By Stored Data Protection Patents (Class 713/193)
  • Patent number: 12388644
    Abstract: Features described herein generally relate to systems and methods for generating and managing tokens for authenticated assets. In some aspects, generating a token is performed according to one or more rules and includes generating metadata that links the token to a representation of an asset. In some other aspects, tracking token access includes monitoring a blockchain for token access events and generating a token based on a modified historian and received feedback. In other aspects, validating a token for an authenticated asset includes matching representations of the authenticated asset.
    Type: Grant
    Filed: September 9, 2022
    Date of Patent: August 12, 2025
    Assignee: Iron Mountain Incorporated
    Inventors: Nicole Reineke, Rodrigo Coelho Ferreira, Denis Leconte, Gregory Maratea, Gabriel Nguyen, William J. Allen
  • Patent number: 12388633
    Abstract: A system and method for digitally signing data. A method includes generating, by a first device, at least one first secret share based on a secret key chosen by the first device, wherein the first device is offline with respect to a second device; partially signing data by the first device using the at least one secret share, wherein the data is received from the second device without establishing direct communications between the first device and the second device; and sending the partially signed data from the first device to the second device, wherein the second device generates signed data using the partially signed data, wherein the signed data corresponds to a public key generated based on the at least one first secret share and at least one second secret share generated by the second device.
    Type: Grant
    Filed: February 28, 2024
    Date of Patent: August 12, 2025
    Assignee: PAYPAL, INC.
    Inventors: Dan Yadlin, Ben Riva, Alon Navon, Lev Pachmanov, Jonathan Katz
  • Patent number: 12387035
    Abstract: A computing system and method enables a business to manage negative and positive reviews of a purchased good or service. An example computing system may be configured to retrieve ratings and reviews relating to the business from a plurality of computing devices deployed within a communication network; extract data from the ratings and reviews; determine a parameter for the business based at least upon the data extracted from the ratings; process the data extracted from the reviews to identify inappropriate content; generate signals to obscure the inappropriate content in the reviews; generate a graphical user interface comprising a display of a listing of the ratings and reviews including the signals obscuring the inappropriate content in the reviews; detect cursor movements on the graphical user interface; and modify the display of the graphical user interface based at least on the cursor movements in relation to the inappropriate content.
    Type: Grant
    Filed: September 12, 2024
    Date of Patent: August 12, 2025
    Assignee: TRUST GRADE, LLC
    Inventors: Kenneth L. Underwood, Dennis Okon, Katherine Underwood
  • Patent number: 12381858
    Abstract: A computing device includes a direct memory access (DMA) engine coupled to a memory, a network interface, and processing circuitry. The processing circuitry is to perform a secure exchange with a second computing device to negotiate a shared encryption key, based on a request for data received via the network interface from the second computing device. The DMA engine is to retrieve the data from a storage location based on an encryption command. The encryption command indicates the storage location. The DMA engine is to encrypt the data based on the shared encryption key to generate encrypted data, and store the encrypted data in the memory.
    Type: Grant
    Filed: February 15, 2024
    Date of Patent: August 5, 2025
    Assignee: Intel Corporation
    Inventors: Kshitij Arun Doshi, Uzair Qureshi, Lokpraveen Mosur, Patrick Fleming, Stephen Doyle, Brian Andrew Keating, Ned M. Smith
  • Patent number: 12380962
    Abstract: A method includes providing one or more signals to an electronic device for performing a test procedure that involves programming a One-Time Programmable (OTP) memory in the electronic device. A verification is made as to whether connection of the one or more signals to the electronic device is stable, by performing a sequence of one or more iterations, each iteration including (i) determining, from among a set of scratchpad addresses in the OTP memory, an address that is available for programming, (ii) writing a test value to the address, and then (iii) reading the test value from the address. If the read test value differs from the written test value, re-tuning of the connection of the one or more signals is initiated. Only when the connection is verified as stable by the sequence of iterations, the OTP memory is programmed in accordance with the test procedure.
    Type: Grant
    Filed: June 11, 2023
    Date of Patent: August 5, 2025
    Assignee: Nuvoton Technology Corp.
    Inventors: Ziv Hershman, Dana Agur, Alain Bismuth
  • Patent number: 12380523
    Abstract: A system and method for securely dispensing medication are described herein. The system includes a telemedicine center that communicates with medical assistant station and a medication distribution station located at a correctional facility and a physician center remote to the correctional facility. The medical assistant station transmits a request for medication to the telemedicine center. The telemedicine center verifies an identity of the medical assistant requesting the medication and transmits the request to the physician center. When the telemedicine center receives a confirmation to dispense medicine from the physician center, an identity of the physician transmitting the confirmation is verified. The telemedicine center then verifies an identity of an inmate to receive the medication, by way of the medication distribution station, and allows the medication distribution station to dispense the medication.
