Data Processing Protection Using Cryptography Patents (Class 713/189)
  • Patent number: 12013751
    Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: June 18, 2024
    Assignee: Cryptography Research, Inc.
    Inventors: Mark Evan Marson, Scott C. Best, Helena Handschuh, Winthrop John Wu
  • Patent number: 12008673
    Abstract: A method and system of augmenting display content in a graphical user interface environment. Content produced by a graphical user interface is augmented with additional content before the content is displayed. In an example, a security marker may be rendered on top of an existing display content using the method described to protect high-value or sensitive information.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: June 11, 2024
    Assignee: NextLabs, Inc.
    Inventors: Keng Lim, Poon Fung
  • Patent number: 12003631
    Abstract: A method is provided for determining a unique identifier of a device, the device including a quantum tunnelling barrier unique to the device. The method comprises applying a potential difference across the quantrum tunnelling barrier, the potential difference sufficient to enable tunnelling barrier. The method further comprises measuring an electrical signal, the electrical signal representative of a tunnelling current through the quantrum tunnelling barrier. The method further comprises determining, from the measured electrical signal, a unique identifier for the device. Related apparatuses, systems, computer-readable media and methods are also provided herein.
    Type: Grant
    Filed: March 7, 2023
    Date of Patent: June 4, 2024
    Assignee: Crypto Quantique Limited
    Inventors: Shahram Mossayebi, Patrick Camilleri, Henry Edward William Montagu
  • Patent number: 11996386
    Abstract: To protect against physical and side-channel attacks, circuit assemblies may mount a main processor opposite of a cryptographic processor such that traces between the two processors are hidden in a substrate. Another substrate defining a cavity may be mounted on the bottom of the substrate to enclose the cryptographic processor and prevent physical access without disrupting the cryptographic operations. Voltage converters with integrated inductors may also be included in the cavity to generate electromagnetic noise that will disrupt the sensitive equipment used in side-channel attacks. An electromagnetic shield may be sputtered on top of the main processor to block electromagnetic sniffing attacks while still allowing the processor to be coupled with a heat sink.
    Type: Grant
    Filed: May 16, 2021
    Date of Patent: May 28, 2024
    Assignee: Applied Materials, Inc.
    Inventor: Bert Fransis
  • Patent number: 11989102
    Abstract: Multiple data paths may be available to a data management system for transferring data between a primary storage device and a secondary storage device. The data management system may be able to gain operational advantages by performing load balancing across the multiple data paths. The system may use application layer characteristics of the data for transferring from a primary storage to a backup storage during data backup operation, and correspondingly from a secondary or backup storage system to a primary storage system during restoration.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: May 21, 2024
    Assignee: Commvault Systems, Inc.
    Inventors: Jaidev Oppath Kochunni, Chong Liu, Manoj Kumar Vijayan, Rajiv Kottomtharayil
  • Patent number: 11989200
    Abstract: An illustrative embodiment disclosed herein is an apparatus including a processor and a memory. In some embodiments, the memory includes programmed instructions that, when executed by the processor, cause the apparatus to upload an object to a source bucket in an object store and create a lambda bucket in the object store that is symlinked to the source bucket. In some embodiments, the lambda bucket is associated with a predefined transformation. In some embodiments, the memory includes the programmed instructions that, when executed by the processor, cause the apparatus to receive a request to download the object from the lambda bucket, detect that the object is in the source bucket, fetch the object from the source bucket, transform the object, by compute resources of the object store, using the predefined transformation, and download the transformed object.
    Type: Grant
    Filed: July 25, 2022
    Date of Patent: May 21, 2024
    Assignee: Nutanix, Inc.
    Inventors: Johnu George, Manik Taneja, Naveen Reddy Gundlagutta, Nikhil Mundra, Satyendra Singh Naruka, Sirvisetti Venkat Sri Sai Ram
  • Patent number: 11991272
    Abstract: Computer-readable media, methods, and systems are disclosed for tenant-specific encryption of container in connection with a database employing group-level encryption. An encryption group identifier may be assigned to container. The encryption group identifier may define how the container is encrypted. A container entry corresponding to the container may be created. A commit operation may be received for committing the assignment of the encryption group identifier to the container. A job may be initialized for encryption the container according to the encryption group identifier. The container may be flagged as modified. A flush operation may be initiated whereby the container is re-encrypted according to the encryption group identifier. Once flushing is complete, the container entry may be deleted.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: May 21, 2024
    Assignee: SAP SE
    Inventor: Dirk Thomsen
  • Patent number: 11989312
    Abstract: A method for transmitting information between a data processing system external to the vehicle and systems using the information in a vehicle employs integrity protection and/or encryption mechanisms. The integrity and/or encryption mechanisms are used with different levels of protection, wherein the level of protection is selected and/or adjusted based on the information or a classification of the information, the provided use of the information, the state of the vehicle, the surroundings of the vehicle, the origin of the information, the protection goal, and/or the resource consumption.
