Tokens (e.g., Smartcards Or Dongles, Etc.) Patents (Class 726/9)
-
Patent number: 12395342Abstract: A method for using biometric data to authenticate a subject as an individual whose biometric data has been previously obtained. In this embodiment, the method utilizes a series of computer processes with asymmetrically loaded servers that are configured with one-time values for use in multi-party computing to perform the authentication.Type: GrantFiled: November 22, 2024Date of Patent: August 19, 2025Assignee: Badge Inc.Inventors: Charles H. Herder, III, Tina P. Srivastava, Young Hyun Kwon
-
Patent number: 12389225Abstract: A secure electric vehicle (EV) charger and system incorporating thereof is provided. One embodiment includes an EV charger. The EV charger includes a processor, a low power short range point-to-point communication system, and a memory containing an authentication software application. The processor is configured by the authentication software application to receive an authentication request from a mobile device via the low power short range point-to-point communication system, send encrypted EV charger access credentials to the mobile device, receive a digital token from the mobile device, verify the digital token, and initiate a charging session based upon a command contained within the digital token. The digital token may be encrypted using a public key and may be self-authenticating without use of an internet connection thus enabling secure charging without the presence of an internet connection.Type: GrantFiled: March 7, 2024Date of Patent: August 12, 2025Assignee: EVE Energy Ventures Inc.Inventor: Nikhil Srinath Bharadwaj
-
Patent number: 12380217Abstract: A method, computer program, and computer system are provided for predicting and assessing risks on websites. Data corresponding to historical interactions of a user with one or more websites is accessed. A simulation of actions of the user is generated based on the accessed data, and actions of the user are simulated on a pre-defined target website based on the generated simulation of the actions of the user. Risks on the target website are identified based on simulating the actions of the user. The website is updated to mitigate the identified risks.Type: GrantFiled: March 22, 2022Date of Patent: August 5, 2025Assignee: International Business Machines CorporationInventors: Ambrish Rawat, Stefano Braghin, Killian Levacher, Ngoc Minh Tran, Giulio Zizzo
-
Patent number: 12379770Abstract: Systems and processes for an integrated sensor framework are provided. For example, a first electronic device receives at least one input including sensor data from a second device. A representation of a physical environment associated with the first electronic device is obtained based on sensor data from the first electronic device and the sensor data from the second device. Movement information corresponding to movement of an object within the physical environment is identified. Event information is determined corresponding to activity within the physical environment, wherein the event information is determined based on the identified movement information and the representation of the physical environment. Accordingly, an output is provided to the user based on the event information.Type: GrantFiled: September 22, 2023Date of Patent: August 5, 2025Assignee: Apple Inc.Inventors: Richard T. Vaughan, Jamil Dhanani, Juan C. Garcia, Seyedmehdi Mohaimenianpour, Geoffrey Nagy, Timothy S. Paek, Naga Rama Abhishek Pratapa, Muhammad Amir Shafiq
-
Patent number: 12373519Abstract: A device may receive license data identifying device licenses and organization licenses associated with an organization of users of a multi-tenant system, and may identify, in the license data, entitlements for licenses associated with the organization. The device may combine the entitlements to generate combined entitlements, and may determine an entitlement count of the combined entitlements. The device may add quantities of new entitlements to the entitlement count, and may identify, in the license data, roles of the users and capabilities associated with each of the roles. The device may map the entitlements and the capabilities to generate a mapping, and may authorize a particular user based on the mapping. The device may process usage of the entitlements, with a machine learning model, to predict future usage of the entitlements, and may determine entitlement recommendations based on the future usage. The device may provide the entitlement recommendations for display.Type: GrantFiled: May 23, 2024Date of Patent: July 29, 2025Assignee: Juniper Networks, Inc.Inventors: Viren L. Shah, Jayanthi R, Ritesh Shelat, Premchandar N, Bhaskar T. Reddy, Chandrasekhar A
-
Patent number: 12373817Abstract: Systems and methods are disclosed herein for a user to use a trusted device to provide sensitive information to an identity provider via QR (Quick Response) code for the identity provider to broker a website login or to collect information for the website. A user may securely transact with the website from unsecured devices by entering sensitive information into the trusted device. The identity provider may generate the QR code for display by the website on an unsecured device. A user running an application from the identity provider on the trusted device may scan the QR code to transmit the QR code to the identity provider. The identity provider may validate the QR code and may receive credential information to authenticate the user or may collect information for the website. Advantageously, the user may perform a safe login to the website from untrusted devices using the trusted device.Type: GrantFiled: April 19, 2023Date of Patent: July 29, 2025Assignee: PAYPAL, INC.Inventors: Daniel B. DeSoto, Mark Andrew Peskin
-
Patent number: 12368701Abstract: This application relates to a subscription data management method, apparatus, and system. The method includes: a first network element receives, from a second network element, a request message for subscription data; obtains a security token of a terminal device, where the security token is used to verify permission to obtain the subscription data; provides the security token for a blockchain, and queries the blockchain about the subscription data; and if verification succeeds, obtains address information of the subscription data from the blockchain, and sends the address information of the subscription data to the second network element. In the method, the permission to obtain the subscription data is determined by using the blockchain, so that when a subscribed network device does not participate, a visited network device can still obtain the subscription data.Type: GrantFiled: May 6, 2022Date of Patent: July 22, 2025Assignees: Huawei Technologies Co., Ltd, University of Science and Technology of ChinaInventors: Kaiping Xue, Hangyu Tian, Jianan Hong
