Patent classifications
G09C1/02
Long-Term Offline Management of Cryptographic Parameters
A method for the interception-proof transmission of at least one cryptographic parameter from a user to an encrypted offline storage medium, comprising steps of: cloaking an upward portion of a substrate with an upper plate, characterized in that said upper plate comprises a multitude of indicia, wherein each indicium has a corresponding manipulation indicator; sequentially positioning a manipulation apparatus over one or more of the manipulation indicators; mechanically manipulating the substrate, after each sequential positioning of the manipulation apparatus, using said manipulation apparatus, characterized in that the manipulation indicator of the desired indicium overlaps with one mechanical manipulation unit of the substrate; and deconstructing said substrate in two or more complementary units, characterized in that said complementary units each comprises at least one mechanical manipulation unit administered by the manipulation apparatus.
Sentence recognition device, sentence recognition method, and recording medium
A character code conversion device (10) utilizes not a standard character code table but a conversion character code table that is the converted standard character code, and transmits a conversion character code string indicating a sentence subjected to transmission to a sentence recognition device (20) via a network (N). Hence, even if a third party obtains the conversion character code string, the standard character code table is utilized, and thus the character string specified from the conversion character code string is completely different from the sentence subjected to transmission. Accordingly, proper recognition of the sentence subjected to transmission is difficult. Consequently, the security of the sentence subjected to transmission is enhanced.
Sentence recognition device, sentence recognition method, and recording medium
A character code conversion device (10) utilizes not a standard character code table but a conversion character code table that is the converted standard character code, and transmits a conversion character code string indicating a sentence subjected to transmission to a sentence recognition device (20) via a network (N). Hence, even if a third party obtains the conversion character code string, the standard character code table is utilized, and thus the character string specified from the conversion character code string is completely different from the sentence subjected to transmission. Accordingly, proper recognition of the sentence subjected to transmission is difficult. Consequently, the security of the sentence subjected to transmission is enhanced.
Steganography method
A steganography method and an apparatus embedding a hidden message in a video stream of an original cover video to produce a stego video using a generative neural network. The original cover video is a video stream as opposed using an image. A discriminant neural network is used to correct a generated video compared to an original cover video. The generated neural network is trained when the generated video is determined to be real by the discriminant neural network. A second stego video is acquired by adversarial training through a mutually adversarial relationship between a generative neural network and an discriminant neural network. The embedding technique is one of pre-embedding, intra-embedding, or post-embedding.
Efficient and Secure Data Handling Using Domain-Oriented Masking
This document discloses techniques, apparatuses, and systems for efficient and secure data handling using domain-oriented masking. In aspects, efficient and secure data handling using domain-oriented masking enables circuit resources (e.g., flip flops, data) to be shared between portions of an integrated circuit (IC). Specifically, an input register of a Galois-Field (GF) multiplier and a pipeline register within a stage of an Advanced Encryption Standard Substitution-Box (S-Box) may be implemented as sharing a single flip flop. Some ICs may utilize multiple S-Boxes, including multiple GF multipliers that are provided randomness each time the input is updated. In this case, an output from a previous stage of a first S-box may be provided as randomness to a subsequent stage of a second S-Box to limit the need for entropy generation circuitry. In this way, efficient and secure data handling using domain-oriented masking may decrease circuit cost and circuit area without impacting security.
Efficient and Secure Data Handling Using Domain-Oriented Masking
This document discloses techniques, apparatuses, and systems for efficient and secure data handling using domain-oriented masking. In aspects, efficient and secure data handling using domain-oriented masking enables circuit resources (e.g., flip flops, data) to be shared between portions of an integrated circuit (IC). Specifically, an input register of a Galois-Field (GF) multiplier and a pipeline register within a stage of an Advanced Encryption Standard Substitution-Box (S-Box) may be implemented as sharing a single flip flop. Some ICs may utilize multiple S-Boxes, including multiple GF multipliers that are provided randomness each time the input is updated. In this case, an output from a previous stage of a first S-box may be provided as randomness to a subsequent stage of a second S-Box to limit the need for entropy generation circuitry. In this way, efficient and secure data handling using domain-oriented masking may decrease circuit cost and circuit area without impacting security.
SENTENCE RECOGNITION DEVICE, SENTENCE RECOGNITION METHOD, AND RECORDING MEDIUM
A character code conversion device (10) utilizes not a standard character code table but a conversion character code table that is the converted standard character code, and transmits a conversion character code string indicating a sentence subjected to transmission to a sentence recognition device (20) via a network (N). Hence, even if a third party obtains the conversion character code string, the standard character code table is utilized, and thus the character string specified from the conversion character code string is completely different from the sentence subjected to transmission. Accordingly, proper recognition of the sentence subjected to transmission is difficult. Consequently, the security of the sentence subjected to transmission is enhanced.
SENTENCE RECOGNITION DEVICE, SENTENCE RECOGNITION METHOD, AND RECORDING MEDIUM
A character code conversion device (10) utilizes not a standard character code table but a conversion character code table that is the converted standard character code, and transmits a conversion character code string indicating a sentence subjected to transmission to a sentence recognition device (20) via a network (N). Hence, even if a third party obtains the conversion character code string, the standard character code table is utilized, and thus the character string specified from the conversion character code string is completely different from the sentence subjected to transmission. Accordingly, proper recognition of the sentence subjected to transmission is difficult. Consequently, the security of the sentence subjected to transmission is enhanced.
Diversification of instruction set encodings to protect software
Software programs and firmware of an embedded device can be protected against lifting, copying, disassembly, and malware attacks by obfuscating the standard binary encodings of instructions in an instruction set that is understood by the processor(s) of the embedded device. The obfuscation is performed by using a key stored in the embedded device to generate a set of substitute binary encodings for the instructions based on one of a plurality of possible permutations of the standard binary encodings; a binary executable compiled from the software program code is re-encoded using the substitute encodings to produce a substitute permuted executable that is stored in memory of the embedded device. A permutation decoding unit in the embedded device obtains the permuted executable from memory, decodes each instruction back into its standard binary encoding using the key, and delivers the standard-encoded instruction to the embedded device's decoder circuit for execution.
Authentication device, authentication method, and recording medium
An authentication device comprising: a storage unit for storing shared information including password and shared rule that are preset for each user; a random number sequence generation unit for generating a random number sequence pattern; a calculation unit for generating a key code based on the shared rules, using provisional numerals selected from the random number sequence pattern and secret numerals constituting passwords; a transceiver for receiving identification information of a user to be authenticated from an input terminal, transmitting the random number sequence pattern in association with the identification information to the input terminal, and receiving, from the input terminal, a key code consisting of the numerals selected based on the shared rules from the random number sequence pattern by the user to be authenticated; and an authentication unit for authenticating the user to be authenticated, using the key code received and the key code generated.