    Type: Grant
    Filed: May 11, 2020
    Date of Patent: May 21, 2024
    Assignee: MERCEDES-BENZ GROUP AG
    Inventors: Viktor Friesen, Micha Koller, Hubert Rehborn
  • Patent number: 11985235
    Abstract: A quantum communication system for encrypting communication includes a processor configured to receive an encryption request from a mobile device. The mobile device determines a first encryption key from the mobile device. A quantum random number generator generates a second encryption key using quantum mechanics. The processor transmits the second encryption key to the mobile device. The mobile device implements a digital XOR logic gate configured to perform an XOR operation on the first encryption key and the second encryption key to generate a third encryption key.
    Type: Grant
    Filed: September 16, 2020
    Date of Patent: May 14, 2024
    Assignee: Quantum Technologies Laboratories, Inc.
    Inventors: Alain Obadia, Adrien Hubert
  • Patent number: 11983106
    Abstract: Devices and techniques for host accelerated operations in managed NAND devices are described herein. A host logical-to-physical (L2P) table of the NAND device has an associated map. Entries in the map correspond to one or more logical addresses (LA) and indicate whether the host L2P table is current for those LAs. If the table is not current, then a request will bypass the host L2P table, using a standard device L2P lookup instead. Otherwise, the host L2P table can be used.
    Type: Grant
    Filed: July 20, 2022
    Date of Patent: May 14, 2024
    Inventors: Sebastien Andre Jean, Greg A. Blodgett
  • Patent number: 11983254
    Abstract: Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.
    Type: Grant
    Filed: August 1, 2023
    Date of Patent: May 14, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Brandon Sloane, Brian Diederich, Levi Weldon McVay
  • Patent number: 11977663
    Abstract: A processing unit comprising: a processor; and a memory, coupled to the processor and adapted to provide a plurality of enclaves isolated from each other, where the plurality of enclaves include a plurality of application enclaves, each of the application enclaves is used for running a respective application program, and the plurality of enclaves further include at least one of the following: a runtime enclave adapted to provide a storage space required for an invokable program; and a crypto enclave adapted to provide a storage space required for a crypto related program, wherein the runtime enclave and the crypto enclave have read/write permission for the plurality of application enclaves, and each of the application enclaves has no read/write permission for the runtime enclave and the crypto enclave.
    Type: Grant
    Filed: January 15, 2021
    Date of Patent: May 7, 2024
    Assignee: Alibaba Group Holding Limited
    Inventors: Xiaoxia Cui, Xuanle Ren
  • Patent number: 11972119
    Abstract: A storage system that can achieve a cryptographic operation circuit that supports multiple types of cryptographic operation formats. The cryptographic operation circuit is provided that encrypts data according to the format determined by the processor based on a request by the host terminal for writing the data into the storage device, and decrypts the encrypted data on the data stored in the storage device according to the format determined by the processor based on a request by the host terminal for reading the data from the storage device.
    Type: Grant
    Filed: April 25, 2023
    Date of Patent: April 30, 2024
    Assignee: HITACHI, LTD.
    Inventors: Shumpei Morita, Tomoyuki Kamazuka, Hideaki Monji, Yuusaku Kiyota
  • Patent number: 11968202
    Abstract: A method of authenticating a user to a computer in an adverse environment includes receiving the user's password in a trusted user device, such as by the user typing the password, and encoding a keyword with a hash of the entered password to create an encoded keyword. The encoded keyword is sent from the trusted user device to the computer using a physical communication channel perceivable by the user; and the encoded keyword is compared in the computer with a keyword encoded with a known hash of the user's password in the computer to authenticate the user.
    Type: Grant
    Filed: May 24, 2019
    Date of Patent: April 23, 2024
    Assignee: Avast Software s.r.o.