-
Patent number: 12363072Abstract: Techniques for providing stateless cloud authentication are disclosed. In some embodiments, a system/method/computer program product for providing stateless cloud authentication includes receiving a request at a first firewall of a cloud-based security service to access a protected resource; generating an authentication token with opaque information using a cloud authentication service; and verifying the authentication token using the opaque information.Type: GrantFiled: December 29, 2022Date of Patent: July 15, 2025Assignee: Palo Alto Networks, Inc.Inventor: Jinsheng Gu
-
Patent number: 12346486Abstract: An encryption processing system in which an application accesses a security module, via software, from a device driver that communicates with the software, in which the software issues an identifier for managing a session for each access request from the application, to identify accesses from plural applications, and notifies the device driver of identifiers together with commands.Type: GrantFiled: July 28, 2022Date of Patent: July 1, 2025Assignee: FUJIFILM Business Innovation Corp.Inventor: Kenji Kuroishi
-
Patent number: 12346429Abstract: An authentication code for an authentication process such as multifactor authentication can be automatically inputted according to some examples described herein. In one example, a computing device can execute an authenticator application to generate an authentication code for use during an authentication process associated with a user logging into an account. The computing device can establish a connection with a target device that is separate from the computing device. The target device may be configured to display a graphical user interface that includes an input box into which the user is to manually type the authentication code as part of the authentication process. The computing device can transmit the authentication code to the target device via the connection. The target device can be configured to receive the authentication code and automatically enter the authentication code into the input box on behalf of the user.Type: GrantFiled: December 13, 2022Date of Patent: July 1, 2025Assignee: Red Hat, Inc.Inventor: Michael Tsirkin
-
Patent number: 12348504Abstract: Systems and methods for passing account authentication information via parameters. A server can provide, to a client device, an account parameter derived from an account credential used to authenticate a first application to insert into a link. The link can include an address referencing a second application. The account parameter can be passed from the first application to the second application responsive to an interaction on the link. The server can receive from the second application of the client device, subsequent to passing the account parameter from the first application to the second application, a request to authenticate the second application including the account parameter. The server can authenticate the client device for the second application using the account parameter. The server can transmit, responsive to authenticating the client device for the second application, an authentication indication to the second application of the client device.Type: GrantFiled: June 4, 2024Date of Patent: July 1, 2025Assignee: GOOGLE LLCInventors: Justin Lewis, Abhiram Kasina
-
Patent number: 12346706Abstract: Systems and methods for firmware-based switching between user profiles in a heterogenous computing platform. In an illustrative, non-limiting embodiment, an Information Handling System may include: a heterogeneous computing platform comprising a plurality of devices, and a memory coupled to the platform having a plurality of sets of firmware instructions, where each of the sets of firmware instructions, upon execution by a respective device, enables the respective device to provide a firmware service, and at least one of the devices operates as an orchestrator configured to: execute or instruct a device to execute an Artificial Intelligence model configured to produce an inference result based, at least in part, upon context or telemetry data received from a subset of the plurality of devices; select one of a plurality of user profiles based upon the inference result; and apply a setting associated with the selected user profile to a selected device.Type: GrantFiled: November 2, 2022Date of Patent: July 1, 2025Assignee: Dell Products, L.P.Inventors: Daniel L. Hamlin, Srikanth Kondapi, Nikhil Manohar Vichare
-
Patent number: 12335398Abstract: Disclosed are various embodiments for conditional time-based one time password token issuance based on locally aggregated device risk. Embodiments of this application can evaluate the security of the client device using mobile threat defense signals or a device posture summary before generating a seed on the client device to ensure the security of all the connected systems as a whole. Additionally, embodiments of this application can evaluate the security of the client device to determine if changes have been made that require a remedial action to be taken. In some embodiments, the client device may be completely disconnected from the network and capable of generating time-based one time passwords, while remaining offline. However, offline attacks may still occur; in such a situation, the client device can determine the security of the device and perform the remedial actions independent of other devices, systems, computing environments, or networks.Type: GrantFiled: October 27, 2022Date of Patent: June 17, 2025Assignee: Omnissa, LLCInventors: Rahul Parwani, Evan H. Hurst, Maxim J. Blinder, Gazal Makkar, Rijul Nirwal
-
Patent number: 12335399Abstract: A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.Type: GrantFiled: June 4, 2021Date of Patent: June 17, 2025Assignee: Winkk, Inc.Inventor: Robert O. Keith, Jr.
