Patent classifications
H04L9/14
CYPHER SYSTEM, ENCRYPTION METHOD, DECRYPTION METHOD AND PROGRAM
A cryptographic system includes an encryption apparatus including a memory and a processor configured to encrypt a plaintext into a ciphertext. The processor of the encryption apparatus executes generating first information resulting from encryption of the plaintext by an encryption function of a predetermined block cipher using a first secret key; generating second information resulting from encryption of a preset adjustment value by the encryption function using a second secret key; and generating the ciphertext by encrypting an arithmetic operation result of a bitwise exclusive OR of the first information and the second information by the encryption function using the first secret key.
CYPHER SYSTEM, ENCRYPTION METHOD, DECRYPTION METHOD AND PROGRAM
A cryptographic system includes an encryption apparatus including a memory and a processor configured to encrypt a plaintext into a ciphertext. The processor of the encryption apparatus executes generating first information resulting from encryption of the plaintext by an encryption function of a predetermined block cipher using a first secret key; generating second information resulting from encryption of a preset adjustment value by the encryption function using a second secret key; and generating the ciphertext by encrypting an arithmetic operation result of a bitwise exclusive OR of the first information and the second information by the encryption function using the first secret key.
BLOCKCHAIN-BASED PRIVACY PROTECTION METHOD FOR CONTENT CENTRIC NETWORK (CCN)
A blockchain-based privacy protection method for a CCN includes: executing, by a trusted AAC, an initialization algorithm to generate common parameters and a master key, generating a public key and a private key for each consumer and publisher, and randomly generating, by the trusted AAC, its own public key and private key; calculating a public key, and generating ciphertext and uploading the ciphertext to a CSP; performing transaction on-chaining; and during decryption, finding, by the consumer, transaction information of the content on the consortium blockchain, sending an interest packet based on the transaction information, and obtaining ciphertext CT through a storage address in the transaction information; generating, by the consortium blockchain, an access transaction based on access information of the consumer; sending the ciphertext CT to the consumer through a data packet; and locally decrypting, by the consumer, the ciphertext CT, and verifying correctness of the content.
BLOCKCHAIN-BASED PRIVACY PROTECTION METHOD FOR CONTENT CENTRIC NETWORK (CCN)
A blockchain-based privacy protection method for a CCN includes: executing, by a trusted AAC, an initialization algorithm to generate common parameters and a master key, generating a public key and a private key for each consumer and publisher, and randomly generating, by the trusted AAC, its own public key and private key; calculating a public key, and generating ciphertext and uploading the ciphertext to a CSP; performing transaction on-chaining; and during decryption, finding, by the consumer, transaction information of the content on the consortium blockchain, sending an interest packet based on the transaction information, and obtaining ciphertext CT through a storage address in the transaction information; generating, by the consortium blockchain, an access transaction based on access information of the consumer; sending the ciphertext CT to the consumer through a data packet; and locally decrypting, by the consumer, the ciphertext CT, and verifying correctness of the content.
DEPLOYING A SYSTEM-SPECIFIC SECRET IN A HIGHLY RESILIENT COMPUTER SYSTEM
A computer-implemented method for providing a system-specific secret to a computing system having a plurality of computing components is disclosed. The method includes storing permanently a component-specific import key as part of a computing component and storing the component-specific import key in a manufacturing-side storage system. Upon a request for the system-specific secret for a computing system, the method includes identifying the computing component comprised in the computing system, retrieving a record relating to the identified computing component, determining the system-specific secret protected by a hardware security module and determining a system-specific auxiliary key. Furthermore, the method includes encrypting the system-specific auxiliary key with the retrieved component-specific import key, thereby creating a auxiliary key bundle, encrypting the system-specific secret and storing the auxiliary key bundle and a system record in a storage medium of the computing system.
INTERACTIVE VIDEOGAME VERIFICATION USING CRYPTOGRAPHICALLY PROTECTED TRANSACTION RECORDS
An example method of performing interactive videogame verification using cryptographically protected transaction records includes: receiving, by a videogame server, from a first videogame client device, a first transaction record reflecting a first set of events associated with an interactive videogame session, wherein the first transaction record is cryptographically signed by a first private cryptographic key associated with the first videogame client device; receiving, from a second videogame client device, a second transaction record reflecting a second set of events associated with the interactive videogame session, wherein the second transaction record is cryptographically signed by a second private cryptographic key associated with the second videogame client device; and validating the first transaction record based on the second transaction record.
DECENTRALIZED HOME SENSOR NETWORK
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing sensor communications in a monitored environment. One of the methods includes receiving, by a server and from a device that is accepted to connect with a first network using acceptance data that includes a first key indicating the device is associated with the first network, a request a) to join a second network different from the first network b) that identifies the first key; determining, by the server and using the identification of the first key in the request, that the device that transmitted the request is associated with the first network; and providing, by the server, an notification i) to a user associated with the first network ii) indicating that the device has moved outside the first network.
DECENTRALIZED HOME SENSOR NETWORK
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing sensor communications in a monitored environment. One of the methods includes receiving, by a server and from a device that is accepted to connect with a first network using acceptance data that includes a first key indicating the device is associated with the first network, a request a) to join a second network different from the first network b) that identifies the first key; determining, by the server and using the identification of the first key in the request, that the device that transmitted the request is associated with the first network; and providing, by the server, an notification i) to a user associated with the first network ii) indicating that the device has moved outside the first network.
CLOUD-SIDE COLLABORATIVE MULTI-MODE PRIVATE DATA CIRCULATION METHOD BASED ON SMART CONTRACT
The present invention discloses a cloud-side collaborative multi-mode private data circulation method based on a smart contract, including: S1, a system is initialized; S2, the original data are encrypted into private data, an encryption certificate z′ for storage is generated, and z′ includes metadata and a data certificate key′; S3, the DO calls a smart contract program to realize uplink of the encryption certificate z′ and releases z′ to a block chain through a smart contract, wherein the smart contract is open to all user accounts; S4, rapid data circulation is realized: when DO releases the data certificate, DU has been identified, a DU's account ID.sub.DU is set through an access policy, the DU obtains an encryption key for data access by executing a smart contract and a key algorithm, private data are obtained through metadata and decrypted to obtain a plaintext; and S5, the data circulation is confirmed.
SYSTEM AND METHOD FOR MANAGING SECRETS IN COMPUTING ENVIRONMENTS
Systems and methods for sharing secrets including passwords, keys, and other confidential information used in computing environments. A secrets record generated at a secrets vault client device is encrypted using an application key associated with a computing environment. The encrypted secrets record is stored in the secrets vault server. The secrets vault client device configures a sharing client device and associated with an access token. The secrets vault client device hashes the access token and sends to the secrets vault server as a client identifier. The sharing client device performs a first-time authentication using a hashed access token with the secrets vault server. Upon successful authentication, the sharing client device requests secrets records from the secrets vault server using the client identifier.