    Inventors: Karel Fuka, Vojt{hacek over (e)}ch Tůma
  • Patent number: 11962694
    Abstract: A computing device, such as a personal computing device (e.g., laptop, smartphone, etc.) or server, is configured to utilize environmental factors in generating public/private key pairs to access restricted data or operations. The environmental factors can include location, time, barometric pressure, acceleration, temperature, humidity, and the like. An initial key pair may be used to encrypt data and enable other conventional security features. A key pair can be subsequently generated based on the same environmental factors as with the initial key pair generation and used to access the data or operations which have been restricted using the initial key pair.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: April 16, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: David Garfield Thaler, III, Joerg-Thomas Pfenning, Gerardo Diaz-Cuellar
  • Patent number: 11953966
    Abstract: Methods and corresponding systems and apparatuses for saving power through selectively disabling clock signals in a systolic array are described. In some embodiments, a clock gate controller is operable to output a gated clock signal from which local clock signals of processing elements in the systolic array are derived. The gated clock signal corresponds to a root clock signal that is distributed through a clock distribution network or clock tree. The clock gate controller is located along one branch of the clock distribution network. The branch can be associated with processing elements that form a column within the systolic array. Disabling the gated clock signal disables the local clock signals along the entire branch, preventing any components that are clocked by those local clock signals from consuming power. Additional clock gate controllers can similarly be provided for other branches, including a branch associated with another column.
    Type: Grant
    Filed: April 14, 2022
    Date of Patent: April 9, 2024
    Assignee: META PLATFORMS TECHNOLOGIES, LLC
    Inventors: Fan Wu, Edith Dallard
  • Patent number: 11956270
    Abstract: A computing device may receive a plurality of scanning requests with at least one scanning request in the plurality identifying a target address of a target network. The computing device may for at least a subset of the plurality of scanning requests: generate a scanner instance and a virtual network interface card (VNIC) in response to the scanning request. The scanner instance and the VNIC communicating with a routing namespace that can communicate with two or more scanner instances simultaneously. Until the target address has been scanned: one or more packets can be sent from the scanner instance to the target address via the routing namespace and VNIC. The one or more packets can be wrapped in one or more packet wrappers identifying the target address and the target network. In response to the target address being scanned, the scanner instance and VNIC can be decommissioned.
    Type: Grant
    Filed: February 11, 2022
    Date of Patent: April 9, 2024
    Assignee: Oracle International Corporation
    Inventors: Borhan Hosseini, Vlad George Coman
  • Patent number: 11944259
    Abstract: A vacuum cleaner comprises a nozzle (N) for cleaning a surface, a suction tube (T) for receiving input air from the nozzle (N), a cyclone device having a cyclone (C) and a dirt container (DC) both oriented substantially perpendicular to the suction tube (T), a cyclone device input coupled to the suction tube (T) from which the input air is transported, following a spiral around a center, in a first direction substantially perpendicular to the suction tube (T) to reach a stage (V) at which dirt is separated from the input air to obtain cyclone output air, from which stage the cyclone output air is conveyed through a conduit in a second direction substantially perpendicular to the suction tube (T) and opposite to the first direction to arrive at a cyclone device output, a filter (F) for filtering the cyclone output air, and an airflow generator (A) for generating an airflow through the suction tube (T), the cyclone (C) and the filter (F), wherein when the nozzle (N) is touching the surface, the suction tube (T)
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: April 2, 2024
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventor: Matthijs Hendrikus Lubbers
  • Patent number: 11947676
    Abstract: A processor system includes a processor and a first memory area storing a boot program code. The boot program code starts execution of the operating system when executed by the processor, performs a cryptographic operation when processor executes the boot program code. A second memory area stores one or more cryptographic keys and is only accessible to the boot program code. A third memory stores the operating system. A communication interface receives data over a communication network. The processor retrieves the boot program code from the first memory area and executes the boot program code to start execution of the operating system. The processor terminates execution of the boot program code. The processor is configured to re-execute the boot program code while the operating system is executed to cryptographically encrypt data upon the basis of the cryptographic keys stored in the second memory area.
    Type: Grant
    Filed: September 11, 2020
    Date of Patent: April 2, 2024
    Assignee: SECURE THINGZ LTD.
    Inventors: Stephan Spitz, Haydn Povey, Tim Woodruff
  • Patent number: 11949666
    Abstract: The present invention relates to a method, apparatus, and system for communication with a user's family members using the DNA of the user without making the DNA profile public. According to a first aspect, there is provided a computer implemented method of locating one or more members of a familial network, comprising the steps of: generating one or more encryption keys derived from a first genomic sequence; encrypting a message using the or each encryption key to form an encrypted message; sending the encrypted message to one or more remote devices wherein decrypting the encrypted message at the one or more remote devices uses one or more encryption keys derived from a second genomic sequence; and receiving a confirmation regarding whether the decryption of the encrypted message was successful by any of the one or more remote devices.
