether the user approves the analog representation for signing; if the indication indicates that the user approves the analog representation for signing, generating the first digital signature over the second digital representation using a first signature key associated with the user.Type: GrantFiled: December 30, 2013Date of Patent: May 29, 2018Assignee: VASCO Data Security, Inc.Inventor: Harm Braams
-
Patent number: 9979551Abstract: In one embodiment, it is proposed a signing method delivering a partial signature associated with a message, said partial signature being used in a threshold signing method, the signing method being executed on an electronic device. Such signing method is remarkable in that it comprises signing a hash of said message with a one-time linearly homomorphic structure preserving signature method with a partial secret key, said partial secret key being obtained from an output of a secret sharing scheme, and said signing delivering said partial signature associated with said message.Type: GrantFiled: February 10, 2015Date of Patent: May 22, 2018Assignee: Thomson LicensingInventors: Marc Joye, Benoit Libert
-
Patent number: 9979549Abstract: There is provided an information processing apparatus including a key selection section configured to select one out of a plurality of different secret keys, in a public key authentication scheme or a digital signature scheme in which each of the plurality of secret keys exists for one public key registered in a verifier, and a process execution section configured to execute, by using the secret key selected by the key selection section, an authentication process with the verifier by the public key authentication scheme or a digital signature generation process to the verifier by the digital signature scheme.Type: GrantFiled: August 1, 2013Date of Patent: May 22, 2018Assignee: Sony CorporationInventors: Harunaga Hiwatari, Koichi Sakumoto, Masanobu Katagi, Kazuya Kamio
-
Patent number: 9973584Abstract: A method, apparatus and computer program product are provided for implementing a location-based records access system. An example of the method includes providing, in a browser sandbox environment executing on a processor, a client interface for interacting with a records server, receiving an indication of an occurrence of an event within the client interface, the indication comprising electronic data sufficient to identify a particular protocol handler application, executing the particular protocol handler application outside of the browser sandbox environment, wherein executing the particular protocol handler application results in execution of a listener, performing a call, by the client interface, to the listener to request a device identifier from the listener, receiving, by the client interface, the device identifier from the listener; and transmitting the device identifier to the records server.Type: GrantFiled: October 30, 2015Date of Patent: May 15, 2018Assignee: HYLAND SOFTWARE, INC.Inventors: Yana Poliashenko, Alan R. Shealy
-
Patent number: 9959428Abstract: A method of verifying a data packet by a data consumer may be provided. The method may include authenticating a first signature in a signature stack of a data packet, where the first signature corresponds to a hashed first content in a content stack, and the first signature is generated at a first network location. The method may additionally include authenticating a second signature in the signature stack of the data packet, where the second signature corresponds to second content in the content stack, and the second signature is generated at a second network location. The second content may include a processed version of the first content and may be generated at the second network location.Type: GrantFiled: February 5, 2016Date of Patent: May 1, 2018Assignee: FUJITSU LIMITEDInventors: Liguang Xie, Lei Liu, Akira Ito
-
Patent number: 9959419Abstract: A device to apply a digital fingerprint to a digital signal comprises a means of intercepting or acquiring a signal, a storage element and a processor for executing computer implemented program code components in the storage element to effect the methods. The methods include transforming a plurality of signal samples onto a discrete orthonormal basis and ranking the transformed samples according to their magnitude. The n largest principal components of the ranked transformed samples are optionally permuted to generate a re-ordered set of principal components, which are then altered by a marking angle. The marked principal components and unmarked non-principal components are converted and combined and applying an inverse of the transform function to the combined principal and non-principal components to generate a fingerprinted digital signal. Methods to prepare the signal for marking, recover the digital fingerprint and verify the distributor and/or recipients of the signal are also disclosed.Type: GrantFiled: November 9, 2012Date of Patent: May 1, 2018Assignee: Optimark, L.L.C.Inventors: Oscar Moreno De Ayala, Anatol Zygmunt Tirkel
-
Patent number: 9961071Abstract: In an example embodiment, a virtual private network (VPN) connection is established between a client device and an authentication service. Then a request is received from a third-party application on the client device, with the request being for a third-party service. A log-in page is requested from the third-party service, with the log-in page including one or more log-in fields usable to enter credential information. The log-in page is then modified to hide the one or more log-in fields. Credentials corresponding to a user of the client device and also corresponding to the third-party service are then obtained. The modified log-in page is sent to the client device via the VPN connection. A log-in submission is received from the third-party application. The credentials corresponding to the user and to the third-party service are sent to the third-party service to log-in the user to the third-party service.Type: GrantFiled: July 26, 2016Date of Patent: May 1, 2018Assignee: Intermedia.net, Inc.Inventors: Richard John Walters, Simon David Knott
