Patent classifications
H04L9/08
STORAGE DEVICE, HOST DEVICE AND DATA TRANSFER METHOD THEREOF
A method of transmitting data in a storage device includes encrypting original data based on a homomorphic encryption algorithm to generate encrypted data, generating a parameter for regeneration of a ciphertext higher than an operation level of the encrypted data by using the encrypted data and a key value, and transmitting the encrypted data and the parameter to an external host device.
DEPLOYING A SYSTEM-SPECIFIC SECRET IN A HIGHLY RESILIENT COMPUTER SYSTEM
A computer-implemented method for providing a system-specific secret to a computing system having a plurality of computing components is disclosed. The method includes storing permanently a component-specific import key as part of a computing component and storing the component-specific import key in a manufacturing-side storage system. Upon a request for the system-specific secret for a computing system, the method includes identifying the computing component comprised in the computing system, retrieving a record relating to the identified computing component, determining the system-specific secret protected by a hardware security module and determining a system-specific auxiliary key. Furthermore, the method includes encrypting the system-specific auxiliary key with the retrieved component-specific import key, thereby creating a auxiliary key bundle, encrypting the system-specific secret and storing the auxiliary key bundle and a system record in a storage medium of the computing system.
LOCATION VERIFICATION METHOD AND SYSTEM FOR SMART CITY, AND MOBILE COMMUNICATION DEVICE THEREFOR
A location verification system according to an embodiment of the present disclosure includes a plurality of base stations located in respective preset areas and transmitting, to an adjacent mobile communication device, location verification information obtained by signing GPS information on the base stations with a private key. It is possible to expect an effect of re-verifying a location of a mobile communication device, such as a drone or a smart car, at a destination, when the mobile communication device has moved to the destination based on GPS information.
METHOD FOR GENERATING AND AUTHENTICATING THREE-DIMENSIONAL DYNAMIC OTP WITHOUT PASSWORD INPUT
Disclosed is a method for generating and authenticating a three-dimensional dynamic OTP that does not require input of a password. In the method, a user address received from a user terminal is converted into coordinate values in degrees, minutes, and seconds on latitude and longitude, and set as address coordinates from the coordinates in a unit of seconds and then a two-dimensional reference coordinate system is displayed that is subdivided with the address coordinates as an origin, a two-dimensional function is provided and rotated about an arbitrary axis to form a three-dimensional space by a three-dimensional function, one OTP generation coordinate within the three-dimensional space is provided, and then a one-time password is generated by combining respective coordinate values of x, y, and z axes of the one OTP generation coordinate.
SECURE GUEST IMAGE AND METADATA UPDATE
A secure guest generates an updated image for the secure guest, and computes one or more measurements for the updated image. The secure guest provides the one or more measurements to a trusted execution environment and obtains from the trusted execution environment metadata for the updated image. The metadata is generated based on metadata of the secure guest and obtaining the one or more measurements.
CONFIDENTIAL DATA PROVIDED TO A SECURE GUEST VIA METADATA
A secure guest of a computing environment requests confidential data. The confidential data is included in metadata of the secure guest, which is stored in a trusted execution environment of the computing environment. Based on the request, the confidential data is obtained from the metadata of the secure guest that is stored in the trusted execution environment.
PRIVACY SAFE JOINT IDENTIFICATION PROTOCOL
The technical problem of matching records in different datasets, for example a host dataset and a partner dataset storing records representing respective users, while maintaining the privacy of each dataset, is addressed by providing a privacy safe joint identification protocol. The privacy safe joint identification protocol computes respective anonymous joint identifiers for records in the two datasets. An anonymous joint identifier is generated such that the host-assigned and the partner-assigned identifies that have been determined to represent the same user are mapped to the same anonymous joint identifier.
NON-FUNGIBLE TOKEN AUTHENTICATION
Disclosed are systems and methods that authenticate non-fungible tokens (“NFT”) and/or digital data represented by or pointed to by an NFT. In some implementations, authentication may be with respect to an existing NFT. In other implementations, authentication may be with respect to an NFT that is being created. The disclosed implementations may compare a candidate and/or candidate NFT data with existing NFTs and/or existing NFT data to determine if the candidate NFT and/or candidate NFT data is similar to other NFTs and/or other NFT data of another NFT, which may exist on any of many different blockchains.
QUANTUM KEY DISTRIBUTION SYSTEM
An optical transmitter for quantum key distribution includes a plurality of spatially separated light sources configured to emit a light signal with the same wavelength. Each light source emits a light signal with a unique encoding. A beam combiner receives the light signals from the plurality of light sources and combines the received light signals into a combined light signal. A spatial filter is optically coupled to the beam combiner and includes an aperture that receives the combined light signal and emits a filtered light signal. The aperture has an aperture diameter less than or equal to the specified wavelength. A collimator is optically coupled to the spatial filter and receives the filtered light signal and emits a collimated light signal. An output aperture receives the collimated light signal and outputs the collimated light signal as an output light signal towards an optical receiver.
INFORMATION DISPERSAL FOR SECURE DATA STORAGE
A method of securely dispersing private user data may include operating a software application configured to utilize user data, receiving the user data, generating a sequence of random bits, and generating a plurality of secret shares from the user data. Generating the plurality of secret shares may include selecting a subset of the user data for each secret share and combining the subset of the user data with the sequence of random bits. The subset of the user data may be a first half of the user data for a first secret share, a second half of the user data for a second secret share, and the whole user data for a third secret share. The method may also include dispersing each of the secret shares.