-
Patent number: 12332991Abstract: Authentication devices and methods. The authentication device includes a connection component configured to establish a physical connection with a computing system configured to perform at least an authentication procedure, a housing including a screen portion to at least visually present authentication data as part of an interaction with the computing system, and a cable portion connecting the housing and the connection component, wherein the cable portion is configured to prevent stress from being imparted on the connection component at least due to handling of the housing.Type: GrantFiled: July 26, 2022Date of Patent: June 17, 2025Assignee: RSA SECURITY USA, LLCInventors: Kerry Matthew, Thomas Levins, Mohamed Ibrahim Ahmed Hassan Mahmoud
-
Patent number: 12332843Abstract: A data management apparatus selects a trail from management data. The management data includes, for an operation item regarding a system to be operated, data representing a workflow representing one or a plurality of works constituting a business of a system operation and associated with the operation item, and data representing a regulation matter associated with the operation item for a standard or a law. A trail is associated with the workflow. The data management apparatus performs deletion determination that is determination as to whether or not the selected trail can be deleted. The deletion determination includes a determination as to whether or not the current date and time exceeds the holding expiration time of the selected trail.Type: GrantFiled: February 22, 2024Date of Patent: June 17, 2025Assignee: HITACHI, LTD.Inventor: Yasuhiro Uehara
-
Patent number: 12323411Abstract: In some implementations, a front-end device may receive, from a brain-machine interface (BMI) associated with a user, a request to authenticate the user with secret information associated with the user. Accordingly, the front-end device may transmit, to the BMI, a request for an identifier associated with one or more hardware components of the BMI. The front-end device may receive, from the BMI, an indication of the identifier associated with the one or more hardware components. Accordingly, the front-end device may authenticate the user based on the secret information associated with the user and the identifier associated with the one or more hardware components. Additionally, or alternatively, the front-end device may authenticate the user based on a location of an external device associated with the user and/or an indication of a biometric property associated with the user.Type: GrantFiled: February 25, 2022Date of Patent: June 3, 2025Assignee: Capital One Services, LLCInventors: Jennifer Kwok, Salik Shah, Zviad Aznaurashvili
-
Patent number: 12317080Abstract: Disclosed are a method and apparatus for detecting a logic vulnerability allowing arbitrary password reset for an account, and a computer readable storage medium. The method includes: invoking a preset identification program to determine whether a request for a verification code is initiated in a to-be-detected webpage; obtaining, from a front-end page, a response packet sent in response to the request for a verification code, and determining whether there is a short message service (SMS) verification code in the response packet, on determining that a request for a verification code is initiated in the to-be-detected webpage; and; and determining that the logic vulnerability allowing arbitrary password reset for an account exists in the to-be-detected webpage, on determining that there is an SMS verification code in the response packet.Type: GrantFiled: June 8, 2021Date of Patent: May 27, 2025Assignee: DBAPPSECURITY CO., LTDInventors: Yu Lou, Yuan Fan
-
Patent number: 12302055Abstract: Embodiments of this application provide a method for detecting a connection to a headset port of an electronic device, an electronic device, and a readable storage medium. When a headset component is connected to the headset port of the electronic device, if it is detected that the electronic device does not have a function of performing conversion between digital audio and analog audio and that the headset component connected to the headset port of the electronic device is an analog component, it is determined that the headset port cannot support the connected headset component. In this way, an electronic device omitting a codec can determine that an analog headset cannot be used.Type: GrantFiled: April 26, 2022Date of Patent: May 13, 2025Assignee: HONOR DEVICE CO., LTD.Inventors: Ting Huang, Changying Zhang, Chen Zhu
-
Patent number: 12288432Abstract: A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allow for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.Type: GrantFiled: January 29, 2024Date of Patent: April 29, 2025Assignee: COLLATERAL OPPORTUNITIES, LLCInventors: Bruce Howard Kusens, Michael Kusens
-
Patent number: 12287910Abstract: An example operation includes one or more of determining a portion of memory in a transport for storing sensitive temporary data, setting a hardware threshold of a maximum number of reads of the data from the portion of memory, and clearing the data from the portion of memory with a hardware-enabled trigger in response to the maximum number of reads is reached.Type: GrantFiled: September 9, 2021Date of Patent: April 29, 2025Assignee: TOYOTA MOTOR NORTH AMERICA, INC.Inventors: Roger J. Baker, Satyajit P. Patne
-