-
Patent number: 9954991Abstract: A status notification method for use in a terminal, includes: acquiring usage information of a target apparatus, the usage information including at least each usage duration of the target apparatus; calculating current consumption of the target apparatus according to the usage information of the target apparatus; and generating an alert regarding a current status of the target apparatus after the current consumption of the target apparatus reaches a preset consumption alerting threshold.Type: GrantFiled: November 30, 2015Date of Patent: April 24, 2018Assignee: Xiaomi Inc.Inventors: Yang Wang, Qiang Fu, Hao Chen
-
Patent number: 9954871Abstract: A method of protecting a network-connected device from an advanced persistent threat cyber-attack is provided. A network-connected device having an operating system, a memory, memory instructions holding executable program instructions, and being communication enabled, is protected from an advanced persistent threat by steps of detecting the advanced persistent threat due to the presence of rogue software in the memory instructions of the network-connected device and locking-down the communications of the network-connected device. The network-connected device may be provided with low-level routines that are correlated to the memory instructions. Detecting the advanced persistent threat may be comprised of authenticating the memory instructions of the network-connected device by using the installed low-level routines.Type: GrantFiled: May 6, 2015Date of Patent: April 24, 2018Assignee: Hand Held Products, Inc.Inventors: Robert Michael Hussey, Kai J. Figwer
-
Patent number: 9949132Abstract: A method and device for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC) device are provided. The method includes generating a record by setting a first field to ‘0’ and setting a second field to a predefined value, wherein the record indicates a beginning of at least one record to be secured in the NDEF message; and placing the record in the NDEF message, wherein, at least one record preceding the record is unsecured and at least one record following the record is secured.Type: GrantFiled: June 15, 2015Date of Patent: April 17, 2018Assignee: Samsung Electronics Co., LtdInventors: Thenmozhi Arunan, Eun-Tae Won
-
Patent number: 9948453Abstract: A threshold encryption system comprising a sender device configured to generate ciphertexts and at least one entity device configured to perform partial decryption of ciphertexts. The system is based on Cramer-Shoup encryption systems and use linearly homomorphic signatures as publicly verifiable proofs of ciphertext validity.Type: GrantFiled: April 29, 2014Date of Patent: April 17, 2018Assignee: Thomson LicensingInventors: Marc Joye, Benoit Libert
-
Patent number: 9946474Abstract: A method of storing an amount of data D in association with a device, the method comprising: obtaining a characteristic C of the device; generating error correction data R for the characteristic C, the error correction data R enabling correction of up to a predetermined number of errors in a version of the characteristic C; combining the characteristic C with the amount of data D and an authentication key K to generate storage data P, wherein said combining is arranged so that the amount of data D and the authentication key K are obtainable using the characteristic C and the storage data P; generating a signature using a signature key, the signature being a digital signature of a quantity of data comprising the storage data P, the amount of data D and the authentication key K, wherein the signature key corresponds to a verification key accessible by the device; generating an authentication code for the error correction data R using the authentication key K, wherein the authenticity of the error correction datType: GrantFiled: March 27, 2013Date of Patent: April 17, 2018Assignee: IRDETO B.V.Inventor: Jeroen Doumen
-
Patent number: 9946748Abstract: According to one embodiment of the present invention, a method of transferring filters for operations in a distributed system comprises generating at each source node a first filter of a first size. The first filter indicates elements of objects that need not be processed for an operation. Each source node generates one more second filters of a second size less than the first size. Each generated second filter is based on a prior generated filter with each location representing a plurality of locations from the prior generated filter. A second filter is transferred from each source node to each of destination node. The elements of the objects to remove for the operation are determined based on the transferred second filters. Embodiments of the present invention further include a system and computer program product for transferring filters in a distributed system in substantially the same manners described above.Type: GrantFiled: March 11, 2015Date of Patent: April 17, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald J. Barber, Naresh K. Chainani, Kiran K. Chinta, Ian R. Finlay, Vijayshankar Raman, Liping Zhang
-
Patent number: 9948636Abstract: Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network. The host computing device is further configured to, in response, receive a pairing certificate from the remote pairing service, the pairing certificate being encrypted via a private key of the remote pairing service, and complete the mutual authentication with the accessory device using the pairing certificate from the remote pairing service.Type: GrantFiled: April 24, 2017Date of Patent: April 17, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Harish Krishnamurthy, Ming Zhu, Kurt Torben Nielsen, Matthew Morris
-
