H04L9/08

Vehicle control device and program

A vehicle control device is provided. The vehicle control device includes a terminal device authentication unit that determines whether a terminal device of a user registered as a user of a vehicle, in advance, is present around or within the vehicle. The vehicle control device also includes a communication unit that communicates with the terminal device. Also included in the vehicle control device is a control unit that causes a display device provided in the vehicle to output a screen for setting communication between the communication unit and the terminal device. The display device outputs the screen in a case where it is determined by the terminal device authentication unit that the terminal device is present and the display device is started up.

Implicit integrity for cryptographic computing

In one embodiment, a processor includes a memory hierarchy and a core coupled to the memory hierarchy. The memory hierarchy stores encrypted data, and the core includes circuitry to access the encrypted data stored in the memory hierarchy, decrypt the encrypted data to yield decrypted data, perform an entropy test on the decrypted data, and update a processor state based on a result of the entropy test. The entropy test may include determining a number of data entities in the decrypted data whose values are equal to one another, determining a number of adjacent data entities in the decrypted data whose values are equal to one another, determining a number of data entities in the decrypted data whose values are equal to at least one special value from a set of special values, or determining a sum of n highest data entity value frequencies.

Secure, decentralized, automated platform and multi-actors for object identity management through the use of a block chain technology
11582034 · 2023-02-14 · ·

Secure management of keys and identities of an object manufactured by a manufacturer having a manufacturer key pair, and a client having a client key pair, the management being carried out using a decentralized blockchain database. The method includes generation of a manufacturing key pair; and publication and recording, in the blockchain, of the decentralized object identifier used to obtain the public key of the object. When a client purchases the object from the manufacturer, the method includes providing, by the object manufacturer, the object identifier, and the public manufacturing key to the client; and updating the blockchain. When the object is switched on for the first time, the object enrolls itself by generation of a utilization key pair; auto-enrollment using the manufacturing key pair; and replacement, in the blockchain, of the public manufacturing key associated with the object identifier with the public utilization key associated with the object identifier.

Storage system communication
11582046 · 2023-02-14 · ·

A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an authority initiating an I/O command, wherein the token is specific to assignment of the authority and a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable.

Combined digital signature algorithms for security against quantum computers
11582045 · 2023-02-14 ·

A server can record (i) a first digital signature algorithm with a first certificate, and a corresponding first private key, and (ii) a second digital signature algorithm with a second certificate, and a corresponding second private key. The server can select first data to sign for the first algorithm and the first private key in order to generate a first digital signature. The server can select second data to sign, wherein the second data to sign includes at least the first digital signature. The server can generate a second digital signature for the second data to sign using the second algorithm and the second private key. The server can transmit a message comprising (i) the first and second certificates, and (ii) the first and second digital signatures to a client device. Systems and methods can concurrently support the use of both post-quantum and classical cryptography to enhance security.

Authentication apparatus, system and methods using unclonable identifiers

An integrated circuit having Radio Frequency Identification components and circuitry used for authentication is discussed. The RFID components and circuitry include two or more coils and corresponding electrical circuits that are tuned to use two or more different resonant frequencies including: a first resonant RF used for power generation and a second resonant RF used for data communication. The integrated circuit contains a unique signature that is used for the authentication with two or more aspects including i) a first aspect that is a programmed password in a memory embedded on the integrated circuit, and ii) a second aspect that is a unique, randomly generated code based upon a physical characteristic of the integrated circuit.

Trusted communications between untrusting parties
11582209 · 2023-02-14 · ·

A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.

Namespace encryption in non-volatile memory devices
11580034 · 2023-02-14 · ·

A computer storage device having a host interface, a controller, non-volatile storage media, and firmware. The firmware instructs the controller to: limit a crypto key to be used in data access requests made in a first namespace allocated on the non-volatile storage media of the computer storage device; store data in the first namespace in an encrypted form that is to be decrypted using the crypto key; free a portion of the non-volatile storage media from the first namespace, the portion storing the data; and make the portion of the non-volatile storage media available in a second namespace without erasing the data stored in the portion of the non-volatile storage media.

Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust

A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process that is securely implemented within a hardware-based root of trust. User profiles used in ad matching may be privacy protected and maintained with confidentiality protection in the client computing system and/or a service provider server, respectively. When a client computing system makes a request to the service provider server for content with specified ad slots, the request may be made with the client's EPID signature, which is inherently privacy protected. The hardware-based root of trust protects insertion of selected ads into the linear rendering flow of the content.

Secret key generation for wireless channels

A method of operating a first node to generate a secret key for encrypting wireless transmissions between the first node and a second node. The method comprises receiving a first training signal comprising a plurality of subcarriers from the second node and constructing a matrix from the frequency responses of each of the plurality of subcarriers of the first training signal at the first node. A singular value decomposition of the matrix is computed; and a secret key is derived from one or more singular vectors of the singular value decomposition.