    Type: Grant
    Filed: August 12, 2019
    Date of Patent: April 2, 2024
    Inventor: Paul Andrew Croall
  • Patent number: 11940944
    Abstract: A computer platform is disclosed. The computer platform comprises a non-volatile memory to store fuse override data; and a system on chip (SOC), coupled to the non-volatile memory, including a fuse memory to store fuse data and security micro-controller to receive the fuse override data and perform a fuse override to overwrite the fuse data stored in the fuse memory with the fuse override data.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: March 26, 2024
    Assignee: Intel Corporation
    Inventors: Bharat Pillilli, Saravana Priya Ramanathan, Reshma Lal
  • Patent number: 11940987
    Abstract: An incorrect copy of a record of data can be prevented from being transmitted to a distributed ledger system. A first file can be received and can include information, in audio or video form, with a description of a subject matter of the record of data and with an authorization to transmit the copy to the distributed ledger system. The first file can be sent to a device. A second file can be received from the device and can include information that confirms that the description of the subject matter, included in the first file, is correct, and that confirms that an entity, which controlled production of the first file, has permission to authorize causing the copy to be transmitted to the distributed ledger system. The correct copy can be caused, based on a receipt of the first and the second files, to be transmitted to the distributed ledger system.
    Type: Grant
    Filed: September 9, 2022
    Date of Patent: March 26, 2024
    Assignee: POLYSIGN INC.
    Inventors: David Schwartz, Arthur Britto, Anna Tong, Kimon Papahadjopoulos, William Morris, Chiranjeeb Kataki, Eric Rodriguez, Conor Hanranhan
  • Patent number: 11936791
    Abstract: Computer systems, devices, and associated methods of verifying reliability of instructions for a device are disclosed herein. In one embodiment, a method includes identifying a reliability requirement associated with instructions for a device and receiving, from a user, an assertion in relation to the reliability requirement. The method includes generating a cryptographic assertion tracer (CAT) based at least in part on the received assertion. The method includes receiving assertion-related instructions in association with the CAT and generating a first code verification encrypted reproducible record based at least in part on the CAT and the received assertion-related instructions. The method then includes reporting that the reliability requirement is addressed.
    Type: Grant
    Filed: September 17, 2021
    Date of Patent: March 19, 2024
    Inventors: Jason Burt, Robert McIver
  • Patent number: 11934525
    Abstract: Technologies for attestation techniques, systems, and methods to confirm the integrity of a device for establishing and/or maintaining a trustworthy encrypted network session. An example method can include sending, via a server and using a cryptographic security protocol, a message associated with establishing an encrypted network session; receiving a response from a client device; identifying a level of trust of the client device based on the response; determining whether to perform a next step in the cryptographic security protocol based on the level of trust, wherein the cryptographic security protocol comprises at least one of a Secure Shell (SSH) protocol, a Transport Layer Security (TLS) protocol, a Secure Sockets Layer (SSL) protocol, and an Internet Protocol Security (IPsec) protocol.
    Type: Grant
    Filed: April 4, 2022
    Date of Patent: March 19, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Sujal Sheth, Shwetha Subray Bhandari, Eric Voit, William F. Sulzen, Frank Brockners
  • Patent number: 11934538
    Abstract: In general, this disclosure describes techniques for replacing target cryptographic primitives in executable binary files with other, potentially more secure, cryptographic primitives. In some examples, a computing system for augmenting cryptographic executables includes a locator to determine if an executable program in an executable binary file includes a target cryptographic primitive. The computing system can include a patch generator to generate patch instructions in response to a determination by the locator that the executable program includes the target cryptographic primitive. The patch instructions cause the executable program to execute a replacement cryptographic primitive instead of the target cryptographic primitive. A rewriter engine of the computing system can modify, based on the patch instructions, the executable program to generate a modified executable binary file.
