Country
Full text data for US,EP,CN
Type
Legal Validity
Legal Status
Filing Date
Publication Date
Inventor
Assignee
Click to expand
IPC(Section)
IPC(Class)
IPC(Subclass)
IPC(Group)
IPC(Subgroup)
Agent
Agency
Claims Number
Figures Number
Citation Number of Times
Assignee Number
No. Publication Number Title Publication/Patent Number Publication/Patent Number Publication Date Publication Date
Application Number Application Number Filing Date Filing Date
Inventor Inventor Assignee Assignee IPC IPC
1
EP3785148A1
METHOD OF MANAGING ACCESS IN A COLLABORATIVE DATA SHARING PLATFORM
Publication/Patent Number: EP3785148A1 Publication Date: 2021-03-03 Application Number: 19748883.6 Filing Date: 2019-06-28 Inventor: Thomson-wood, Reuben Robert   Melis, Nicola   Del, Rio Llorente Maria Rosa   Assignee: Bedrock Capital Limited   IPC: G06F21/00
2
CN213399576U
一种数据信息储存芯片安全保护罩
Grant
Publication/Patent Number: CN213399576U Publication Date: 2021-06-08 Application Number: 202022812587.X Filing Date: 2020-11-27 Inventor: 范创升   Assignee: 深圳新蕊科技有限公司   IPC: G06F21/00 Abstract: 本实用新型公开了一种数据信息储存芯片安全保护罩,包括包括PCB板,PCB板上固定安装有储存芯片,PCB板在靠近储存芯片的外围通过强力胶固定粘接有固定底座,固定底座顶部两侧对称开设有卡槽,固定底座的顶端安装有保护罩体,且保护罩体的底部两侧连接有卡条,且卡条分别与卡槽相互卡合,保护罩体的顶端设置有开口,并在开口内安装有固定壳体,固定壳体的底部固定连接有吸热板,吸热板的底部固定粘接有传热硅胶垫,且传热硅胶垫的底部与储存芯片的底部相互接触。该种数据信息储存芯片安全保护罩,结构简单合理,设计新颖,安装简单便捷,并能快速有效的对储存芯片进行吸热散热,保证储存芯片的正常工作,具有较高的实用价值。
3
EP3841496A1
MULTI-BLOCKCHAIN DIGITAL TRANSACTION INFORMATION SEGREGATION SYSTEM
Publication/Patent Number: EP3841496A1 Publication Date: 2021-06-30 Application Number: 19851775.7 Filing Date: 2019-08-23 Inventor: Sarin, Pankaj   Assignee: PayPal, Inc.   IPC: G06F21/00
4
EP3788516A1
ENCRYPTION CARD, ELECTRONIC DEVICE, AND ENCRYPTION SERVICE METHOD
Publication/Patent Number: EP3788516A1 Publication Date: 2021-03-10 Application Number: 19793424.3 Filing Date: 2019-04-24 Inventor: Fu, Yingfang   Xiao, Peng   Assignee: ALIBABA GROUP HOLDING LIMITED   IPC: G06F21/00
5
EP3818457A1
SCALABLE CERTIFICATE MANAGEMENT SYSTEM ARCHITECTURES
Publication/Patent Number: EP3818457A1 Publication Date: 2021-05-12 Application Number: 19835051.4 Filing Date: 2019-07-01 Inventor: Meyer, Alan T.   Powell, Gregory A.   Assignee: INTEGRITY SECURITY SERVICES LLC   IPC: G06F21/00
6
EP3765981A1
SECURE DECENTRALIZED VIDEO GAME TRANSACTION PLATFORM
Publication/Patent Number: EP3765981A1 Publication Date: 2021-01-20 Application Number: 19767701.6 Filing Date: 2019-02-06 Inventor: Yong, Stephen   Assignee: Sony Interactive Entertainment LLC   IPC: G06F21/00
7
EP3844646A1
CONTEXT-AWARE CONTENT OBJECT SECURITY
Publication/Patent Number: EP3844646A1 Publication Date: 2021-07-07 Application Number: 19853611.2 Filing Date: 2019-08-27 Inventor: Ojha, Alok   Subramanian, Sivaramakrishnan   Huang, Kechen   Assignee: Box, Inc.   IPC: G06F21/00
8
CN112287303A
一种适用于可溯源保密介质的销毁设备
Grant
Publication/Patent Number: CN112287303A Publication Date: 2021-01-29 Application Number: 202011542545.7 Filing Date: 2020-12-24 Inventor: 罗远哲   刘瑞景   申慈恩   徐盼云   孟小钰   刘洁   李玉琼   王军亮   张春涛   Assignee: 北京中超伟业信息安全技术股份有限公司   IPC: G06F21/00 Abstract: 本发明涉及一种适用于可溯源保密介质的销毁设备。所述设备中所述保密介质接触式充电模块与保密介质的电极连接,所述保密介质ID识别模块与所述接触式识别芯片连接;所述保密介质完整性检测模块与所述保密介质连接;所述控制模块分别与所述保密介质接触式充电模块、保密介质ID识别模块以及保密介质完整性检测模块连接;所述分拣系统与所述控制控制模块连接;所述接触式销毁电路模块分别与所述分拣系统以及所述粉碎模块连接。本发明在识别保密介质的ID信息和判定介质当前的完整性的基础上,进行销毁作业,确保保密介质在最终销毁环节中完整的销毁,降低泄密的风险。
9
US10977761B2
Digital watermark embedding method and extraction method, digital watermark embedding apparatus and extraction apparatus, and digital watermark system
Publication/Patent Number: US10977761B2 Publication Date: 2021-04-13 Application Number: 16/377,565 Filing Date: 2019-04-08 Inventor: Zhong, He Wang   Sun, Liang   Qu, Zheng Bin   Huang, Da Yi   Yang, You Shan   Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED   IPC: G06T1/00 Abstract: This application relates to the field of digital watermark technologies and discloses a digital watermark embedding method and extraction method, a digital watermark embedding apparatus and extraction apparatus, and a digital watermark system. The method includes obtaining a digital watermark of a composite file, splitting the digital watermark into N sub-watermarks according to a carrier quantity N of the composite file, each sub-watermark being corresponding to partial content of the digital watermark, embedding an ith sub-watermark in an ith carrier of the composite file, to obtain an ith target carrier, and integrating N target carriers into a target file. This application resolves a problem in the related technology that a digital watermark technology cannot ensure integrity of an order file, and protects carriers of a composite file, thereby ensuring security and integrity of the composite file.