Patent number: 12284187Abstract: A micropattern detection-based method and system of performing an authentication of video of a person in order to authorize access to a secured resource is provided. The user provides image data in which they present a secondary computing device with a specially fabricated screen cover. The screen cover includes a plurality of micro-holes that collectively provide a unique micropattern. When the user adjusts a display setting, the micropattern, previously cloaked, becomes apparent as an arrangement of pinpoints of light. The system and method are configured to evaluate the image data to determine whether the micropattern is present. If a micropattern is present, the system determines the image is authentic and can verify an identity of the person. In some cases, the system can further be configured to automatically grant the person access to one or more services for which they are authorized.Type: GrantFiled: January 27, 2023Date of Patent: April 22, 2025Assignee: United Services Automobile Association (USAA)Inventors: Brian Francisco Shipley, Brian Tougas, Gideon Bowie Luck, Sean Carl Mitchem, Christopher Russell, Andre Rene Buentello, Jose L. Romero, Jr., David Joaquin Harris
-
Patent number: 12271501Abstract: A procedure includes transmitting request information concerning user data requested to be collectively acquired, to an agreement server, requesting a token by scheduling a transmission timing of a token request for requesting to issue the token associated with a plurality of users from whom the agreement has been obtained among the users who fall under the request information, and by transmitting the token request to the agreement server in accordance with the scheduling, and acquiring, from a data management server, the user data not acquired yet in the user data on the users from whom the agreement has been obtained, by using the token acquired in the requesting the token.Type: GrantFiled: July 21, 2021Date of Patent: April 8, 2025Assignee: FUJITSU LIMITEDInventor: Takao Ogura
-
Patent number: 12271560Abstract: Aspects of the present invention relate to user interface control of a head-worn computer.Type: GrantFiled: October 6, 2023Date of Patent: April 8, 2025Assignee: Mentor Acquisition One, LLCInventors: Nicholas Benjamin Pelis, Sean Tomas Mostajo O'Hara, Robert Michael Lohse, Andrew Carl Heisey
-
Patent number: 12273332Abstract: A secondary authentication platform operates by: probing an application server to imitate an authentication process associated with a first authentication factor; generating, via a learning function and in response to the probing, authentication pattern data associated with the first authentication factor; monitoring data transmissions from a client device that are directed to the application server; identifying authentication data associated with the first authentication factor in the data transmissions from the client device based on a comparison of the authentication data to the authentication pattern data; communicating with the client device via the network interface to authenticate a user of the client device to the secondary authentication platform via a second authentication factor; and when the user of the client device is authenticated to the secondary authentication platform via the second authentication factor, forwarding the authentication data to the application server to authenticate the user oType: GrantFiled: August 19, 2022Date of Patent: April 8, 2025Assignee: Secfense Sp. z.o.oInventors: Marcin Szary, Tomasz Kowalski
-
Patent number: 12261834Abstract: The present embodiments relate to systems and methods for automatic sign in upon account signup. Particularly, the present embodiments can utilize a federated login approach for automatic sign in upon account signup for a cloud infrastructure. Specifically, the signup and sign in service (also known as SOUP) and an identity provider portal can be configured such that the nodes are aware of each other as Security Assertion Markup Language (SAML) partners. After new account registration, the signup service can redirect the user browser to a cloud infrastructure console to start with a federated login flow, where a sign in service can issue a SAML authentication request, and redirects it to signup service. Responsive to validating the browser using a SAML authentication process, the browser can be automatically signed into the new account and allowed access the account relating to the cloud infrastructure service.Type: GrantFiled: December 18, 2023Date of Patent: March 25, 2025Assignee: Oracle International CorporationInventors: Chuang Wang, Girish Nagaraja, Ghazanfar Ahmed, Divya Jain, Weisong Lin, Zheng Guo, Roberto Anthony Franco, Philip Kevin Newman
-
Patent number: 12261748Abstract: A method of automatic and dynamic environment discovery and policy adaptation for a containerized environment is disclosed. A plurality of traffic monitoring policies for acquiring and monitoring data traffic transmitted between one or more components of a containerized environment are accessed. The containerized environment includes a plurality of software-implemented containers. The traffic monitoring policies are caused to be applied to one or more components in the containerized environment. A change to a configuration of the containerized environment is automatically detected. In response, one or more containers of the plurality of software-implemented containers are automatically identified as containers affected by the change.Type: GrantFiled: February 6, 2023Date of Patent: March 25, 2025Assignee: Gigamon, Inc.Inventors: Saritha Palnati, Naveed Cochinwala
-