Patent number: 9940356Abstract: According to one embodiment of the present invention, a method of transferring filters for operations in a distributed system comprises generating at each source node a first filter of a first size. The first filter indicates elements of objects that need not be processed for an operation. Each source node generates one more second filters of a second size less than the first size. Each generated second filter is based on a prior generated filter with each location representing a plurality of locations from the prior generated filter. A second filter is transferred from each source node to each of destination node. The elements of the objects to remove for the operation are determined based on the transferred second filters. Embodiments of the present invention further include a system and computer program product for transferring filters in a distributed system in substantially the same manners described above.Type: GrantFiled: July 31, 2014Date of Patent: April 10, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald J. Barber, Naresh K. Chainani, Kiran K. Chinta, Ian R. Finlay, Vijayshankar Raman, Liping Zhang
-
Patent number: 9942831Abstract: A base station and wireless device, as well as corresponding methods, for Information Centric Networking (ICN) based communications with radio bearers, to provide a means for using ICN bearers in parallel with standard Packet Data Network (PDN) bearers.Type: GrantFiled: February 9, 2015Date of Patent: April 10, 2018Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Kim Laraqui, Sándor Albrecht, Suresh Krishnan
-
Patent number: 9935941Abstract: A method for gathering and verifying customer information via SMS and in-person representatives are provided. The method may include a business correspondent receiving and verifying customer information in-person; sending the customer information to a data center, via a business correspondent application (BC app), to create a customer account; sending the account information to the customer and the BC app; verifying the account information with the customer; and syncing the BC app with the data center.Type: GrantFiled: September 16, 2015Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Ajay Chebbi, Girish Dhanakshirur, Chethan Kumar N. Settipalli
-
Patent number: 9929917Abstract: Embodiments of the invention are directed to systems, methods, and computer program products for active, real-time control of a plurality of devices and associated applications for monitoring and completing one or more targets through an interactive integrated interface. In this regard, the system determines a plurality of devices and applications associated with the user. The system then determines one or more targets of the user based on analyzing device information, application information and user information. The one or more targets are configured to be completed by modifying control factors associated with the devices. The system may then initiate a display of the targets on the interactive integrated interface and enable the user to select suitable targets. Following the selection of targets by the user, the system configures applications and devices associated with the targets to provide information and feedback associated with the selected targets.Type: GrantFiled: October 30, 2015Date of Patent: March 27, 2018Assignee: BANK OF AMERICA CORPORATIONInventors: Alicia C. Jones-McFadden, Caitlin Chrisman Bullock, Matthew Hsieh, Jaydev Ajit Kumar, Yaakov Lyubetsky, Yun Suk Paik, Heng Xu, Jimin Zheng
-
Patent number: 9923929Abstract: The described technology provides a capability to perform in-session updates to entitlements associated with a user's access to content served by a web application. The content may be from one or more external servers. The technology provides for automatically detecting changes to entitlements, and without requiring a user of an active session to initiate a new session, updating entitlement data in a memory such that subsequent requests for data made by the client in the same active session are serviced using the updated entitlements.Type: GrantFiled: November 17, 2016Date of Patent: March 20, 2018Assignee: NASDAQ, INC.Inventor: Vladimir Mitevski
-
Patent number: 9917829Abstract: A system for providing a conditional single sign-on, wherein during a first access sequence a connection broker provides a first random number to a device. During a subsequent access period, the device provides encrypted user credentials to the connection broker comprising credentials of a user encrypted by a key K. The key K comprises the first random number combined with a second random number. The device further provides an encryption of the second random number to the connection broker, the second random number encrypted with a first public key held by the computer resource. The connection broker decrypts the first random number and retransmits the encryption of the second random number and the encrypted user credentials to the computing resource.Type: GrantFiled: September 23, 2016Date of Patent: March 13, 2018Assignee: Teradici CorporationInventor: William John Dall
-
Patent number: 9917825Abstract: Methods and systems for verifying a user's identity on a computing device using two-factor authentication are described. More particularly, the system utilizes a personal identification number input by a user, together with one or more of a secure browsing feature, a device fingerprint, and a token generator to authenticate the user on the computer.Type: GrantFiled: January 11, 2016Date of Patent: March 13, 2018Assignee: United Services Automobile Association (USAA)Inventors: Debra Casillas, Richard Andrew Davey, Michael Frank Morris, Maland Keith Mortensen, John David Row, Thomas Buckingham
-