10
EP3811249A1
DETECTING COPIED COMPUTER CODE USING CRYPTOGRAPHICALLY HASHED OVERLAPPING SHINGLES
Publication/Patent Number: EP3811249A1 Publication Date: 2021-04-28 Application Number: 19823687.9 Filing Date: 2019-06-19 Inventor: Rogers, Daniel J.   Blazakis, Dionysus   Assignee: Terbium Labs, Inc.   IPC: G06F21/00
11
US10904255B2
Method for controlling contents and electronic device thereof
Publication/Patent Number: US10904255B2 Publication Date: 2021-01-26 Application Number: 16/837,513 Filing Date: 2020-04-01 Inventor: Lee, Okseon   Park, Yongseok   Lee, Jinho   Hong, Youngki   Assignee: Samsung Electronics Co., Ltd   IPC: G06F21/00 Abstract: Disclosed is an electronic device including a storage storing contents, a display, and a processor configured to set one or more access authorities of one or more applications for accessing the contents stored in the storage while the one or more applications is installed, based on detecting at least one application of the one or more applications to access the contents, display, on the display, a message requesting changing at least one access authority of the at least one application of the one or more applications for accessing the contents, and based on an input associated with the message, change the at least one access authority of the at least one application of the one or more applications for accessing the contents.
12
US10937035B1
Systems and methods for a multi-tiered fraud alert review
Publication/Patent Number: US10937035B1 Publication Date: 2021-03-02 Application Number: 16/673,491 Filing Date: 2019-11-04 Inventor: Merritt, Sears   Assignee: Massachusetts Mutual Life Insurance Company   IPC: G06F21/00 Abstract: Embodiments of systems and methods for fraud review are disclosed. The systems may include multi-tiered computing systems which may receive fraud alerts from multiple sources. A computing system in a tier may receive a fraud alert and use one or more fraud risk metrics to determine whether the fraud alert should be escalated. If the computing system determines that the fraud alert should be escalated, the computing system may transmit an escalation message to a higher tier computing system. If the computing system determines that the fraud alert should not be escalated, the computing system may transmit a message to a fraud prevention computing system. In some embodiments, the computing system may determine that the fraud alert is a false positive and transmit a false positive message to the source of the fraud alert such as a lower tier computing system.
13
US11003749B2
Risk analysis apparatus and method for risk based authentication
Publication/Patent Number: US11003749B2 Publication Date: 2021-05-11 Application Number: 15/989,301 Filing Date: 2018-05-25 Inventor: Park, Hyun-kyung   Seo, Bum-joon   Oh, Hyun-min   Lee, Ji-hyun   Assignee: SAMSUNG SDS CO., LTD.   IPC: G06F21/00 Abstract: A risk analysis apparatus and method are provided. According to one embodiment of the present disclosure, the risk analysis apparatus includes: at least one processor configured to: a risk factor collector configured to collect risk factors related to one or more authentication processes for authentication of a user of a client device in an authentication system; a risk analyzer configured to calculate a current risk score for the user based on the collected risk factors and calculate a total risk score based on a risk score history of the user and the current risk score based on the one or more authentication processes being successful; and an additional authentication requester configured to determine whether additional authentication of the user is required based on the current risk score and the total risk score and, request the client device for the additional authentication of the user based on the additional authentication being required.