Patent number: 12244585Abstract: An electronic device including a memory storing instructions; and a processor that executes the instructions to perform a process including: identifying a registered device through a scan, after identifying the registered device, connecting with the registered device based on identification information of the registered device and a preset password, to establish a communication connection with the registered device, requesting, through the established communication connection, infrared codeset information from the registered device, and after receiving the requested infrared codeset information from the registered device, transmitting, to the registered device through the established communication connection, a request for authentication of the registered device, and transmitting, to the registered device over infrared light, an authentication signal including the infrared codeset information, for authenticating the registered device.Type: GrantFiled: December 9, 2022Date of Patent: March 4, 2025Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Minju Lee, Jinho Kim, Sukun Yoon
-
Patent number: 12238226Abstract: Described is a system for secure distribution of a client certificate private key to client-based services. The system implements a specialized technique to minimize exposure of a key-encryption-key (KEK) that may be used to secure the client certificate private key that is managed by a certificate manager (CM). A client-based service generates a one-time secret message that is encrypted with the symmetric key and provided to the CM as part of a request to access the private key. The CM authenticates the request originates from a trusted before decrypting the private key with the KEK that remains known only to the CM. The CM then encrypts the decrypted private key with the secret message and provides the client-based service access to private key that is encrypted with the secret message.Type: GrantFiled: July 12, 2022Date of Patent: February 25, 2025Assignee: Dell Products L.P.Inventors: Vaneeswaran Natrayan, Mahadev Karadigudda, Satish Inampudi, Senthil Ponnuswamy
-
Patent number: 12231430Abstract: The techniques disclosed herein enable applications to seamlessly consume cloud-based services while minimizing exposure to security vulnerabilities. Specifically, an application is enabled to access a cloud service on behalf of a user without the user's active user token. Access is granted in a way that does not also grant access to any other user's cloud service. In some configurations, during an active user session, an artifact token is generated that caches the user's permissions. The artifact token may later be redeemed to gain access to the user's cloud service. For example, an application may request that a cloud service generate an artifact token. The request may be in response to a user scheduling the application to perform a task that depends on the cloud service. When the scheduled task is performed, the application may redeem the artifact token to access the user's cloud service.Type: GrantFiled: October 27, 2021Date of Patent: February 18, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Wei-ting Timothy Woo, Vladimir Fesich, Seshadri Mani, Jeffrey Lamar McDowell, Naresh Kannan
-
Patent number: 12223475Abstract: A network-based service creates a smart contract on a blockchain on behalf of a user who has a loan or a subscription that requires installment payments be collected by a provider from the user and provided to creditor of the loan or subscription. The smart contract associates a default account of the user with a first access token and non-default registered other accounts of the user with a second access token. The smart contract when presented with the access tokens from a provider determines whether the payment due can be satisfied from a current balance of the default account and if so, transfers the payment from the default account to the provider. If the default lacks sufficient funds for the payment, the smart contract proportions the amounts taken from each of the accounts to reach the amount due and transfers the amount due to the provider.Type: GrantFiled: November 30, 2022Date of Patent: February 11, 2025Assignee: NCR Atleos CorporationInventors: Dinesh Kumar Nayak, Krishna Kumari
-
Patent number: 12218916Abstract: Exemplary embodiments include an intelligent secure networked system configured by at least one processor to execute instructions stored in memory to form a protective layer between an application and a cybersecurity risk, the system including a HTTPS load balancer in communication with a controller/proxy, the controller/proxy in communication with a session database, a secrets management server and a workflow engine, the workflow engine in communication with the session database, the secrets management server and an integration station, and a hub server in communication with the session database, the secrets management server, and a hub client. The HTTPS load balancer may be configured to perform load balancing and autoscaling of communications to the controller/proxy. The controller/proxy may be configured to write session data to the session database, and the controller/proxy may be configured to read secrets to the secrets management server.Type: GrantFiled: December 28, 2021Date of Patent: February 4, 2025Assignee: SpecTrust, Inc.Inventors: Nate Kharrl, Colben Matthew Kharrl
-
Patent number: 12204665Abstract: A method and apparatus for providing support for Secure Objects on a data processing system including providing a Secure Object comprising code and data that is protected on the data processing system on a first processor which is a first type of processor, wherein the data processing system includes a plurality of processors of different types, responsive to a portion of the Secure Object being needed to be executed on a second processor which is a second type of processor different than the first type of processor, by the first processor calling the second processor in a special interprocessor call, returning information by the second processor to the first processor, and retrieving, by the first processor, the information from the second processor.Type: GrantFiled: October 4, 2022Date of Patent: January 21, 2025Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Richard H. Boivie