    Type: Grant
    Filed: July 24, 2020
    Date of Patent: March 19, 2024
    Assignee: SRI INTERNATIONAL
    Inventors: Karim Eldefrawy, Hassen Saidi, Michael E. Locasto, Norrathep Rattanavipanon
  • Patent number: 11930118
    Abstract: An authentication method includes: receiving a command of an upper host; parsing an option parameter in the command; determining a value of a fingerprint authentication identifier in the option parameter, and if the value is a first preset value, prompting a user to input a fingerprint and verifying the fingerprint input to obtain a user operation verification result; if the value is a second preset value, prompting the user to press a key and verifying the key pressed to obtain a user operation verification result; determining the user operation verification result, and if the user operation verification result is success, setting an authentication mode confirmation identifier, obtaining client data from the command, generating data to be signed, signing the data to be signed to generate a signature result, sending the signature result to the upper host; if the user operation verification result is failure, reporting an error.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: March 12, 2024
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11928225
    Abstract: Systems, computer program products, and methods are described herein for implementing real-time redaction in a workflow configurable environment. The present invention is configured to electronically receive, from a user input device, a request to load at least one user interface associated with an application; initiate a real-time content redaction engine on contents of the one or more fields associated with the at least one user interface in response to receiving the request, wherein initiating further comprises: parsing one or more embedded structures associated with the one or more fields; identifying private information in the one or more fields based on at least parsing the one or more embedded structures; and masking the private information in the one or more fields; and load the at least one user interface associated with the application in response to masking the private information in the one or more fields.
    Type: Grant
    Filed: June 1, 2023
    Date of Patent: March 12, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Nagaraju Buddhiraju, Deepali Dadhich, Lekshan Bhathiya Jayasinghe
  • Patent number: 11921849
    Abstract: A system for defending against a side channel attack. The system includes a reuse distance buffer configured to measure one or more reuse distances for a microarchitecture block according to information of marker candidates and information of target events of a microarchitecture block; and a defense actuator configured to determine existence of a side channel attack in the microarchitecture block according to the one or more reuse distances for the microarchitecture block.
    Type: Grant
    Filed: February 22, 2021
    Date of Patent: March 5, 2024
    Assignee: The George Washington University
    Inventors: Guru Prasadh Venkataramani, Milo{hacek over (s)} Doroslova{hacek over (c)}ki, Hongyu Fang
  • Patent number: 11922145
    Abstract: Implementations are directed to developing and facilitating a data collaboration using a data collaboration tool that bundles data pipelines and governing contracts into a data collaboration app. The data collaboration tool may include an authoring mode and may include an electronic canvas that visually represents all contracts and pipelines of the data collaboration app on a single canvas and visually represents traceability from the contracts to the pipeline elements they enable. A developer may use authoring mode to develop a template app that includes placeholder elements, including a reference to an anonymous placeholder participant. The template app may be shared, and a recipient may invite data collaborators to fill in the placeholder elements and deploy the app, enabling the data collaborators to trigger the data pipelines to execute in a data trustee environment to generate insights from each other's assets without exposing the assets to the collaborators or the developer.
    Type: Grant
    Filed: March 1, 2022
    Date of Patent: March 5, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yisroel Gershon Taber, Ittay Levy Ophir, Lev Rozenbaum, Nerya Cohen
  • Patent number: 11924348
    Abstract: An example operation may include one or more of establishing a communication channel between a sending system and a receiving system, executing an oblivious transfer protocol between the sending system and the receiving system via the established communication channel, wherein the oblivious transfer protocol provides the receiving system with a functional encryption key based on a data vector of the receiving system without the sending system learning the data vector, committing to the functional encryption key using a cryptographic commitment and signing the functional encryption key commitment with a digital key of the receiving system, and storing the signed functional encryption key commitment to a blockchain.
    Type: Grant
    Filed: February 27, 2021
    Date of Patent: March 5, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yacov Manevich, Nitin Gaur, Petr Novotny, Sarbajit K. Rakshit
  • Patent number: 11924351
    Abstract: A transient blockchain proxy server consolidates many individual requests to add data to a blockchain by aggregating hashed data from these requests and sending the aggregated hashed data to the blockchain network as a single request. The blockchain network adds a new block to the blockchain with the aggregated hashed data and returns a transaction identifier for the new block to the transient blockchain proxy server, which passes the transaction identifier back to all the requestors who then can directly use the blockchain network to verify the hashed data using the transaction identifier. The transient blockchain proxy server buffers all incoming requests until one of the pending requests reaches a send timepoint that is the blockchain network delay plus a buffer time before a guaranteed time of verification. All incoming requests are then consolidated and sent as a single transaction to the blockchain network. Tiered verification-time services are enabled.
    Type: Grant
    Filed: February 9, 2023
    Date of Patent: March 5, 2024
    Assignee: Hong Kong Applied Science and Technology Research Institute Company Limited
    Inventors: Tak Wing Lam, Tak Fuk Wong
  • Patent number: 11924233
    Abstract: A method includes receiving, at a first server from a second server, a first file attribute associated with a file. The method includes making a determination, at the first server based on the first file attribute, of availability of a classification for the file from a cache of the first server. The method includes, in response to the determination indicating that the classification is not available from the cache, sending a notification to the second server indicating that the classification for the file is not available. The method also includes receiving a first classification for the file from the second server at the first server. The first classification is generated by the second server responsive to the notification.