    Type: Grant
    Filed: March 1, 2024
    Date of Patent: August 5, 2025
    Assignee: Global Tel*Link Corporation
    Inventor: Stephen L. Hodge
  • Patent number: 12380232
    Abstract: Methods and systems for managing and/or processing a blockchain to maintain data security for confidential and/or personal data are provided. According to certain aspects, the disclosed data security techniques may enable access sharing functionality utilizing the blockchain. For example, access sharing may be utilized to share policy information. The policy information may be associated with a smart contract. Accordingly, the policy information may be encrypted using a public key for the smart contract and compiled into a block of the blockchain. In response to a request to provide access to the information to a particular node, the private key for the smart contract may be encrypted using the public key for the particular node and compiled into a block of the blockchain.
    Type: Grant
    Filed: March 1, 2024
    Date of Patent: August 5, 2025
    Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY
    Inventors: Melinda Teresa Magerkurth, Eric Bellas, Jaime Skaggs, Shawn M. Call, Eric R. Moore, Vicki King, Burton J. Floyd, David Turrentine, Steven T. Olson, Timothy Caleb Wells, Corin Rebekah Chapman, Edward W. Breitweiser, Robert Gomez, Shelia Cummings Smith
  • Patent number: 12373605
    Abstract: Secure hashing of large files to verify file identity. In some implementations, a method includes determining a size of a particular file received by an endpoint device, and searching for a record indexed in a data structure based on the size. In response to finding the record, a sequence of multiple records is accessed in the data structure. For each record of the sequence, a particular data portion is hashed that has a location in the particular file that corresponds to a location in the record to obtain a particular hash result. In response to the particular hash result matching a corresponding previous hash result stored in the record based on an associated data portion in an associated file, the particular file is determined to be the same as the associated file, and characteristics of the particular file are determined using file information for the associated file.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: July 29, 2025
    Assignee: Sophos Limited
    Inventor: James Christopher Carpenter
  • Patent number: 12373520
    Abstract: Training a neural network and embedding a watermark in the network to prove ownership. The network includes a plurality of trainable parameters associated with network nodes in which the plurality of trainable parameters is split into a first set of trainable parameters and a second set of trainable parameters. A first set of training samples is input to the network and the network is trained by iterating the first set of samples through the network to update the first set of parameters and hindering the second set of parameters to be updated during iteration of the first set of samples. A second set of samples is input and the watermark is embedded by iterating the second set of samples through the network to update the second set of parameters and hindering the first set of parameters to be updated during iteration of the second set of samples.
    Type: Grant
    Filed: April 1, 2020
    Date of Patent: July 29, 2025
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Jakob Sternby, Björn Johansson
  • Patent number: 12375604
    Abstract: Systems and methods include processing communication segments. A method may include obtaining at least one audio segment of an audio communication and distributing the at least one audio segment to a rules engine, analyzing, with the rules engine, the at least one audio segment for at least one acoustic trigger, determining at least one event that is triggered based on comparing the at least one acoustic trigger to one or more trigger rules, and communicating the at least one event to at least one end user through a web server.
    Type: Grant
    Filed: August 4, 2022
    Date of Patent: July 29, 2025
    Assignee: CallMiner, Inc.
    Inventors: Michael C. Dwyer, Erik A. Strand, Scott R. Wolf, Frank Salinas, Jeffrey A. Gallino, Scott A. Kendrick, Shaoyu Xue
  • Patent number: 12368586
    Abstract: Aspects of a storage device are provided for managing a key version used for encryption and decryption and processing host commands associated with sanitized and non-sanitized logical pages using cryptographic erase. A controller of the storage device updates, in response to a sanitize command, a current address offset associated with the KV from a first address offset to a second address offset without changing the KV. In response to a subsequent read command, the controller determines whether the KV mismatches an expected KV obtained from the metadata beginning at the second address offset but matches or mismatches an expected KV obtained from the metadata beginning at the first address offset. The controller transmits garbage data decrypted using a different KV than the KV if a match, or an error message indicating a KV mismatch error if a mismatch. Thus, the controller may avoid returning garbage data for non-sanitized logical pages.
    Type: Grant
    Filed: July 10, 2023
    Date of Patent: July 22, 2025
    Assignee: Sandisk Technologies, Inc.
    Inventor: Chaitanya Kavirayani
  • Patent number: 12362937
    Abstract: An electronic device and a method for protecting seed data packet thereof, which relate to the field of information security. The electronic device includes a receiving module, a first obtaining module, a first determining module, a first confirming module, a sending module, a first verifying module, a second determining module, a checking module, a first setting module, a second setting module, a second verifying module, a generating and storing module, a third setting module, a fourth setting module, a data storing module, a key generating module, a third verifying module, a second confirming module, a second obtaining module and an organizing module.
