Patent classifications
H04L9/32
INFORMATION LEAKAGE MITIGATION ASSOCIATED WITH ELLIPTIC CURVE OPERATIONS
Various techniques are provided to implement information leakage mitigation associated with elliptic curve operations. In one example, a method includes generating second data based on first data. The first data is associated with a message. The second data is associated with a decoy message. The method further includes performing a first elliptic curve operation based on the first data. The method further includes performing a second elliptic curve operation based on the second data. The first elliptic curve operation and the second elliptic curve operation are performed in a random order. Related systems and devices are provided.
METHOD, COMPUTER, AND PROGRAM FOR ARTWORK MANAGEMENT
An artwork management method executed by one or more computers is provided. The artwork management method includes detecting, by a first computer included in the one or more computers, artwork included in a website, determining, by the first computer, whether or not a purchase transaction indicating purchase of the artwork detected is recorded in a blockchain network, and transmitting, by the first computer, a report indicating discovery of unauthorized use of the artwork, in a case where the first computer determines that the purchase transaction is not recorded. According to one aspect, the artwork management method suppresses illegal use of artwork while maintaining accessibility of the artwork.
LOCATION VERIFICATION METHOD AND SYSTEM FOR SMART CITY, AND MOBILE COMMUNICATION DEVICE THEREFOR
A location verification system according to an embodiment of the present disclosure includes a plurality of base stations located in respective preset areas and transmitting, to an adjacent mobile communication device, location verification information obtained by signing GPS information on the base stations with a private key. It is possible to expect an effect of re-verifying a location of a mobile communication device, such as a drone or a smart car, at a destination, when the mobile communication device has moved to the destination based on GPS information.
METHOD FOR GENERATING AND AUTHENTICATING THREE-DIMENSIONAL DYNAMIC OTP WITHOUT PASSWORD INPUT
Disclosed is a method for generating and authenticating a three-dimensional dynamic OTP that does not require input of a password. In the method, a user address received from a user terminal is converted into coordinate values in degrees, minutes, and seconds on latitude and longitude, and set as address coordinates from the coordinates in a unit of seconds and then a two-dimensional reference coordinate system is displayed that is subdivided with the address coordinates as an origin, a two-dimensional function is provided and rotated about an arbitrary axis to form a three-dimensional space by a three-dimensional function, one OTP generation coordinate within the three-dimensional space is provided, and then a one-time password is generated by combining respective coordinate values of x, y, and z axes of the one OTP generation coordinate.
SECURE GUEST IMAGE AND METADATA UPDATE
A secure guest generates an updated image for the secure guest, and computes one or more measurements for the updated image. The secure guest provides the one or more measurements to a trusted execution environment and obtains from the trusted execution environment metadata for the updated image. The metadata is generated based on metadata of the secure guest and obtaining the one or more measurements.
SYSTEMS AND METHODS FOR VERIFYING VIDEO AUTHENTICITY USING BLOCKCHAIN
Disclosed herein are apparatuses and methods for verifying video authenticity using blockchain. An implementation may include receiving a video clip from a first source and generating a genesis block of a blockchain, wherein the genesis block includes the video clip, metadata of the video clip, and a first hash value of both the video clip and the metadata. The implementation includes distributing the blockchain to a plurality of nodes in a blockchain network. The implementation includes for each indication received of activity performed on the video clip to be recorded on the blockchain, verifying the activity and generating a new block on the blockchain recording the activity. The implementation includes receiving a modified version of the video clip, verifying an authenticity of the modified version based on each activity recorded in the blockchain, and in response to determining that the modified version is not authentic, generating an alert indicating inauthenticity.
PRIVACY SAFE JOINT IDENTIFICATION PROTOCOL
The technical problem of matching records in different datasets, for example a host dataset and a partner dataset storing records representing respective users, while maintaining the privacy of each dataset, is addressed by providing a privacy safe joint identification protocol. The privacy safe joint identification protocol computes respective anonymous joint identifiers for records in the two datasets. An anonymous joint identifier is generated such that the host-assigned and the partner-assigned identifies that have been determined to represent the same user are mapped to the same anonymous joint identifier.
PRIVACY SAFE JOINT IDENTIFICATION PROTOCOL
The technical problem of matching records in different datasets, for example a host dataset and a partner dataset storing records representing respective users, while maintaining the privacy of each dataset, is addressed by providing a privacy safe joint identification protocol. The privacy safe joint identification protocol computes respective anonymous joint identifiers for records in the two datasets. An anonymous joint identifier is generated such that the host-assigned and the partner-assigned identifies that have been determined to represent the same user are mapped to the same anonymous joint identifier.
ATTESTATION OF A SECURE GUEST
A trusted execution environment obtains an attestation request. The attestation request includes at least an attestation key. Based on obtaining the attestation request, one or more integrity measurements are computed, and the computing uses at least the attestation key. The one or more integrity measurements are provided to an entity, and the one or more integrity measurements are to be used to verify that a secure guest has been started using a selected secure guest image and selected secure guest metadata.
Validation of Security Device Authentication in a Decentralized Network
Systems and methods to perform validation of authentication of a security device in a decentralized network are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to, identify telemetry associated with the successful authentication. The telemetry is further in a distributed ledger in the decentralized network and can be used to determine validity of an authentication attempt of the security device by a second user device.