    Type: Grant
    Filed: December 22, 2021
    Date of Patent: March 5, 2024
    Assignee: SPARKCOGNITION, INC.
    Inventors: Lucas McLane, Jarred Capellman
  • Patent number: 11921874
    Abstract: A file protection method of a computer apparatus including a processor, the method including extracting classes from an executable file of a package file, classifying the classes into class groups, adding a loading code to a first class group among the class groups, the loading code configured to cause sequential loading of the class groups to a memory in a random loading order in response to execution of the package file, adding an integrity code to a second class group among the class groups, the integrity code configured to verify an integrity of a corresponding class group among the class groups or a previous class group among the class groups, the previous class group including the loading code configured to cause the corresponding class group to load, and regenerating the package file using the class groups after the adding the loading code and the adding the integrity code.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: March 5, 2024
    Assignee: LINE Plus Corporation
    Inventors: Sang Min Chung, Seol hwa Han, SangHun Jeon
  • Patent number: 11924325
    Abstract: Techniques are presented for controlling or influencing use of and/or access to a resource. This resource may be a device, such as an IoT (Internet of Things) device or a process. Techniques include a method comprising generating a blockchain transaction (TxA) indicative of a condition on use of, or access to, the resource for a specified period of time, the blockchain transaction comprising a multi-signature script requiring a plurality of signatures for completion of the blockchain transaction; providing a first subset of the plurality of signatures to the blockchain transaction (TxA) to generate a partially signed signature script to partially complete the blockchain transaction (SI 14); and responsive to the condition on the use of, or access to, the resource being satisfied, providing a second subset of the plurality of signatures (S204) to the blockchain transaction to fully complete the blockchain transaction.
    Type: Grant
    Filed: April 17, 2022
    Date of Patent: March 5, 2024
    Assignee: nChain Licensing AG
    Inventors: Stephane Vincent, Craig Steven Wright
  • Patent number: 11917067
    Abstract: Systems, methods, and apparatuses relating to circuitry to implement an instruction to create and/or use data that is restricted in how it can be used are described. In one embodiment, a hardware processor comprises a decoder of a core to decode a single instruction into a decoded single instruction, the single instruction comprising a first input operand of a handle including a ciphertext of an encryption key (e.g.
    Type: Grant
    Filed: December 28, 2019
    Date of Patent: February 27, 2024
    Assignee: Intel Corporation
    Inventor: Jason W. Brandt
  • Patent number: 11907383
    Abstract: Systems, computer program products, and methods are described herein for implementing real-time redaction in a workflow configurable environment. The present invention is configured to electronically receive, from a user input device, a request to load at least one user interface associated with an application; initiate a real-time content redaction engine on contents of the one or more fields associated with the at least one user interface in response to receiving the request, wherein initiating further comprises: parsing one or more embedded structures associated with the one or more fields; identifying private information in the one or more fields based on at least parsing the one or more embedded structures; and masking the private information in the one or more fields; and load the at least one user interface associated with the application in response to masking the private information in the one or more fields.
    Type: Grant
    Filed: June 1, 2023
    Date of Patent: February 20, 2024
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Nagaraju Buddhiraju, Deepali Dadhich, Lekshan Bhathiya Jayasinghe
  • Patent number: 11907704
    Abstract: Various systems and methods for enabling derivation and distribution of an attestation manifest for a software update image are described. In an example, these systems and methods include orchestration functions and communications, providing functionality and components for a software update process which also provides verification and attestation among multiple devices and operators.
    Type: Grant
    Filed: May 2, 2022
    Date of Patent: February 20, 2024
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Kshitij Arun Doshi, John J. Browne, Vincent J. Zimmer, Francesc Guim Bernat, Kapil Sood
  • Patent number: 11907408
    Abstract: A device comprising a processing unit having a plurality of processors is provided. At least one encryption unit is provided as part of the device for encrypting data written by the processors to external storage and decrypting data read from that storage. The processors are divided into different sets, with state information held in the encryption unit for performing encryption/decryption operations for requests for different sets of processors. This enables interleaved read completions or write requests from different sets of processors to be handled by the encryption unit, since associated state information for each set of processors is independently maintained.