    Type: Grant
    Filed: July 28, 2021
    Date of Patent: July 15, 2025
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 12355748
    Abstract: Techniques are described for controlling data and resource access. For example, methods and systems can facilitate controlled token distribution across systems and token processing in a manner so as to limit access to and to protect data that includes access codes.
    Type: Grant
    Filed: December 11, 2023
    Date of Patent: July 8, 2025
    Assignee: Live Nation Entertainment, Inc.
    Inventors: Phillip Volini, John Raymond Werneke, Carl Schumaier, Michael Smith, Frank Giannantonio, Vito Iaia, Sean Moriarty
  • Patent number: 12353725
    Abstract: Methods, systems, and devices for verification of a volatile memory, such as a dynamic random-access memory (DRAM), using a unique identifier (ID) are described. A memory device may store a unique ID for a DRAM component of the memory device in non-volatile memory (e.g., in the DRAM, external to the DRAM). A host device coupled with the memory device may store, to non-volatile memory at the host device, information for verifying the identity of the DRAM component, for example, based on the unique ID. The memory device and host device may perform a procedure for verification of the identity of the DRAM component using the unique ID of the DRAM and the verification information stored at the host device. If the host device detects that the DRAM has been replaced or modified based on the verification procedure, the host device may disable one or more features of the memory device.
    Type: Grant
    Filed: March 14, 2022
    Date of Patent: July 8, 2025
    Assignee: Micron Technology, Inc.
    Inventors: Aaron Boehm, Jeremy Chritz, David Hulton, Tamara Schmitz, Max Vohra
  • Patent number: 12353339
    Abstract: A data transfer method, a data transfer device and a computer readable storage medium. The data transfer device comprises at least one first-stage memory, at least one second-stage memory and at least one third-stage memory which are connected in sequence. The data transfer method comprises: receiving a first input comprising a number of input lanes and/or a number of output lanes; selecting a corresponding second-stage memory and controlling a first read signal and a second read signal, according to the number of input lanes and/or the number of output lanes; storing data of the input lanes through the at least one first-stage memory; reading data of the first-stage memory and writing the data into the corresponding second-stage memory when the first read signal is enabled; and reading data of the corresponding second-stage memory and writing the data into the third-stage memory when the second read signal is enabled.
    Type: Grant
    Filed: March 28, 2022
    Date of Patent: July 8, 2025
    Assignees: Chongqing BOE Optoelectronics Technology Co., Ltd., BOE Technology Group Co., Ltd.
    Inventors: Wentao Zhu, Gaoming Sun, Jingchao Yuan, Zhiheng Zhou, Hongxin Pan, Jingpeng Zhao, Xin Duan
  • Patent number: 12353376
    Abstract: A data storage management system is enhanced to accommodate, and moreover to optimize, the storing and retention of deduplicated secondary copies at write-once read-many (WORM) enabled storage platforms. Enhancements include without limitation: user interface (UI) options to enable WORM functionality for secondary storage, whether used for deduplicated or non-deduplicated secondary copies; enhancements to secondary copy (e.g., deduplication copy, backup) operations; and pruning changes. The storage manager is generally responsible for managing the creation, tracking, and deletion of secondary copies, with and without deduplication. Media agents that store secondary copies to and prune them from the WORM-enabled storage platforms also are enhanced for communicating and interoperating with both bucket-level and object-level WORM-enabled storage platforms to implement the features disclosed herein.
    Type: Grant
    Filed: April 15, 2024
    Date of Patent: July 8, 2025
    Assignee: Commvault Systems, Inc.
    Inventors: Prasad Nara, Abhishek Narulkar, Hetal Kapadia, Satya Narayan Mohanty
  • Patent number: 12355873
    Abstract: Techniques for secure cryptographic secret bootstrapping balance the need to quickly and conveniently restore cryptographic secrets to server computers in the event of an outage with the need for security. Before the outage, a server computer uses a trusted platform module of the server computer to seal an encryption key used to encrypt a secret stored at the server computer. In response to the outage, the server computer restores the secret by using the trusted platform module to unseal the encryption key and then using the unsealed encryption key to decrypt the encrypted secret. The techniques can be used to restore cryptographic secrets rapidly and securely to a cluster of server computers used for cryptographic operations in a provider network without the overhead of safe room procedures.
    Type: Grant
    Filed: March 30, 2023
    Date of Patent: July 8, 2025
    Assignee: Amazon Technologies, Inc.