14
EP3065333B1
SHARED KEYS IN A COMPUTERIZED SYSTEM
Publication/Patent Number: EP3065333B1 Publication Date: 2021-03-31 Application Number: 16158690.4 Filing Date: 2016-03-04 Inventor: Hernandez, Roman   Teiste, Marko   Huima, Antti   Linnakangas, Tommi   Assignee: SSH Communications Security Oyj   IPC: H04L9/08
15
EP3809625A1
CHIP, METHOD FOR GENERATING PRIVATE KEY, AND METHOD FOR TRUSTED VERIFICATION
Publication/Patent Number: EP3809625A1 Publication Date: 2021-04-21 Application Number: 18936726.1 Filing Date: 2018-10-09 Inventor: Cai, Heng   Assignee: Huawei Technologies Co., Ltd.   IPC: H04L9/00 Abstract: This application provides a chip, a private key generation method, and a trusted certification method. The chip includes a security core module. The security core module includes a security core and a memory. The security core module prevents access of an external module that is inside the chip and that is other than the security core module, and the security core module prevents access of an external device outside the chip. The memory is configured to store a hash of a first root public key and a unique device secret UDS of the chip; the security core is configured to generate a layer 1 public key and a layer 1 private key based on the hash of the first root public key and the UDS; and the memory is configured to store the layer 1 private key. In the technical solutions, a possibility that an attacker obtains the layer 1 private key and performs trusted certification on tampered firmware or information by using the layer 1 private key can be reduced.
16
US11055394B2
Password pattern recognition authentication method
Publication/Patent Number: US11055394B2 Publication Date: 2021-07-06 Application Number: 16/666,407 Filing Date: 2019-10-29 Inventor: Norris, Iii Forbes Holten   Assignee: Norris, III, Forbes Holten   IPC: G06F21/00 Abstract: A method and apparatus is disclosed for password/passcode pattern recognition based authentication on a computer virtual screen, which hides passcodes in plain view, visually camouflaged and disguised in a manner that makes them easily and quickly recognizable only to authorized passcode owners. The user proves recognition by selecting patterns of multi-character passcode fragments, in a specific order, from one or more visually challenging, constantly changing dynamic menus. Myriad selection patterns are possible involving all fragments or subsets of fragments. The invention leverages innate human pattern recognition abilities which are superior to machine computational methods. Fragment selection can involve gestures like touching, tapping, or tracing or drawing of fragment connecting paths, or navigation of spring loaded menus; selection can be also be accomplished by biometric measurement of unconscious user recognition. Passcodes can include graphics and images. Selection interaction biometric data can also be included in the authentication process.
17
US11044076B2
Encrypted data processing
Publication/Patent Number: US11044076B2 Publication Date: 2021-06-22 Application Number: 13/775,920 Filing Date: 2013-02-25 Inventor: Breuer, Peter   Assignee: Hecusys, LLC   IPC: G06F21/00 Abstract: The technology includes processes, computer program products, and systems for encrypted data processing. In a system of the technology, an arithmetic logic unit is arranged to receive encrypted data presented at said inputs, generate encrypted data based upon data presented at said inputs and provide said generated encrypted data to said output. The arithmetic logic unit performs operations on encrypted data and the processor does not require encryption or decryption to be carried out within it.
18
US10902094B2
File origin determination
Publication/Patent Number: US10902094B2 Publication Date: 2021-01-26 Application Number: 16/504,890 Filing Date: 2019-07-08 Inventor: Childress, Rhonda L.   Spisak, Michael J.   Stark, George E.   Assignee: International Business Machines Corporation   IPC: G06F21/00 Abstract: A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
19
EP3814945A2
ENCRYPTION FOR A DISTRIBUTED FILESYSTEM
Publication/Patent Number: EP3814945A2 Publication Date: 2021-05-05 Application Number: 19814618.5 Filing Date: 2019-06-04 Inventor: Ben, Dayan Maor   Palmon, Omri   Zvibel, Liran   Arditti, Kanael   Peleg, Ori   Assignee: Weka. Io Ltd.   IPC: G06F21/00
20
US10990679B2
Methods, systems, articles of manufacture and apparatus to verify application permission safety
Publication/Patent Number: US10990679B2 Publication Date: 2021-04-27 Application Number: 15/972,803 Filing Date: 2018-05-07 Inventor: Kulkarni, Dattatraya   Srivastava, Himanshu   Vardhan, Raj   Sinha, Raja   Nalluri, Srikanth   Konda, Tirumaleswar Reddy   Assignee: McAfee, LLC   IPC: G06F21/00 Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety. An example apparatus to identify unsafe permissions associated with a candidate app disclosed herein includes an app classifier interface to retrieve a cluster of apps associated with the candidate app, the candidate app including a requested permission set (RPS), a trusted app (TA) identifier to identify a set of TAs within the cluster, the set of TAs associated with a designation of trust, a safe permission set (SPS) evaluator to generate an SPS list associated with the set of TAs within the cluster, and an RPS identifier to determine whether permissions of the RPS are listed in the SPS list, the SPS evaluator further to designate first respective ones of the permissions of the RPS as safe when the first respective ones of the permissions are listed in the SPS list, and designate second respective ones of the permissions of the RPS as unsafe when the second respective ones of the permissions are absent from the SPS list.
Total 500 pages