    Type: Grant
    Filed: March 29, 2021
    Date of Patent: February 20, 2024
    Assignee: GRAPHCORE LIMITED
    Inventors: Graham Cunningham, Daniel Wilkinson
  • Patent number: 11901003
    Abstract: Leveraging stochastic physical characteristics of resistive switching devices to generate data having very low cross correlation among bits of that data is disclosed. Data generated from stochastic physical characteristics can also be referred to as physical unclonable feature—or function—(PUF) data. Additionally, error correction functions for PUF data generated from resistive switching memory cells are provided. The error correction functions facilitate additional redundancy and longevity of PUF data, among other benefits. Different embodiments include addressing arrangements to incorporate ECC parity bits among generated PUF data bits, even for differential PUF bits respectively defined by multiple memory cells in different portions of a resistive memory array.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: February 13, 2024
    Assignee: Crossbar, Inc.
    Inventor: Mehdi Asnaashari
  • Patent number: 11893112
    Abstract: There is provided a device of protecting an Integrated Circuit from perturbation attacks. The device includes a sensing unit configured to detect a perturbation attack, the sensing unit comprising a set of digital sensors comprising at least two sensors, the sensors being arranged in parallel. Each digital sensor provides a digitized bit output having a binary value, in response to input data, the sensing unit being configured to deliver at least one binary vector comprising a multi-bit value, the multi-bit value comprising at least two bit outputs provided by the set of digital sensors. The sensing device further comprising an analysis unit, the analysis unit being configured to receive at least one binary vector provided by the sensing unit, the analysis unit being configured to detect a perturbation attack from the at least one binary vector.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: February 6, 2024
    Assignee: SECURE-IC SAS
    Inventors: Sylvain Guilley, Adrien Facon, Nicolas Bruneau
  • Patent number: 11895102
    Abstract: An identity authentication management (IAM) service is established as a master over a master identity database of the centralized identity authentication management service. When adding an additional node to the computing infrastructure, a non-master copy of the master identity database is distributed to the additional node. Ongoing coordination between the master identity database and the non-master copy is established so as to synchronize differences between the master identity database and the non-master copy of the identity database. The additional node hosts a fully-functional authentication management service using the non-master copy of the master identity database and is able to respond to READ requests for data by accessing the non-master copy—without interaction with the centralized identity authentication management service.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: February 6, 2024
    Assignee: Nutanix, Inc.
    Inventors: Vinod Gupta, Sunil Chandrabhan Agrawal
  • Patent number: 11893144
    Abstract: A system includes a virtual machine to transmit an input/output request to a data storage system and a hypervisor configured to maintain a map of the virtual machine to a virtual disk, wherein the virtual disk is a slice of a persistent storage device. A virtual machine server is configured to maintain a map of the virtual disk to a start address and an end address and to update the input/output request with the start address, the end address, and a virtual disk identifier associated with the virtual machine. A processor determines whether the start address and the end address are valid, and if the start address and the end address are valid, then process the input/output request. The response is transmitted to the input/output request.
    Type: Grant
    Filed: August 3, 2022
    Date of Patent: February 6, 2024
    Assignee: Dell Products L.P.
    Inventors: Ankit Singh, Vinod Parackal Saby, Deepaganesh Paulraj
  • Patent number: 11887508
    Abstract: There is provided an information processing apparatus that generates an encrypted bit string in which a hash value calculated by using keyed hashing from a keyword for an information search is mapped into a bit string having a predetermined length, selects a predetermined number of bits from the encrypted bit string on the basis of a dynamically generated random number, inverts the predetermined number of selected bits, and sends the encrypted bit string and inverted-bit-number information to an external apparatus. The inverted-bit-number information indicates a number of bits inverted by a bit inverting unit.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: January 30, 2024
    Assignee: SONY CORPORATION
    Inventors: Atsushi Uchida, Shinya Maruyama
  • Patent number: 11876835
    Abstract: Various embodiments are generally directed to techniques to enforce policies for computing platform resources, such as to prevent denial of service (DoS) attacks on the computing platform resources. Some embodiments are particularly directed to ISA instructions that allow trusted software/applications to securely enforce policies on a platform resource/device while allowing untrusted software to control allocation of the platform resource. In many embodiments, the ISA instructions may enable secure communication between a trusted application and a platform resource. In several embodiments, a first ISA instruction implemented by microcode may enable a trusted application to wrap policy information for secure transmission through an untrusted stack.