-
Patent number: 12200816Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.Type: GrantFiled: March 23, 2023Date of Patent: January 14, 2025Assignee: Prove Identity, Inc.Inventors: Jeffrey Robert Naujok, Prashant Janakrai Desai, Michael Stearne, Rodger R. Desai, Ryan Alexander, Kyle Price
-
Patent number: 12200479Abstract: According to various embodiments, a cellular architecture for enhanced privacy regarding identity and location of a computing device is disclosed. The architecture includes a next generation core (NGC). The NGC includes an authentication server function (AUSF) configured to determine whether the computing device contains a valid subscriber identity module (SIM) card, and a user plane function (UPF) configured to allow a computing device to connect to the Internet. The architecture further includes a gateway connected to the UPF, the gateway configured to authenticate the computing device while hiding the identity of the computing device by verifying authentication tokens that represent units of access.Type: GrantFiled: March 2, 2021Date of Patent: January 14, 2025Assignee: THE TRUSTEES OF PRINCETON UNIVERSITYInventor: Paul Schmitt
-
Patent number: 12200135Abstract: A computer-implemented method to enable short-range wireless communication via a webpage on a computing device includes receiving, via a web-browser executing on the computing device, from the webpage, a first request to execute a computer-executable instruction, the computer-executable instruction requests data from an enterprise server. The method also includes triggering, in response to a second request from the enterprise server to authenticate the first request, the web-browser to execute a predetermined computer program. The method also includes scanning, by the predetermined computer program a cryptogram from a contactless card to authenticate the cryptogram and cause the enterprise server to send the data. The method also includes executing, via the web-browser, the computer-executable instruction from the first request in response to receiving the data sent by the enterprise server.Type: GrantFiled: June 13, 2023Date of Patent: January 14, 2025Assignee: Capital One Services, LLCInventors: Jeffrey Carlyle Wieker, Paul Y. Moreton
-
Patent number: 12197974Abstract: Techniques are disclosed for generating a message stream configured to indicate a source of the various messages within the message stream. In particular, the indicators identify which interface the messages were received at a terminal (e.g., of a mobile handset). The terminal receives messages on various interfaces, and separates the messages received via different interfaces with interface switch indicators within the message stream. In one embodiment, the smart card receives a message stream that includes sets of messages and interface switch indicators therein. The smart card delivers messages from the message stream to a single logical partition of the smart card up until an interface switch indicator is identified in the message stream. From that point, the smart card delivers messages from the message stream to a different logical partition of the smart card up until another interface switch indicator is identified in the message stream.Type: GrantFiled: June 8, 2022Date of Patent: January 14, 2025Assignee: Oracle International CorporationInventors: Sebastian Jürgen Hans, Lucian Adrian Ungurean
-
Patent number: 12197466Abstract: A content management system enables a central server to connect to remote nodes at client sites. Software modules on the remote node is responsible for making necessary calls to the central server in order to create an index of the relevant data (or metadata) and fetch the appropriate binary information and files for the related metadata. Remote nodes are populated with data from the content management system via crawl/synchronize methods, or alternatively a hard drive of the data is initially configured at headquarters whereby data is saved to prevent trafficking data over a potentially unreliable connection over an extended period of time. The hard drive is then installed at the remote site and synchronized with the software module running in high performance enterprise library (HPEL) mode. The HPEL enabled server is configured to crawl and synchronize all the data and pick up differences in data using differential crawls.Type: GrantFiled: December 21, 2020Date of Patent: January 14, 2025Inventors: Peter Vanleeuwen, Robert Haskett, Jason Cassidy, Ben Barth, Khalid Merhi, Mervin Bowman, Gorgi Terziev
-
Patent number: 12192031Abstract: A method for operating a software framework is provided. The method may be applied to a software framework applicable to a gateway device, the software framework includes an application service layer and a basic service layer, the application service layer includes at least one device service registered in advance, and the basic service layer includes a data bus built in advance. The method includes: realizing a capability of a device associated with the gateway device based on the device service; and realizing communication between the device service and an external service based on the data bus, where the external service includes a device service belonging to a same gateway device as the device service or a different gateway device than the device service.Type: GrantFiled: September 6, 2022Date of Patent: January 7, 2025Assignee: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.Inventors: Sichang Fu, Guoliang Li