Patent number: 9916445Abstract: For a plurality of events, event stage information is stored which describes an event observed by an information system when an attack against the information system is underway, a pre-event stage, and a post-event stage. Observed event notice information is received which notifies an observed event observed by the information system. Event stage information is searched for which describes the observed event notified by the observed event notice information. Event stage information is searched for which describes a post-event stage coinciding with a pre-event stage of the event stage information searched for, or a pre-event stage coinciding with a post-event stage of the event stage information searched for.Type: GrantFiled: February 26, 2014Date of Patent: March 13, 2018Assignee: Mitsubishi Electric CorporationInventors: Hideaki Ijiro, Kiyoto Kawauchi
-
Patent number: 9917747Abstract: A system and method performs packet analysis in a distributed communication network. Packet processors tap into data packet flow at various points in the distributed network. The packet processors processes data packets from the packet flow and select a set of packets using a packet signature function and packet selection criteria. A packet record is created by each packet processor and sent to other packet processors in the distributed network. The other packet processors add data to the packet record for the same set of packets. The packet records are analyzed to gather comparative data to identify problems in the network.Type: GrantFiled: September 29, 2015Date of Patent: March 13, 2018Assignee: International Business Machines CorporationInventors: William J. Armstrong, David R. Engebretsen
-
Patent number: 9912660Abstract: An apparatus comprising: a processor; and a memory including computer program code, the memory and the computer program code configured, with the processor, to cause the apparatus to perform at least the following: compare received biometric face vectors, wherein each received biometric face vector is received from a respective electronic device of a plurality of electronic devices and comprises one or more biometric face values determined from a respective image of a person captured by the corresponding electronic device; and provide for pairing authentication of the plurality of electronic devices if the comparison meets a predetermined similarity criterion.Type: GrantFiled: July 18, 2013Date of Patent: March 6, 2018Assignee: Nokia Technologies OyInventors: Kongqiao Wang, Jiangwei Li, Yingfei Liu
-
Patent number: 9906372Abstract: An authentication device may be provided. The authentication device may include a memory configured to store: a first public key; and first data signed using a first private key corresponding to the first public key, the signed data including a second public key. The authentication device may further include a first verification circuit configured to verify the first data using the first public key; and a second verification circuit configured to verify second data using the second public key, the second data signed using a second private key corresponding to the second public key.Type: GrantFiled: June 3, 2013Date of Patent: February 27, 2018Assignee: INTEL DEUTSCHLAND GMBHInventors: Thomas Rosted Jensen, Bo Bjerrum
-
Patent number: 9906522Abstract: We propose a method that uses formatting options of Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, and Character Effects as a part of electronic signature.Type: GrantFiled: July 28, 2016Date of Patent: February 27, 2018Inventor: Dhavalkumar Shah
-
Patent number: 9906555Abstract: Embodiments of the disclosure describe systems and methods for selecting a first group of users, which is selected to receive simulated phishing emails as part of a simulated phishing campaign, and adding users to a second group of users based upon those selected users interacting with a simulated phishing email that is part of a simulated phishing campaign; tracking the completion of remediation training related to phishing emails by users in the second group of users and receiving one or more indications that the users in the second group of users have completed remedial training; and automatically adding users, who are members of the second user group, to the first user group, to a third user group, or to a predetermined user group responsive to the one or more indications that the users in the second group of users have completed remedial training.Type: GrantFiled: August 11, 2017Date of Patent: February 27, 2018Assignee: KNOWBE4, INC.Inventors: Greg Kras, Alin Irimie
-
Patent number: 9900309Abstract: The described method is analogous to handling credentials in the physical world where agents and notary publics affix their attestations using their notary seals. The described method enables a person having a personal identity device and an electronic credential (e-credential) to create a digital seal to affix the owner's identity and attestation to an electronic artifact such as a transaction, document, or e-credential. The e-credential owner cannot repudiate having affixed the attestation to the electronic artifact. This enables other parties, including the e-credential owner, to inspect the digital seal affixed to the electronic artifact to identify the owner and the electronic artifact, verify the digital seal, and thereby obtain objective evidence that the attestation is truthful.Type: GrantFiled: April 26, 2017Date of Patent: February 20, 2018Inventor: Kalman Csaba Toth
-
Patent number: 9900311Abstract: A device for reading a message includes a reader to read biometric data of a holder of the medium and a scanner to capture, on a medium, an encoded message having elementary message units. The message includes a noise that consists of marking defects of the message on the medium which are random and unpredictable for each elementary message unit. A noise reducer to reduce the noise of the captured message based on biometric data. A decoder to decode at least one portion of the message in which the noise has been at least partially removed. Preferably, the decoder utilizes redundancies of the message with the noise removed to determine at least one portion of the encoded message.Type: GrantFiled: December 2, 2014Date of Patent: February 20, 2018Assignee: ADVANCED TRACK AND TRACEInventors: Jean-Pierre Massicot, Alain Foucou, Zbigniew Sagan
