G09C1/00

On-vehicle authentication system, communication device, on-vehicle authentication device, communication device authentication method and communication device manufacturing method

A communication device stores a first secret key and a first public key, and the on-vehicle authentication device stores a second secret key, a second public key and a signature verification key. The on-vehicle authentication device acquires the first public key, verifies the authenticity of the electronic signature using a signature verification key, encrypts the second public key using the authentic first public key and transmits the encrypted second public key. The communication device receives the encrypted second public key, decrypts the encrypted second public key using the first secret key, encrypts the first public key using the decrypted second public key. The on-vehicle authentication device receives the encrypted first public key, decrypts the encrypted first public key using the second secret key, and authenticates that the communication device is an authentic device when the decrypted first public key has been determined to be authentic.

TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE

Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate an I/O transaction that includes a channel identifier and a memory address. The channel identifier filter verifies that the memory address of the I/O transaction is within a processor reserved memory region associated with the channel identifier. The processor reserved memory region is not accessible to software executed by the computing device. The processor encrypts I/O data at the memory address in response to invocation of a processor feature and copies the encrypted data to a memory buffer outside of the processor reserved memory region. The processor may securely clean the processor reserved memory region before encrypting and copying the data. The processor may wrap and unwrap programming information for the channel identifier filter. Other embodiments are described and claimed.

TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE

Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate an I/O transaction that includes a channel identifier and a memory address. The channel identifier filter verifies that the memory address of the I/O transaction is within a processor reserved memory region associated with the channel identifier. The processor reserved memory region is not accessible to software executed by the computing device. The processor encrypts I/O data at the memory address in response to invocation of a processor feature and copies the encrypted data to a memory buffer outside of the processor reserved memory region. The processor may securely clean the processor reserved memory region before encrypting and copying the data. The processor may wrap and unwrap programming information for the channel identifier filter. Other embodiments are described and claimed.

INVERSE ELEMENT OPERATION APPARATUS AND COMPUTER READABLE MEDIUM
20230076400 · 2023-03-09 · ·

An acceptance unit (110) accepts an element a. A preliminary operation unit (120) calculates t.sub.1 that is a computation result of a.sub.0.sup.2, t.sub.2 that is a computation result of a.sub.2.sup.2, t.sub.3 that is a computation result of a.sub.0a.sub.1, t.sub.4 that is a computation result of a.sub.1a.sub.2, and t.sub.7 that is equal to a computation result of (a.sub.0+a.sub.1)(a.sub.1−a.sub.2), using a.sub.0, a.sub.1, and a.sub.2. An inverse element operation unit (130) calculates b.sub.0 that is equal to a computation result of a.sub.0.sup.2−a.sub.1a.sub.2v, b.sub.1 that is equal to a computation result of a.sub.2.sup.2v−a.sub.0a.sub.1, and b.sub.2 that is equal to a computation result of a.sub.1.sup.2−a.sub.0a.sub.2, using t.sub.1, t.sub.2, t.sub.3, t.sub.4, and t.sub.7. An output unit (140) generates and outputs an inverse element a.sup.−1, using b.sub.0, b.sub.1, and b.sub.2.

PROTECTION OF A CRYPTOGRAPHIC OPERATION
20230074513 · 2023-03-09 · ·

The present disclosure relates to a cryptographic method comprising: multiplying a point belonging to a mathematical set with a group structure by a scalar by performing: the division of a scalar into a plurality of groups formed of a same number w of digits, w being greater than or equal to 2; and the execution, by a cryptographic circuit and for each group of digits, of a sequence of operations on point, the sequence of operations being identical for each group of digits, at least one of the operations executed for each of the groups of digits being a dummy operation.

SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURECOMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM
20230130624 · 2023-04-27 · ·

Each of the secure computation server apparatuses includes a bit-decomposition operation part that performs a bit-decomposition for a share value secretly shared with a constant number of rounds; a table operation part that determines a success or failure of an equality at each bit of the bit-decomposition using a table in which determination expressions for determination whether or not the equality holds at each bit are arranged in a row direction, and combinations of the determination expressions are arranged in a column direction; and an equality determination part that performs equality determination with a constant number of rounds for a value that accumulates a result of the success or failure of the equality at each bit of the bit-decomposition to determine an array reference corresponding to the share value.

System and method for billing and professional companies and firms relating to budgets and monthly bills

The present invention consists of an improved system and method for timekeeping and billing in professional services firms such as those in the areas of law, accounting, architecture and engineering. In the present invention, systems and methods are developed for improved development and management of client budgets where expenditures are continually traced and electronic notices of progress may be automatically transmitted to the client or customer. In addition, security is enhanced by providing security by employee name, level or job title for sensitive client information. Volume discounts can be automatically applied across client name, phase, matter or activity. The client may be provided with an online account secure with an unique ID and password. The system can also handle multiple currencies, payment methods and languages. Clients may be provided with interim bills in real time, as work progresses.

System and method for billing and professional companies and firms relating to budgets and monthly bills

The present invention consists of an improved system and method for timekeeping and billing in professional services firms such as those in the areas of law, accounting, architecture and engineering. In the present invention, systems and methods are developed for improved development and management of client budgets where expenditures are continually traced and electronic notices of progress may be automatically transmitted to the client or customer. In addition, security is enhanced by providing security by employee name, level or job title for sensitive client information. Volume discounts can be automatically applied across client name, phase, matter or activity. The client may be provided with an online account secure with an unique ID and password. The system can also handle multiple currencies, payment methods and languages. Clients may be provided with interim bills in real time, as work progresses.

Method and device for cryptographic processing of data
11477023 · 2022-10-18 · ·

A method for cryptographic processing includes: storing an initial value as the current value; implementing a predetermined number of first steps, including one involving obtaining second data by applying a first cryptographic algorithm to first data, the others each involving the application of the first cryptographic algorithm to the current value and the storage of the result as the new current value; implementation of the predetermined number of second steps, including one involving the obtaining of fourth data by applying, to third data, a second cryptographic algorithm that is the inverse of the first cryptographic algorithm, the others each involving the application of the second cryptographic algorithm to the current value and the storage of the result as the new current value; and verification of the equality of the first data and the fourth data, and of the equality of the current value and the initial value.

Method and device for cryptographic processing of data
11477023 · 2022-10-18 · ·

A method for cryptographic processing includes: storing an initial value as the current value; implementing a predetermined number of first steps, including one involving obtaining second data by applying a first cryptographic algorithm to first data, the others each involving the application of the first cryptographic algorithm to the current value and the storage of the result as the new current value; implementation of the predetermined number of second steps, including one involving the obtaining of fourth data by applying, to third data, a second cryptographic algorithm that is the inverse of the first cryptographic algorithm, the others each involving the application of the second cryptographic algorithm to the current value and the storage of the result as the new current value; and verification of the equality of the first data and the fourth data, and of the equality of the current value and the initial value.