H04L9/12

Communication apparatus and communication system

A communication apparatus includes a reference signal generating section, a transmitting section, a propagation estimating section, a first data acquiring section, and a decoding section. The reference signal generating section generates a first reference signal to enable a communicating party to estimate a propagation environment. The transmitting section transmits the first reference signal. The propagation estimating section estimates a first propagation estimation value of the propagation environment using a second reference signal transmitted from the communicating party. The first data acquiring section generates first data using the first propagation estimation value. The decoding section decodes a transmission signal encoded using a second propagation estimation value that is estimated by the communicating party using the first reference signal, to obtain second data using the first data.

Systems and methods for a blockchain multi-chain smart contract time envelope
11627003 · 2023-04-11 · ·

A system for a shared and synchronous time series identification that matches a hardware clock-generating signal of a blockchain identified node device, with a generated data event time stamp and shared by all computing nodes participating in a complete system based on a blockchain design pattern and protocol. A blockchain cybersecurity system time signature is applied to synchronize the device level ID or device chain; this time sync is matched to the client master clocking time signal governing data transactions on the data event level or event chain. The combination of these two disparate blockchain mechanisms is termed as a multi-chain application. The matched time signals now provide referenced smart contract time sequencing. This matched time sequencing is unique and customized in its application to a multi-chain block chain cyber security application.

Systems and methods for a blockchain multi-chain smart contract time envelope
11627003 · 2023-04-11 · ·

A system for a shared and synchronous time series identification that matches a hardware clock-generating signal of a blockchain identified node device, with a generated data event time stamp and shared by all computing nodes participating in a complete system based on a blockchain design pattern and protocol. A blockchain cybersecurity system time signature is applied to synchronize the device level ID or device chain; this time sync is matched to the client master clocking time signal governing data transactions on the data event level or event chain. The combination of these two disparate blockchain mechanisms is termed as a multi-chain application. The matched time signals now provide referenced smart contract time sequencing. This matched time sequencing is unique and customized in its application to a multi-chain block chain cyber security application.

Distributed session resumption
11606193 · 2023-03-14 · ·

Techniques for re-establishing secure application sessions using an abbreviated authentication process are disclosed. A plurality of servers each use a deterministic process to independently generate a symmetric key. A client initiates an application session with one of the servers using a full authentication process. Before the connection is terminated, the server generates a session ticket, including security parameters negotiated during the full authentication process, and encrypts the session ticket with the symmetric key. Another server receives the session ticket and decrypts the session ticket using the symmetric key to initiate an abbreviated authentication process that is less costly than the full authentication process. The client and the server establish a secure communication channel based on successful completion of the abbreviated authentication process.

SELF-SYNCHRONIZING MODE OF OPERATION FOR AN ENCRYPTION/DECRYPTION ALGORITHM

Systems and methods for operating a cryptographic system. The methods comprise: obtaining ciphertext by the cryptographic system; performing operations by the cryptographic system to determine whether a given sequence of values exits within the ciphertext; and synchronizing the cryptographic system with another cryptographic system using the ciphertext as a bitrate portion of an initialization value for a cryptographic algorithm and zero as a capacity portion of the initialization value for the cryptographic algorithm, when a determination is made that the given sequence of values exist within the ciphertext.

SELF-SYNCHRONIZING MODE OF OPERATION FOR AN ENCRYPTION/DECRYPTION ALGORITHM

Systems and methods for operating a cryptographic system. The methods comprise: obtaining ciphertext by the cryptographic system; performing operations by the cryptographic system to determine whether a given sequence of values exits within the ciphertext; and synchronizing the cryptographic system with another cryptographic system using the ciphertext as a bitrate portion of an initialization value for a cryptographic algorithm and zero as a capacity portion of the initialization value for the cryptographic algorithm, when a determination is made that the given sequence of values exist within the ciphertext.

Optimized convolution for received XOR encrypted data streams

A receiver apparatus and method for optimized decryption and despreading of a very low frequency (VLF) bitstream is disclosed. In embodiments, the receiver includes antenna elements for receiving a transmission security (TRANSEC) encoded bitstream associated with an uncertainty window size and a spread factor. The receiver includes cryptographic processors that, when the spread factor is sufficiently large, select key section numbers A and data section numbers B based on the window size and spread factor. The cryptographic processors generate an output sequence of correlation windows, each correlation window associated with a symbol of the bitstream, via pipelined sectional mirrored-key convolution based on a key section number A and data section number B chosen to optimize performance (e.g., processor performance, memory performance).

METHOD OF COMMUNICATION BETWEEN FUNCTIONAL BLOCKS IN A SYSTEM-ON-CHIP AND SYSTEM-ON-CHIP THEREOF
20230106942 · 2023-04-06 ·

There is provided a method of communication between functional blocks in a system-on-chip. The method includes: exchanging a respective public key between a first functional block and a second functional block in the system-on-chip (SoC) for a communication therebetween, the first functional block being a transmitter of the communication and the second function block being a receiver of the communication; generating, at the first functional block, a first code based on the public key of the second functional block; generating, at the second functional block, a second code based on the public key of the first functional block; obfuscating, at the first functional block, an address associated with the communication based on the first code to produce an obfuscated address; transmitting, at the first functional block, the obfuscated address to the second functional block via an interconnect communication infrastructure in the system-on-chip; receiving, at the second functional block, the obfuscated address from the first functional block via the interconnect communication infrastructure; and deobfuscating, at the second functional block, the obfuscated address received based on the second code to produce a deobfuscated address associated with the communication. There is also provided a corresponding system-on-chip.

METHOD OF COMMUNICATION BETWEEN FUNCTIONAL BLOCKS IN A SYSTEM-ON-CHIP AND SYSTEM-ON-CHIP THEREOF
20230106942 · 2023-04-06 ·

There is provided a method of communication between functional blocks in a system-on-chip. The method includes: exchanging a respective public key between a first functional block and a second functional block in the system-on-chip (SoC) for a communication therebetween, the first functional block being a transmitter of the communication and the second function block being a receiver of the communication; generating, at the first functional block, a first code based on the public key of the second functional block; generating, at the second functional block, a second code based on the public key of the first functional block; obfuscating, at the first functional block, an address associated with the communication based on the first code to produce an obfuscated address; transmitting, at the first functional block, the obfuscated address to the second functional block via an interconnect communication infrastructure in the system-on-chip; receiving, at the second functional block, the obfuscated address from the first functional block via the interconnect communication infrastructure; and deobfuscating, at the second functional block, the obfuscated address received based on the second code to produce a deobfuscated address associated with the communication. There is also provided a corresponding system-on-chip.

ACCELERATOR TRUSTWORTHINESS

Trustworthiness of an accelerator in heterogenous systems is increased. A workload of an application is offloaded to an accelerator for the accelerator to perform the workload. The accelerator is ensured to generate an output of the workload based on offloading the workload. The accelerator is identified as generating an output of the workload based on offloading the workload. Both an input and the output of the workload are ensured to be authentic based on offloading the workload to the accelerator. Both the input and the output of the workload are ensured to be securely transmitted based on offloading the workload to the accelerator.