    Inventors: Eric Chase, Derin L Fleming, Jackson Hill
  • Patent number: 12348386
    Abstract: In one embodiment, a service receives administration traffic data in a network associated with a remote administration session in which a control device remotely administers a client device. The service analyzes the administration traffic data to determine whether any portion of the administration traffic data is resulting from an administration session involving a trusted administrator. The service flags a first portion of the administration traffic data as authorized when the first portion of the administration traffic data is determined to result from an administration session involving a trusted administrator, and a second portion of the administration traffic data is non-flagged. The service assesses the second portion of the administration traffic data using a machine learning-based traffic classifier to determine whether the second portion of the administration traffic data is malicious.
    Type: Grant
    Filed: February 21, 2024
    Date of Patent: July 1, 2025
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Martin Rehak, Blake Harrell Anderson, Sunil Amin
  • Patent number: 12347924
    Abstract: The present disclosure relates to an antenna apparatus for a base station and an adapter thereof and particularly comprises: an antenna module vertically installed to be spaced forward from a support pole by a predetermined distance so as to have a distancing space therebetween; an RRH installed on the antenna module to be positioned in the distancing space, wherein one of the upper end and the lower end thereof is hinge-coupled to the antenna module and the other of the upper end and the lower end thereof is attached to or detached from a part of the antenna module to enable electrical signal connection or disconnection while being rotated around the hinge; and an adapter for mediating the electrical signal connection and disconnection between the antenna module and the RRH. Therefore, the present disclosure provides advantages of reducing installation time and installation costs.
    Type: Grant
    Filed: March 13, 2024
    Date of Patent: July 1, 2025
    Assignee: KMW INC.
    Inventors: Seong Man Kang, Dae Myung Park, Hyoung Seok Yang, In Ho Kim, Kwang Seok Choi
  • Patent number: 12348617
    Abstract: Systems, computer program products, and methods are described herein for generating data strings and for managing encrypted data in data containers in an electronic network. The present invention is configured to identify at least one data container, wherein the at least one data container comprises encrypted data; interrogate the at least one data container; determine at least one encryption associated with the encrypted data of the data container; receive at least one encryption key associated with the encrypted data; receive at least one tag associated with the encrypted data, wherein the at least one tag comprises at least one location identifier associated with the encrypted data; generate a string for the data of the data container, wherein the string comprises the at least one tag; and decrypt the encrypted data of the data container based on the at least one encryption key.
    Type: Grant
    Filed: January 12, 2023
    Date of Patent: July 1, 2025
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Antoan Fotev Izmirliev, Manu Jacob Kurian
  • Patent number: 12346471
    Abstract: A method and apparatus for hard deletion of user data are described. The method may include receiving a request from a user computer system to delete user data. The method may also include determining a unique user identifier associated by a system with a user making the request. The method may also include determining whether a data partition, in which data generated by a job or subsystem of the computer system is stored, is predicted to contain a record having the unique user identifier. Then, the method may include searching, when the data partition is predicted to contain a record having the unique user identifier, data records stored in the data partition for a user data record based on the unique identifier, and performing a hard deletion of the user data record from the partition when found during the searching.
    Type: Grant
    Filed: December 20, 2023
    Date of Patent: July 1, 2025
    Assignee: Stripe, Inc.
    Inventors: Ryan Drapeau, Andrew Bullen
  • Patent number: 12346474
    Abstract: Methods, systems, and apparatuses embodied herein control and track access to secured data independent of the asset storing the secured data. In this regard, some embodiments organize volumes including one or more datasets and attach one or more assets to each volume. Some embodiments further receive data permissions of use information, for example from a data steward device, for the volume and datasets, which are registered with the volume and the datasets. Some embodiments further receive a set of restrictions, retrieve the dataset permissions of use information for one or more dataset identifiers, and determine the restrictions do not conflict with the dataset permissions of use information. Some embodiments further generate, and subsequently store, an indication the set of restrictions is valid when the dataset permissions of use information does not conflict. Permissions of use information may be organized into persona data objects assigned to various user profiles.
    Type: Grant
    Filed: July 25, 2023
    Date of Patent: July 1, 2025
    Assignee: Optum, Inc.
    Inventors: Daniel L. Binkley, Lisa A. Hodne
  • Patent number: 12348507
    Abstract: A cloud infrastructure is configured and deployed for managing services executed on a cloud platform. The cloud infrastructure includes a control datacenter configured to communicate with one or more service datacenters. The service datacenter deploys one or more application programming interfaces (API's) associated with a service. The service datacenter also deploys an administration agent. The control datacenter hosts an engine that receives requests from users to perform administration operations by invoking the administration API's. In this manner, the control datacenter functions as a centralized control mechanism that effectively distributes administration operation requests as they are received from users to service datacenters that can service the requests. The cloud infrastructure provides an auditable, compliant and secure management system for administering services for distributed systems running in the cloud.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: July 1, 2025
    Assignee: Salesforce, Inc.
