Patent classifications
H04L9/12
DATA CONVERSION SYSTEMS AND METHODS
In various embodiments, a computer-readable memory medium coupled to a processor is disclosed. The memory medium is configured to store instructions which cause the processor to retrieve a seed value, receive a digital bit stream, receive a digital bit stream, generate a stream of random bits, using the seed value as a seed to a pseudo random number generator (PRNG), wherein the stream of random bits contains at least as many bits as the digital bit stream, shuffle bits of the stream of random bits to create a random bit buffer, generate an obfuscated digital bit stream by applying a first exclusive OR (XOR) to the digital bit stream and the random bit buffer, wherein the obfuscated digital bit stream has the same number of bits as the digital bit stream, and provide the obfuscated digital bit stream to the communications interface.
Blockchain Computer Data Distribution
Blockchain distribution of computer data is disclosed. Computer data can comprise computer code, a computer code segment, a computer command, or a block of computer data, which can be employed by a device to patch software, change a device state, or synchronize data between devices. Blockchain distribution can provide benefits in a heterogeneous device environment, facilitate ad hoc device synchronization, and embody a distributed patch and communications network. Devices can receive a blockchain block from another device and, in some embodiments, enable other devices to access the block from the device. In some embodiments, devices can discard irrelevant blocks, however, an entire blockchain can be reconstructed where partial blockchains can be received from more than one device. Additionally, checkpoint blocks can enable devices to navigate the blockchain efficiently by skipping over known irrelevant blocks.
SYSTEM AND METHOD FOR CRYPTOGRAPHIC CHOICE MECHANISMS
The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants’ submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants’ advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.
SYSTEM AND METHOD FOR CRYPTOGRAPHIC CHOICE MECHANISMS
The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants’ submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants’ advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.
QUANTUM KEY DISTRIBUTION METHOD AND DEVICE, AND STORAGE MEDIUM
This application discloses quantum key distribution methods and devices, and storage media. In an implementation, an i.sup.th node generates, based on a determined first quantum key corresponding to the i.sup.th node on a target routing path and a determined second quantum key corresponding to the i.sup.th node on the target routing path, a third quantum key corresponding to the i.sup.th node on the target routing path, and sends the third quantum key corresponding to the i.sup.th node on the target routing path to a destination node on the target routing path, or encrypts a received first ciphertext by using the third quantum key corresponding to the i.sup.th node on the target routing path, and sends an obtained second ciphertext corresponding to the i.sup.th node to an (i+1).sup.th node on the target routing path.
Method for Exchanging and Storing Electronic Keys
In one example, a first wireless device transmits one or more electronic keys, and a second wireless device receives and stores the electronic key(s) in a memory. A server or a user device uploads, receives or synchronizes the electronic key(s) from the second wireless device. In another example, one or more electronic keys are transmitted using a first wireless device, the electronic key(s) are received and stored in a memory of a second wireless device, and the electronic key(s) or other data are transmitted, uploaded or synchronized to a server or a user device. In another example, a device comprises: a wireless transceiver; a memory; and a processor communicably coupled to the wireless transceiver and the memory, wherein the processor receives one or more electronic keys from one or more wireless devices, and stores the electronic key(s) in the memory.
APPARATUS AND METHOD FOR SYNCHRONIZING CONSENSUS NODE INFORMATION IN BLOCKCHAIN NETWORK
Disclosed herein are an apparatus and method for apparatus for synchronizing consensus node information in a blockchain network. The apparatus for synchronizing consensus node information includes one or more processors, and execution memory for storing at least one program that is executed by the one or more processors, wherein the at least one program is configured to receive a committed message for block consensus from the blockchain network and verify nodes participating in the block consensus, set a block number required to participate in the block consensus to a block size of a start block of a section corresponding to the block consensus, and broadcast consensus node information including the block number to the blockchain network.
SYSTEM AND METHOD FOR ESTABLISHING SECURE COMMUNICATION CHANNELS WITH INTERNET THINGS (IOT) DEVICES
A system and method are described for establishing secure communication channels. For example, one embodiment of a system comprises: an IoT device comprising secret/counter processing logic/circuitry to generate a master secret, the master secret to be transmitted to an IoT service; one or more IoT hubs to receive the master secret from the IoT service over a first secure communication channel, at least one of the IoT hubs to use the master secret to establish a second secure communication channel with the IoT device.
ENHANCEMENT OF FLEXIBILITY TO CHANGE STS INDEX/COUNTER FOR IEEE 802.15.4Z
A method and apparatus of a first network entity in a wireless communication system is provide. The method and apparatus comprises: identifying at least one set of bit strings to generate a ranging scrambled timestamp sequence (STS); identifying at least one initialization vector (IV) field corresponding to the at least one set of bit strings, wherein the at least one IV field comprises a 4-octet string; generating a ranging STS key and IV information element (RSKI IE) that includes the at least one IV field to convey and align a seed that is used to generate the ranging STS; and transmitting, to a second network entity, the generated RSKI IE for updating the ranging STS of the second network entity.
MITIGATING DRAWBACKS OF CIPHERING FAILURES IN A WIRELESS NETWORK
A wireless communication device communicates with a GPRS wireless network where ciphering has gone out of sync between the wireless communication device and the wireless network. The wireless communication device triggers an authentication procedure that re-synchronizes the ciphering. Following the trigger, the wireless communication device and the wireless network continue the authentication procedure so that ciphering parameters can be negotiated again and data communication can resume.