H04L9/10

Solid-state imaging device, method for driving solid-state imaging device, and electronic apparatus

A solid-state imaging device includes a pixel part, a reading part for reading a pixel signal from the pixel part and a response data generating part including a fuzzy extractor. The response data generating part generates response data including a unique key in association with at least one selected from among variation information of pixels and variation information of the reading part. The response data generating part generates, when regenerating a key, a unique key using helper data acquired in generation of an initial key, variation information acquired in the regeneration of the key, and reliability information determined based on the variation information acquired in the regeneration of the key.

INFORMATION INTEGRITY IN BLOCKCHAIN AND RELATED TECHNOLOGIES
20230163957 · 2023-05-25 ·

Described are techniques for securing a most recent block in a data structure such as a blockchain. Techniques include configuring a data processing node that is deployable to a physical location, with a module that generates a verification signing key (VSK) pair, the VSK pair including a private VSK key that is known only to the data processing node, and a public VSK key, receiving by the data processing node, an indication of the deployment to the physical location, generating in response to the indication, by the data processing node the verification signing key (VSK) pair, and transmitting from the data processing node the public VSK key to one or more electronic devices. These techniques assure to a high degree that the generated private key remains unknown and thus can be used to secure the most recent block that is added to a data structure such as a blockchain.

INFORMATION INTEGRITY IN BLOCKCHAIN AND RELATED TECHNOLOGIES
20230163957 · 2023-05-25 ·

Described are techniques for securing a most recent block in a data structure such as a blockchain. Techniques include configuring a data processing node that is deployable to a physical location, with a module that generates a verification signing key (VSK) pair, the VSK pair including a private VSK key that is known only to the data processing node, and a public VSK key, receiving by the data processing node, an indication of the deployment to the physical location, generating in response to the indication, by the data processing node the verification signing key (VSK) pair, and transmitting from the data processing node the public VSK key to one or more electronic devices. These techniques assure to a high degree that the generated private key remains unknown and thus can be used to secure the most recent block that is added to a data structure such as a blockchain.

Systems and methods for leveraging internet identity for digital credentialing
11604868 · 2023-03-14 · ·

Disclosed are a system and method for an identity integration platform to leverage decentralized Internet identity services to streamline and secure the credentialing process for a variety of identity providers, credentialing service providers, and their users. The identity integration platform may operate as a conduit between these entities in a platform agnostic manner to ensure compatibility across a variety of entities without standardization. An application programming interface to facilitate interoperability is also described.

Snooping detection between silicon elements in a circuit
09846187 · 2017-12-19 · ·

An electronic circuit with protection against eavesdropping, including a first circuit element embedded in the electronic circuit, a second circuit element embedded in the electronic circuit, one or more connection lines between the first circuit element and the second circuit element, a first monitoring unit in the first circuit element for measuring capacitance of at least one of the connection lines between the first circuit element and the second circuit element, wherein the first monitoring unit is configured to identify changes in capacitance of the connection lines and to initiate actions to prevent eavesdropping in response to identifying changes.

ELECTRONIC APPARATUS AND NETWORK OF ELECTRONIC APPARATUS
20230198961 · 2023-06-22 ·

A closed physical network can be realized by putting physical addresses of electronic apparatuses under the central management in the chip level. Simultaneously, the decentralized management can be realized logically by converting the dictionary recording identifications of chips on the closed physical network (inside the physical firewall) to a blockchain. By this way, the present invention is characterized by making the central management of physical nodes and the decentralized management of logical nodes coexist and improving management and security of the entire of the closed network effectively.

COMMUNICATION DEVICE
20170317825 · 2017-11-02 · ·

A communication device includes a communication control unit generating a communication signal to be transmitted to an external source and an encryption unit connected to the communication control unit through a wiring. The communication control unit stores a predetermined communication signal indicative of a predetermined message and a target duration required for from a transmission of the predetermined communication signal to a reception of the same from the encryption unit. The communication control unit further counts an actual duration taken from the transmission of the predetermined communication signal to the reception of the same from the encryption unit. When the actual duration is longer than the target duration, the communication control unit determines that a fraudulent circuit is inserted into the wiring for fraudulently acting on the communication signal.

COMMUNICATION DEVICE
20170317825 · 2017-11-02 · ·

A communication device includes a communication control unit generating a communication signal to be transmitted to an external source and an encryption unit connected to the communication control unit through a wiring. The communication control unit stores a predetermined communication signal indicative of a predetermined message and a target duration required for from a transmission of the predetermined communication signal to a reception of the same from the encryption unit. The communication control unit further counts an actual duration taken from the transmission of the predetermined communication signal to the reception of the same from the encryption unit. When the actual duration is longer than the target duration, the communication control unit determines that a fraudulent circuit is inserted into the wiring for fraudulently acting on the communication signal.

Dual use cryptographic system and method

Cryptographic communication systems and methods can utilize a base interface and a channel interface. Plug-ins can be utilized to provide cryptographic functions configured for either a first customer or a second customer. The first customer can be a United States domestic customer and the second customer can be an international customer.

Dual use cryptographic system and method

Cryptographic communication systems and methods can utilize a base interface and a channel interface. Plug-ins can be utilized to provide cryptographic functions configured for either a first customer or a second customer. The first customer can be a United States domestic customer and the second customer can be an international customer.