    Inventors: Prasad Peddada, Sriram Shankarlal, Giridharan Sridharan
  • Patent number: 12346490
    Abstract: Disclosed is a system for protecting electronic devices from counterfeiting and misuse. The system includes a hub unit and a smart switch. The hub unit includes a generator, a modulator and a first conductive surface. The smart switch is connected to sub-circuits and capacitively coupled to the hub unit. The smart switch includes a transmission gate, a second conductive surface, a rectifier, a buffer, a demodulator, and a latch. The smart switch receives switching instructions over an alternating electric field from the hub unit to operate the electronic device.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: July 1, 2025
    Inventors: Wolfgang Richter, Faranak Zadeh
  • Patent number: 12348616
    Abstract: A system and method for securely obtaining access to a program operating on a remote device via a local smart pass program transmitting a local cryptographic key specific to a local user device.
    Type: Grant
    Filed: December 12, 2024
    Date of Patent: July 1, 2025
    Inventors: Ruben Buckris, Linda Buckris
  • Patent number: 12341884
    Abstract: A network system to allow global usage of data while allowing regional jurisdictions control over sensitive data. Different jurisdictions may declare different types of data as sensitive data that is not to be discoverable by another party. The system may receive data that includes encoded data at a first device from a second device (e.g., associated with a remote datacenter). The system may store the data at the first device. In response to receiving a request from a third entity, the system may request a cryptographic key for decoding one or more data fields of the encoded data. Based on decoding the associated field data, the system may transmit a response to the data request that includes the decoded data.
    Type: Grant
    Filed: August 28, 2024
    Date of Patent: June 24, 2025
    Assignee: Citibank, N.A.
    Inventors: Walter Trotta, Vaibhav Kumar, Samuel J. Kass, Sasisekar Shanmugasundaram
  • Patent number: 12341871
    Abstract: The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for determining to erase a plurality of ciphertext blocks stored in a memory device, in response to determining to erase the plurality of ciphertext blocks, performing a cryptographic erasure of the plurality of ciphertext blocks. The cryptographic erasure includes encrypting each of the plurality of ciphertext blocks with a random key and destroying the random key in response to encrypting each of the plurality of ciphertext blocks.
    Type: Grant
    Filed: July 19, 2023
    Date of Patent: June 24, 2025
    Inventor: Jeffrey J. Stapleton
  • Patent number: 12332939
    Abstract: Systems and methods for text processing are described. Embodiments of the present disclosure receive a query comprising a natural language expression; extract a plurality of mentions from the query; generate a relation vector between a pair of the plurality of mentions using a relation encoder network, wherein the relation encoder network is trained using a contrastive learning process where mention pairs from a same document are labeled as positive samples and mention pairs from different documents are labeled as negative samples; combine the plurality of mentions with the relation vector to obtain a virtual knowledge graph of the query; identify a document corresponding to the query by comparing the virtual knowledge graph of the query to a virtual knowledge graph of the document; and transmit a response to the query, wherein the response includes a reference to the document.
    Type: Grant
    Filed: June 24, 2022
    Date of Patent: June 17, 2025
    Assignee: ADOBE INC.
    Inventors: Yeon Seonwoo, Seunghyun Yoon, Trung Huu Bui, Franck Dernoncourt, Roger K. Brooks, Mihir Naware
  • Patent number: 12335384
    Abstract: An encryption key generating device includes a shared key separator separating a shared key into a first key and a second key and storing the first key in a non-volatile memory and storing the second key in a volatile memory; a key extender extending the second key to the same key length as that of the first key and storing the second key extended as a third key in the volatile memory; a key calculator calculating an encryption key by an exclusive-OR of the first key and the third key and storing it in the volatile memory.
    Type: Grant
    Filed: February 15, 2022
    Date of Patent: June 17, 2025
    Assignee: National Institute of Information and Communications Technology
    Inventors: Mikio Fujiwara, Masahiro Takeoka, Masahide Sasaki
  • Patent number: 12335372
    Abstract: In one embodiment, a parallel computing system includes a key manager to assign symmetric memory keys to parallel computing jobs including a first symmetric memory key to a first parallel computing job, and a plurality of server nodes to execute parallel computing processes of the first parallel computing job, and cause registration of host memory regions of the server nodes with the assigned first symmetric memory key in corresponding network interface controllers of the server nodes so that different ones of the host memory regions are accessible with the first symmetric memory key by remote ones of the server nodes using remote direct memory access.
    Type: Grant
    Filed: March 1, 2023
    Date of Patent: June 17, 2025
    Assignee: Mellanox Technologies, Ltd.
