H04L9/06

Electronic system and computerized method for verification of transacting parties to process transactions

The present disclosure generally relates to electronic systems and computerized methods for verification of transacting parties to process transactions. A payment network server receives details of a transaction fulfilled by an agent and generates a transaction identification plaintext. A first party keyset for the first transacting party and an agent keyset for the agent is identified. The server generates cryptograms and ciphertexts encrypted by the first party keyset and agent keyset and sends the cryptograms to the first transacting party and agent. An encrypted cryptogram contains an encrypted ciphertext which contains a plaintext representing the transaction identification plaintext. The ciphertexts are exchanged between the first transacting party and agent by a computer handshake for decryption. The plaintexts are extracted from the ciphertexts and compared against the transaction identification plaintext for verifying the first transacting party and agent.

Low-latency direct cloud access with file system hierarchies and semantics

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner consistent with file-based access with data organization in name hierarchies. Various embodiments also may provide for memory mapping of data so that memory map changes are reflected in persistent storage while ensuring consistency between memory map changes and writes. For example, by transforming a ZFS file system disk-based storage into ZFS cloud-based storage, the ZFS file system gains the elastic nature of cloud storage.

Distributed storage of state information and session recovery using state information

A method for storing session state data of a session between a system having a plurality of nodes and a client device includes delivering a service to the client device during a session identified or otherwise specified by a session identifier. The service is delivered by a first of the plurality of nodes in the system. During the session, at least a second node in the system is selected on which session state data associated with the session is to be saved. The second node is selected based on the session identifier such that another node in the system is able to locate the session state data when stored on the second node from the session identifier without contacting a centralized mechanism that specifies where session state data is stored. The session state data is saved to the second node that is selected.

Methods to protect neural network models
11568062 · 2023-01-31 · ·

A method and system is disclosed for protecting neural network models by segmenting partitions of the models into segments of pre-configured memory size, hashing the segmented models, and concatenating the hash segments. The concatenated hash segment may be further hashed, encrypted, and stored with the neural network models as an executable loadable file (ELF) in memories external to the neural network prior to the use of the models by the neural network. The models may include model weights of the inference layers and metadata. The model weights and the metadata may be hashed as separate hash segments and concatenated. Segmenting the models into segments of pre-configured memory size and hashing the segmented models offline prior to the operation of the neural network enables rapid validation of the models when the models are used in the inference layers during online operation of the neural network.

Combined SBox and inverse SBox cryptography

Hardware circuitry defines logic for both Sbox generation and inverse Sbox generation via generating a multiplicative inverse matrix as a truth table for data. The hardware circuitry receives input plain text to be encrypted. The hardware circuitry divides the input plain text to be encrypted. The hardware circuitry feeds multiplicative inverse values generated from the input plain text to a transformer module for performing affine to encrypt the plain text data. The hardware circuitry receives encrypted data to be decrypted. The hardware circuitry divides the encrypted data to be decrypted. The hardware circuitry feeds multiplicative inverse generated from the encrypted data to the transformer module for performing inverse affine to decrypt the encrypted data.

Apparatus for monitoring multicast group

An apparatus for monitoring a multicast group is provided. The apparatus includes a storage, a receiver and an operation processor. The storage is configured to store first data including a first authenticated message authenticated as being published by a publisher of the multicast group to n-th data including an n-th authenticated message authenticated as being published by the publisher where n is a natural number of 2 or more. The receiver is configured to receive status data including a first propagation message to be delivered to the multicast group. Further, the operation processor is configured to generate monitoring information including status information of the multicast group by using the status data and the first to n-th data.

Systems and methods for location enabled search and secure authentication
11716616 · 2023-08-01 · ·

A method of authentication in ride hailing situations may include directing, by a first computing device of a passenger, the passenger to point a camera of the first computing device toward a location of a second computing device of a driver located in a vehicle, receiving data from the camera, wherein the data comprises streaming image frames including vehicle information pertaining to a vehicle included in the streaming image frames, analyzing the data to obtain the vehicle information, and determining whether the vehicle in the streaming image frames corresponds to an expected vehicle for the driver, the determination based on the vehicle information and expected vehicle information.

Replica: an improved communication concealment cipher
11716192 · 2023-08-01 ·

Replica is an encryption algorithm where security is based on lavish use of randomness rather than on mathematical complexity and the cipher is decoy-tolerant, namely it can readily distinguish between bona fide ciphertext bits and randomized meaningless bits. This attribute allows its users to project as much security as they care by mixing the message bits with more and more decoy bits. It also allows its user to conceal their pattern of communication in a fixed rate of message bit flow.

Systems and methods for proving immutability of blockchains

The present disclosure provides systems, methods, and computer-readable storage media having functionality to prove immutability of blockchains without accessing user data. A user may submit data for storage to a data management server and the data management server may generate one or more data records corresponding to the data at a database and one or more blocks at a blockchain, each block corresponding to of the data records. Block information associated with the generated blocks may be transmitted to a remote computing device for storage at a database. Prior to storing the block information, the remote computing device may sign the data using a private key or other cryptographic technique. To validate a block, raw block information may be retrieved from the blockchain and compared to the signed block information. If the signed block information matches the raw block information, the block may be determined to be valid (e.g., unchanged).

Detecting and mitigating attacks using forged authentication objects within a domain
11570209 · 2023-01-31 · ·

A system for detecting and mitigating attacks using forged authentication objects within a domain is provided, comprising an authentication object inspector configured to observe a new authentication object generated by an identity provider, and retrieve the new authentication object; and a hashing engine configured to retrieve the new authentication object from the authentication object inspector, calculate a cryptographic hash for the new authentication object, and store the cryptographic hash for the new authentication object in a data store; wherein subsequent access requests accompanied by authentication objects are validated by comparing hashes for each authentication object to previous generated hashes.