-
Patent number: 9900302Abstract: Various embodiments concern mechanisms for facilitating communication between network-accessible platforms for developing, hosting, or running hybrid applications that utilize resources hosted across multiple platforms. Hybrid applications cause messages or “calls” to be passed between the platforms that must be authenticated. For example, when a call is placed by a Heroku platform to a Force.com platform, the call must be authenticated for security purposes. If Heroku has not already been authenticated when the call is submitted, an authentication process is invoked. An event listener can be used to register details regarding the initial callout task, and then register or “fire” an event when the authentication process is successfully completed. Registration of the initial callout task completely separates the authentication process from the resource being invoked. Requests can be completed without requiring further user input using at least some of the details registered by the event listener.Type: GrantFiled: June 22, 2016Date of Patent: February 20, 2018Assignee: FinancialForce.com, inc.Inventor: Matthew D. Wood
-
Patent number: 9898792Abstract: The present invention relates generally to digital watermarking. One aspect of the disclosure includes a method comprising: obtaining data representing imagery; using one or more configured processors, analyzing a plurality of portions of the data to detect a watermark orientation component, said analyzing employing a match filter, in which the match filter yields a correlation value for each of the plurality of portions; determining a first portion from the plurality of portions that comprises a correlation value meeting a predetermined value; and directing a watermark decoder at the first portion to decode a plural-bit watermark payload, in which the watermark decoder produces a watermark signature for the first portion, and in which the watermark decoder searches a plurality of areas at or around the first portion to decode the plural-bit watermark payload. Of course, many other aspects and disclosure are provided in this patent document.Type: GrantFiled: August 9, 2016Date of Patent: February 20, 2018Assignee: Digimarc CorporationInventors: Osama M. Alattar, Adnan M. Alattar
-
Patent number: 9900300Abstract: In an approach for protecting against use of clones of electronic devices, a first sequence value is initialized on the server and an equal second sequence value is initialized on an electronic device. In response to a first login request to the server from a user operating the electronic device, the first and second sequence values are compared. If the values are equal, processing of the login process continues. Otherwise, the login request is rejected. If the login is successful, a next value is computed for the first and second sequence values, and the next first and second sequence values are stored on the server and on the electronic device, respectively.Type: GrantFiled: April 22, 2015Date of Patent: February 20, 2018Assignee: IONU Security, Inc.Inventors: David W. Bennett, Alan M. Frost
-
Patent number: 9894416Abstract: A video receiving apparatus includes a receiver, a first display, an extractor, an information forming controller, a number-of-viewer detector, a communicator, and a display controller, leading to appropriate display of configuration information and associated information of a video content. The extractor extracts a partial content from the video content. The information forming controller forms the configuration information from the partial content. The number-of-viewer detector detects the number of viewers present within a predetermined area. The communicator receives an identifier transmitted from a mobile terminal having a second display. The display controller can selectively display the configuration information on the second display of the mobile terminal identified by the identifier, and displays the configuration information on at least one of the first and second displays based on the number of the viewers and the number of the identifiers.Type: GrantFiled: May 27, 2014Date of Patent: February 13, 2018Assignee: Panasonic Intellectual Property Management Co., Ltd.Inventors: Masataka Ejima, Kenji Takita, Mitsuhiro Mori, Hiroyuki Yoshida
-
Patent number: 9893888Abstract: The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step.Type: GrantFiled: January 11, 2016Date of Patent: February 13, 2018Assignee: WISTARIA TRADING LTDInventors: Scott A. Moskowitz, Mike W. Berry
-
Patent number: 9892285Abstract: An accessory, an electronic apparatus and a system for accessory certification is disclosed. The accessory comprises an encryption chip, with the encryption chip comprising a first memory module, configured to store a private certification key and a mixed certification key formed at least by combining a public certification key and pseudo keys according to a predetermined rule. The processing module of the electronic apparatus at least extracts the public certification key from the mixed certification key according to an algorithm matched with the predetermined rule when the electronic apparatus and the accessory are forming a physical connection. The processing module uses the public certification key to certify the accessory. In such a manner, the present invention can improve the security level of keys so as to improve the security and reliability for the electronic apparatus to use the accessory.Type: GrantFiled: April 13, 2015Date of Patent: February 13, 2018Assignee: TCL COMMUNICATION TECHNOLOGY HOLDINGS LIMITEDInventors: Xuelong Ronald Hu, Aiping Guo, Shiqing Zhao