    Inventors: Manjunath Gorentla Venkata, Artem Yurievich Polyakov, Subhadeep Bhattacharya, Gil Bloch, William Ferrol Aderholdt
  • Patent number: 12326952
    Abstract: A method for the simultaneous or contemporaneous generation of at least one encrypted compression key; the deletion of the original database; the transfer of the encrypted compression key; the reversing and decompressing of the encrypted compression key; and the recreation of the original database. The method is usable with any database. Further, the method, includes the generation of at least one encrypted compressed organization key which can be joined with the encrypted compression key to, in essence, add a layer of encryption to compression and a layer of compression to encryption. A double encrypted compressed key may be generated from the use of a trap door or one-way functionality in combination with the compression and encryption portions provided by the encrypted compression key and the encrypted compressed organization key. The encrypted compression key and the double encrypted compressed key include functional parts that accelerate and improve the accuracy of the compression.
    Type: Grant
    Filed: October 31, 2022
    Date of Patent: June 10, 2025
    Inventor: Derek Oubre
  • Patent number: 12323522
    Abstract: Provided are a computer program product, system, and method for determining an encryption technique for a modified data object to backup. Deep data inspection is performed on an object using a natural language processing module to determine facets for the object. The facets provide facet values for instances of sensitive information in the object. The facet values for the object are processed to determine a cumulative facet value. A determination is made of an encryption technique comprising one of a plurality of different encryption techniques to use on the object based on the cumulative facet value. The determined encryption technique is used to encrypt the object to transfer to a backup storage.
    Type: Grant
    Filed: November 11, 2020
    Date of Patent: June 3, 2025
    Assignee: International Business Machines Corporation
    Inventors: Gregory T. Kishi, Joseph W. Dain, Abhishek Jain, Nilesh Prabhakar Bhosale
  • Patent number: 12314395
    Abstract: Techniques for training data protection in an artificial intelligence model execution environment are disclosed. For example, a method comprises executing a first partition of an artificial intelligence model within a secure execution area of an information processing system and a second partition of the artificial intelligence model within a non-secure execution area of the information processing system, wherein data at least one of obtained and processed in the first partition of the artificial intelligence model is inaccessible to the second partition of the artificial intelligence model. Communication between the first partition and the second partition may be enabled via a model parallelism-based procedure. Data obtained in the secure execution area may comprise one or more data samples in an encrypted form usable to train the artificial intelligence model.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: May 27, 2025
    Assignee: EMC IP Holding Company LLC
    Inventors: Jinpeng Liu, Michael Estrin, Zhen Jia, Kenneth Durazzo
  • Patent number: 12314709
    Abstract: A method and a system for maintaining immutability of evidence that relates to software development life cycle data and that is protected from tampering in order to guarantee data integrity and consistency are provided. The method includes: receiving an evidence item that relates to a software development; encrypting the evidence item; storing the encrypted evidence item in a memory; computing a hash value based on the evidence item; and combining the hash value with a hash tree that relates to the software development. The hash tree includes a set of hash values for which there is a one-to-one correspondence with a set of evidence items that are represented in the hash tree. When tampering, such as content alteration or deletion, occurs with respect to an evidence item, the hash values in the hash tree may be used to determine the evidence item for which the tampering has occurred.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: May 27, 2025
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Sandhya Sridharan, Thangamani Kasi, Karthick Selvaraj, Kumaran Kamalakannan
  • Patent number: 12314190
    Abstract: A micro-controller chip is coupled to an external memory and includes a central processing unit (CPU), an address reorder circuit, and an address bus. The CPU is configured to provide a first internal address. The address reorder circuit calculates a unique identifier and a seed code to generate a base parameter and performs a reorder operation for the first internal address according to the base parameter to generate a first encryption address. The address bus is coupled between the address reorder circuit and the external memory to provide the first encryption address to the external memory. The external memory stores specific data according to the first encryption address.
    Type: Grant
    Filed: November 25, 2022
    Date of Patent: May 27, 2025
    Assignee: NUVOTON TECHNOLOGY CORPORATION
    Inventor: Yu-Hui Tu
  • Patent number: 12314398
    Abstract: This application discloses a remote attestation method and an apparatus. The method specifically includes: A first network device receives encrypted information and first measurement information of a second network device through the second network device, where the encrypted information is information obtained by encrypting second measurement information of a third network device; the first network device determines, based on the first measurement information, that the second network device is system-trusted; and the first network device decrypts the encrypted information to obtain the second measurement information.
    Type: Grant
    Filed: January 11, 2022
    Date of Patent: May 27, 2025
    Assignee: Huawei Techologies Co., Ltd.
    Inventors: Liang Xia, Wei Pan, Yulin Shi, Jianxiong Wei
  • Patent number: 12301717
    Abstract: An electronic device is provided. The electronic device includes a memory and a processor, the processor allocates first and second address spaces (AS) to the memory in rich execution environment (REE) when detecting a request to write data, writes the data to the first AS and detect access to the second address space in the REE, configures access permission of a first user virtual memory AS (VMAS), mapped to the first address space, in the REE so that write access is deactivated by a trusted environment manager when detecting access to the second AS, configures access permission of a second user VMAS, mapped to the second AS, in the REE so that read access is activated and write access is deactivated, and configures access permission of a first kernel VMAS, mapped to the first AS, in the REE so that write access is deactivated by the trusted environment manager.