-
Patent number: 12192186Abstract: Techniques for routing service mesh traffic based on whether the traffic is encrypted or unencrypted are described herein. The techniques may include receiving, from a first node of a cloud-based network, traffic that is to be sent to a second node of the cloud-based network and determining whether the traffic is encrypted or unencrypted. If it is determined that the traffic is encrypted, the traffic may be sent to the second node via a service mesh of the cloud-based platform. Alternatively, or additionally, if it is determined that the traffic is unencrypted, the traffic may be sent to the second node via an encrypted tunnel. In some examples, the techniques may be performed at least partially by a program running on the first node of the cloud-based network, such as an extended Berkeley Packet Filter (eBPF) program, and the like.Type: GrantFiled: November 14, 2023Date of Patent: January 7, 2025Assignee: Cisco Technology, Inc.Inventors: Kyle Andrew Donald Mestery, Vincent E. Parla
-
Patent number: 12184647Abstract: Systems and methods are provided for creating and running an instance of a dynamic access control system (DACS). Trust providers may be defined in a trust broker of the DACS such that trust information associated with the trust providers can be used to create a custom data structure. Resources and resource groups may be defined in the DACS. Policies may be configured or coded in the DACS to map the custom data structure to recourses or resources groups. Additionally, policies may be configured or coded in the DACS to route the data structure and request to network segments or shared with other parties.Type: GrantFiled: November 22, 2022Date of Patent: December 31, 2024Assignee: Amazon Technologies, Inc.Inventors: Sujan Bolisetti, Shovan Kumar Das, Jessica Kira Szmajda, Harshit Kumar Tiwari, Bashuman Deb, Stephen A. Saville
-
Patent number: 12169587Abstract: A mobile device may comprise a secure memory. The mobile device may receive a request from a mobile application executing on the mobile device to store data in the secure memory. The request may comprise the data and a group identifier associated with the mobile application. A primary symmetric key associated with the group identifier may be determined. The data may be encrypted, using the primary symmetric key, to produce first encrypted data. A secondary symmetric key associated with the group identifier may be determined. The first encrypted data may be encrypted, using the secondary symmetric key, to produce second encrypted data. The second encrypted data may be stored to the secure memory.Type: GrantFiled: April 6, 2021Date of Patent: December 17, 2024Assignee: Comcast Cable Communications, LLCInventors: James Hoelsworth, Christopher Zarcone, Sai Sreenath Adabala, Thomas Kilgallon, Anvesh Paidipala, Herbert Marti, Hugo Allexis Cardona Escalante
-
Patent number: 12170730Abstract: Embodiments of the invention are directed to systems and methods for validating transactions using a cryptogram. One embodiment of the invention is directed to a method of processing a remote transaction initiated by a communication device provisioned with a token. The method comprises receiving, by a service provider computer, from an application on the communication device, a request for a token authentication cryptogram, wherein the token authentication cryptogram includes encrypted user exclusive data. The service provider computer may generate the token authentication cryptogram to include the user exclusive data. The service provider computer may send the token authentication cryptogram to the application, where the token authentication cryptogram can be used to validate the transaction, and the user exclusive data is extracted from the token authentication cryptogram during validation.Type: GrantFiled: April 6, 2022Date of Patent: December 17, 2024Assignee: Visa International Service AssociationInventors: Michael Cassin, Christian Flurscheim, Christopher Jones
-
Patent number: 12166754Abstract: A computer-implemented method to secure an interaction between at least two users in a network, whereas at least two network nodes are connected via the network. The method includes: a first user connects to the network via a first of the two network nodes, the first user creates in the network a first identity corresponding to the first user via a software application running on the first network node, whereas the creation includes the first user providing first biometric information characterizing the first user, the first biometric information is stored in encrypted form by a computer-implemented identity management system, a second user accesses the network via a second network node, the second user requests via the network consent of the first user, whereas the request is sent via the identity management system, the first user denies or approves the request of the second user via the software application.Type: GrantFiled: June 24, 2020Date of Patent: December 10, 2024Assignee: ROBERT BOSCH GMBHInventors: Claudio Cinaqui Pereira, Sibel Tezelli-Yilmaz
-