    Type: Grant
    Filed: October 15, 2021
    Date of Patent: January 16, 2024
    Assignee: Intel Corporation
    Inventors: Siddhartha Chhabra, Prashant Dewan
  • Patent number: 11876900
    Abstract: A system includes a communication channel monitor configured to calculate a hash value of a first encrypted code segment based on a measurement. A security module may derive a first encryption key using a key decryption function operation from the hash value of the first encrypted code segment. A processor decrypts the first encrypted code segment with a seed key retrieved from a storage device, and if the decryption is successful then executes the first decrypted code segment. The processor may retrieve a second one of the encrypted code segments, wherein the second encrypted code segment is a next encrypted code segment for execution after the first encrypted code segment according to a sequence of execution, decrypt the second encrypted code segment with the first encryption key, and if the decryption is successful then execute the second decrypted code segment.
    Type: Grant
    Filed: May 18, 2022
    Date of Patent: January 16, 2024
    Assignee: Dell Products L.P.
    Inventors: Nicholas D. Grobelny, Richard M. Tonry, Balasingh P. Samuel
  • Patent number: 11870915
    Abstract: A secure programming system can receive a job control package having a security kernel and a target payload of content for programming into a pre-defined set of trusted devices. A device programmer can install a security kernel on the trusted devices and reboot the trusted devices using the security kernel to validate the proper operation of the security kernel. The target payload can then be securely installed on the trusted devices and validated.
    Type: Grant
    Filed: June 28, 2022
    Date of Patent: January 9, 2024
    Assignee: Data I/O Corporation
    Inventors: Rajeev Gulati, David R. Christie, Edwin R. Musch, Benjamin M. Deagen
  • Patent number: 11862987
    Abstract: A contactless battery system includes a sealable case, a battery unit disposed within the sealable case, and at least one wireless power transmission coupler connected to the battery unit and disposed within the sealable case. The battery unit includes an arrangement of serially connected battery cells in a fixed number of banks of battery cells to deliver a set voltage and current. The wireless power transmission coupler is disposed with respect to at least one face of the sealable case to enable magnetic inductive signaling for charging, discharging, and communication with the battery unit. A battery management controller communicates bidirectionally with the contactless battery systems and with electrically powered equipment to control charging. A distribution system manages distribution of the contactless battery systems to a plurality of depots adapted to store, charge, or exchange depleted contactless battery systems under control of at least one management unit.
    Type: Grant
    Filed: December 7, 2022
    Date of Patent: January 2, 2024
    Assignee: InductEV Inc.
    Inventors: Andrew W. Daga, Francis J. McMahon, Matthew L. Ward
  • Patent number: 11863975
    Abstract: Systems and methods of protecting an initial NAS message are described. The NAS message is encrypted using the home PLMN public key during initial registration with the network using a registration request message. An AMF of the serving PLMN sends a serving PLMN public key which is then used to encrypt information including an S-NSSAI of later initial NAS messages after initial registration is completed. The S-NSSAI may not be sent in the later initial NAS message if the S-NSSAI is provided at an access stratum level. The RRC message may contain an indication that the S-NSSAI is encrypted using the serving PLMN public key.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: January 2, 2024
    Assignee: Apple Inc.
    Inventors: Alexandre Saso Stojanovski, Robert Zaus, Farid Adrangi, Raimund Wloka, Abhijeet Ashok Kolekar, Ahmed Soliman, Sudeep K. Palat
  • Patent number: 11853451
    Abstract: A method for providing and searching a searchable encrypted database. The system obtains plain text data and first and second encryption keys. The plain text data is parsed using a priori knowledge of the plain text data structure to identify data blocks and associated metadata components. The data blocks are encrypted using the first encryption key to provide encrypted data blocks. The metadata components are encrypted with the second encryption key to provide encrypted metadata components. The encrypted data blocks and encrypted metadata components are stored in a storage vault to provide a searchable encrypted database whilst discarding the plain text data and the first encryption key. A search term is encrypted with the second encryption key to provide an encrypted search term used to search the searchable encrypted database to determine whether it matches one or more of the encrypted metadata components, and a search result is returned.
    Type: Grant
    Filed: August 16, 2021
    Date of Patent: December 26, 2023
    Assignee: Issured Limited
    Inventors: David Beardsworth, Jeddiah Stone, Jonathan Empson
  • Patent number: 11853413
    Abstract: Some embodiments are directed to a computing device (100) configured for execution of a computer program protected against address probing. The device is configured to run at least one anomaly detector (140) for detecting an address probing on the computer program, and to selectively replace an originating computer program code part with a replacement computer program code part wherein an address probing countermeasure is added.
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: December 26, 2023
    Assignee: Koninklijke Philips N.V.
    Inventors: Koustubha Bhat, Hendrik Jaap Bos, Cristiano Giuffrida, Erik van der Kouwe