    Type: Grant
    Filed: February 22, 2023
    Date of Patent: May 13, 2025
    Assignees: Samsung Electronics Co., Ltd., KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATION
    Inventors: Dongwook Shim, Donghoon Lee
  • Patent number: 12299158
    Abstract: A method for sharing encrypted data including encrypting first data with at least one first attribute. The first attribute satisfies a first access policy of a first cryptographic key to enable one or more first users holding the first cryptographic key to decrypt the encrypted first data using the first cryptographic key. The method includes encrypting second data with at least one second attribute of the second data. The method includes generating a second cryptographic key based on a second access policy including at least one logical connective of the first attribute and the second attribute for decrypting the encrypted first data and the encrypted second data using the second cryptographic key and providing the second cryptographic key to one or more second users to enable the second users to decrypt the encrypted first data and the encrypted second data.
    Type: Grant
    Filed: June 23, 2021
    Date of Patent: May 13, 2025
    Assignee: SONY GROUP CORPORATION
    Inventors: Dimitri Torfs, Alexandru Serbanati, Michele Minelli
  • Patent number: 12299146
    Abstract: A system for secure sharing of documents via a content management repository is provided. The system includes a content management unit, a filtering unit, a graphical user interface, and a memory communicatively coupled to the content management unit. The content management unit is configured to receive content restriction rules for content stored in the content management repository. The content management unit is further configured to inject the content restriction rules into policy rules. The content management unit is configured to intercept an Application Programming Interface call for the content from a user. The filtering unit is configured to dynamically filter the content based on the content restriction rules. The graphical user interface is configured to render the filtered content to display the filtered content to the user.
    Type: Grant
    Filed: October 11, 2021
    Date of Patent: May 13, 2025
    Assignee: Rocket Software Technologies, Inc.
    Inventors: Matthew Schwartz, Srihari Ranganathan
  • Patent number: 12301554
    Abstract: Authorization for a user may be dynamically tailored per application or per application function, rather than globally managed by an administrator. For example, in some embodiments, an identity access management system may generate a suitable authorization token (or authorization token information) to enable a user to login to an application or perform a particular function. The authorization token may be dynamically generated and tailored based on filtering various identity information otherwise available from an identity system, access boundaries of applicable application functions, or other factors.
    Type: Grant
    Filed: August 23, 2022
    Date of Patent: May 13, 2025
    Assignee: Level 3 Communications, LLC
    Inventors: Sylvan H. Morley, III, Jamie Lin, Michael Benjamin, John Knies
  • Patent number: 12292999
    Abstract: A tokenization system receives a request for data anonymization, the request referencing structured data containing values of interest. Responsively, the tokenization system performs a tokenization operation on the structured data, generates a corresponding token, and replaces a value of interest with the corresponding token to produce an anonymized version of the structured data. The tokenization system stores the value of interest with the corresponding token in a secure data vault. Subsequently, the tokenization system may receive a request for revealing the anonymized version of the structured data containing the corresponding token. In response, the tokenization system can perform a reveal operation on the anonymized version of the structured data by querying the secure data vault for the corresponding token and retrieving the value of interest from the secure data vault using the corresponding token.
    Type: Grant
    Filed: August 27, 2021
    Date of Patent: May 6, 2025
    Assignee: OPEN TEXT HOLDINGS, INC.
    Inventor: Walter Hughes Lindsay
  • Patent number: 12291047
    Abstract: An inspection apparatus includes a conveyer configured to convey a medium having a plurality of printing areas in a conveying direction, a reader configured to read images printed in the printing areas, and a controller. When a plurality of images, each of which a printing position of a code in the printing area is the same as the other images, are respectively printed in the printing areas, the controller causes the reader to read a prescribed image, inspects whether the code satisfies a prescribed condition, acquires position information for specifying a printing position of the code, causes the reader to read an upstream image in a printing area upstream of the prescribed image, extracts a processing range in which the code is included from a read image of the upstream image based on the position information, and inspects whether the code included in the processing range satisfies the prescribed condition.
    Type: Grant
    Filed: February 14, 2023
    Date of Patent: May 6, 2025
    Assignee: BROTHER KOGYO KABUSHIKI KAISHA
    Inventor: Akidi Yoshida
  • Patent number: 12294596
    Abstract: A lightweight intrusion detection method includes obtaining a feature data set of the internet of vehicles and pre-processing data; dividing pre-processed data into an initial training set, an initial verification set and an initial test set according to a preset proportion, performing data balance on the initial training set to obtain a balanced training set, performing feature selection on the balanced training set, the initial verification set and the test set; obtaining a teacher model by training with the model training set and the model verification set; using the teacher model, the model training set and the model verification set for distillation training to obtain a student model; testing a size and complexity of the student model and the performance of the student model, and saving the student model that passes the test as a lightweight intrusion detection model; and deploying the lightweight intrusion detection model.