Patent number: 12165120Abstract: A system for awarding prizes to users via an electronic game of chance is disclosed. The system is configured to generate digital tokens that are cryptographically linked to respective virtual representations of a set of winnable items. The system further includes a mystery box system that is configured to serve a mystery box game to a client device, wherein the mystery box game includes a mystery box recipe that designates a respective probability of winning each winnable digital token of the set of digital tokens and is configured to randomly select a winning digital token from the set of digital tokens in accordance with the mystery box recipe. The mystery box system is further configured to award the winning digital token to the user, wherein the winning digital token is redeemable for the respective winnable item corresponding to the winning digital token.Type: GrantFiled: November 10, 2021Date of Patent: December 10, 2024Assignee: VERONA HOLDINGS SEZCInventors: Jonathan Yantis, William Edward Quigley, Lukasz Jakub Sliwka
-
Patent number: 12166914Abstract: A computing device operating on a Linux or Android platform for adding features to an in-vehicle infotainment system of a vehicle; it has an input/output interface; a power source input; a processor; and memory storing program code that, when executed by the processor, causes the processor to receive an Android-based smartphone infotainment application program; scan program code of the Android-based smartphone infotainment application program using a predefined pattern to locate a base certificate in the program code of the Android-based smartphone infotainment application program; generate a certificate-key pair from the base certificate; transmit the certificate of the certificate-key pair to the infotainment system for authentication and to enable communication with an Android protocol between the computing device and the infotainment system; and cause a display of information associated with a feature application program for display on the infotainment system; methods of use thereof.Type: GrantFiled: July 20, 2023Date of Patent: December 10, 2024Inventors: Jack Wisnia, Feng Du
-
Patent number: 12158942Abstract: An apparatus stores a security token in a memory associated with the apparatus. The security token is a software security artifact used to uniquely identify the apparatus. The apparatus receives a query message to provide the security token. The apparatus transmits the security token to be verified. In response to the security token being verified, the apparatus participates in a secured communication channel with a user device. The apparatus receives a second security token that is used for a subsequent authentication of the apparatus. The apparatus stores the second security token in the memory.Type: GrantFiled: June 29, 2022Date of Patent: December 3, 2024Assignee: Lennox Industries Inc.Inventor: Nguyen Trong Ho
-
Patent number: 12158980Abstract: Distributed security key management for protecting roaming data via a trusted platform module is performed by systems that include first and second processors, and first and second respective hardware security modules. The first security module encrypts a security key using a public key from the second security module, and the encrypted security key is provided to the second security module. A virtual machine (VM) executed by the first processor has a first virtual security module instance having state data that includes a storage key encrypting VM virtual disk data and that is encrypted with the security key. When a transfer condition is determined, the VM is transferred and executed by the second processor, using a second virtual security module instance, based on decrypting the security key by the second security module using a private key and decrypting the state data for the second virtual security module using the security key.Type: GrantFiled: August 27, 2021Date of Patent: December 3, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ronald Aigner, Giridhar Viswanathan, Lars Reuther, Alvin Morales Caro, David Kimler Altobelli, Dan Ma
-
Patent number: 12155641Abstract: Methods and systems for retrieving information from secondary computing systems using network access tokens are disclosed. The system can provide a user interface that lists a plurality of secondary computing systems to a client application executing at a client device associated with a user profile of the primary computing system. The system can receive, from the client device, a network token identifying a permission for accessing a second profile maintained at the secondary computing system, and retrieve the subset of data records from the secondary computing system according to a retrieval policy. The system can then update the user interface at the client application to present the subset of data records of the second profile.Type: GrantFiled: April 15, 2022Date of Patent: November 26, 2024Assignee: Wells Fargo Bank, N.A.Inventors: Benjamin Soccorsy, Anthony Burton, Steven Pulido
-
Patent number: 12149522Abstract: Techniques are provided for performing user operations by a first system on a second system using user impersonation. One method comprises receiving, by a first system, a log in of a user to the first system and an operation to be performed by a second system; sending an impersonation request, by the first system to the second system, to obtain an impersonated user access token of the given user for the second system; receiving, by the first system from the second system, in response to the impersonation request, the impersonated user access token of the given user; and providing, by the first system to the second system, the operation with the impersonated user access token of the given user, wherein the second system performs the operation based at least in part on a result of an access validation of the impersonated user access token of the given user.Type: GrantFiled: April 27, 2022Date of Patent: November 19, 2024Assignee: Dell Products L.P.Inventors: Shoham Levy, Mirit Sadon, Haim Shalelashvili