    Type: Grant
    Filed: October 22, 2024
    Date of Patent: May 6, 2025
    Assignee: GUANGZHOU UNIVERSITY
    Inventors: Wenli Shang, Xiaojun Yang, Shuqi Li, Xiaobin Gao, Zhiwei Chang, Zheng Zhou
  • Patent number: 12292972
    Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.
    Type: Grant
    Filed: April 7, 2022
    Date of Patent: May 6, 2025
    Inventor: Manbinder Pal Singh
  • Patent number: 12282566
    Abstract: There is provided a method performed by an encryption node for provisioning storage in a system. The encryption node is associated with an application node and the application node is configured to run at least part of one or more applications. In response to an unencrypted storage volume becoming available to the encryption node from a storage provisioning node of the system, an encrypted storage volume is generated (20) from the unencrypted storage volume and provisioning of the encrypted storage volume is initiated (22) to make the encrypted storage volume available at a compute node of the system for use by the application node.
    Type: Grant
    Filed: February 7, 2020
    Date of Patent: April 22, 2025
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Oliver Speks, Raphael Quinet, Nikolas Hermanns, Georg Kunz
  • Patent number: 12282549
    Abstract: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    Type: Grant
    Filed: May 23, 2022
    Date of Patent: April 22, 2025
    Assignee: OPEN TEXT INC.
    Inventors: Melvyn Morris, Paul Stubbs, Markus Hartwig, Darren Harter
  • Patent number: 12277256
    Abstract: A storage device includes a substrate, at least one data storage element, a case, and at least one sensing pin. The substrate includes at least one security pad. The data storage element is mounted on the substrate. The case surrounds the substrate and the data storage element, and includes at least one contact structure for an electrical connection with the security pad. The sensing pin receives an electrical signal. A level of the electrical signal varies by detecting a change in a resistance according to whether the security pad is electrically connected to the contact structure. When at least a part of the case is removed, a level change of the electrical signal is detected, and a secure erase process for data stored in the data storage element is performed.
    Type: Grant
    Filed: December 22, 2020
    Date of Patent: April 15, 2025
    Assignee: SAMSUNG ELECTRONICS CO., LTD.
    Inventors: Insub Kwak, Sungki Lee, Chunghyun Ryu
  • Patent number: 12273360
    Abstract: Secured automated or semi-automated systems are provided herein. In one embodiment, a sensor system includes a sensor, a legacy computing environment that is configured to communicate with the sensor and process sensor raw data output, and transmit the processed sensor output to a first network node over the network, and a trusted computing environment configured to receive raw sensor output directly from the sensor and transmit the raw sensor output to an additional network node or the first network node over the network.
    Type: Grant
    Filed: June 17, 2021
    Date of Patent: April 8, 2025
    Inventor: Mordecai Barkan
  • Patent number: 12271604
    Abstract: A recording control system includes a storage medium and a control device that is detachably connectable to and controls reading/writing of data to/from the storage medium. The storage medium stores a first authentication code corresponding to at least one first attribute of the storage medium among attributes regarding reading and writing. The control device includes: a readout unit that outputs first request information to the storage medium to read therefrom at least one common authentication code each corresponding to a respective one of at least one common attribute of the first authentication code and the first request information, the first request information corresponding to at least one second attribute of the control device; an identification unit that identifies the at least one common attribute according to the at least one common authentication code; and a control unit that controls the reading/writing according to the at least one common attribute.
    Type: Grant
    Filed: March 4, 2020
    Date of Patent: April 8, 2025
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventors: Takeshi Ootsuka, Hideaki Yamashita
  • Patent number: 12267415
    Abstract: Systems, devices, and techniques are disclosed for cryptographic key migration. A tenant host may determine a first Key Management Service (KMS) indicated as storing a cryptographic key associated with the tenant host from a new KMS mapping. The tenant host may send a request for the cryptographic key associated with the tenant host to the first KMS. The tenant host may receive an indication from the first KMS that the first KMS does not store the cryptographic key. The tenant host may determine a second KMS indicated as storing the cryptographic key associated with the tenant host from an original KMS mapping. The tenant host may receive the cryptographic key associated with the tenant host from the second KMS. The tenant host may send a request to the second KMS that the cryptographic key associated with the tenant host be replicated from the second KMS to the first KMS.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: April 1, 2025
    Assignee: Salesforce, Inc.
    Inventors: Sudhir Srinivasan, Jing Jin