Patent classifications
H04L9/34
Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Software installed in the nodes in a communication network allows them to perform a “name server” function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a “task” function, which entails the receipt and transmission of the packets, and an “authority” function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.
Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce
Software installed in the nodes in a communication network allows them to perform a “name server” function, which entails the management of a dynamic list of the client devices that are connected to the cloud, a “task” function, which entails the receipt and transmission of the packets, and an “authority” function, which entails the determination of the routes of the packets through the cloud. Each node is capable of performing only one function at a time. After completing a job, a node reverts to an undifferentiated, state awaiting its next performance request.
Secure engine communication
A method of communication, within a processing system of a gas turbine engine, between a first electronic component and a second electronic component, comprising: generating by the first electronic component, a request, comprising a digital certificate, intern comprising a first host public key and a first client public key, signed with a first host private key, to initiate a trusted communication session with a second electronic component; encrypting at the first electronic component, at least a portion of the request with a first client private key; transmitting the request to the second electronic component; the first host private key and the first host public key defining a first asymmetric keypair and the first client private key and the first client public key defining a second asymmetric keypair.
Parallel cross-domain guard engines with sequential cryptographic controls
A system and method for cross-domain parallel inspection of data packets in transit between domains of differing security classification incorporating sequential cryptographic control is disclosed. In embodiments, the system includes first and second random number generators, each generating a one-time pad for transmission to both a corresponding front-end cryptographic engine and a parallel guard engine. The cryptographic engines double encrypt the data packet in sequence according to the one-time pads, storing the encrypted packet in a holding register. Each guard engine inspects the data packet in parallel, indicating approval by transmitting a release to the holding register and sending its one-time pad to a back-end cryptographic engine. When the holding register receives both releases, the double encrypted packet is sequentially decrypted by the back-end cryptographic engines in reverse order according to the one-time pads received from the guard engines. The fully decrypted data packet is transferred to the second domain.
Parallel cross-domain guard engines with sequential cryptographic controls
A system and method for cross-domain parallel inspection of data packets in transit between domains of differing security classification incorporating sequential cryptographic control is disclosed. In embodiments, the system includes first and second random number generators, each generating a one-time pad for transmission to both a corresponding front-end cryptographic engine and a parallel guard engine. The cryptographic engines double encrypt the data packet in sequence according to the one-time pads, storing the encrypted packet in a holding register. Each guard engine inspects the data packet in parallel, indicating approval by transmitting a release to the holding register and sending its one-time pad to a back-end cryptographic engine. When the holding register receives both releases, the double encrypted packet is sequentially decrypted by the back-end cryptographic engines in reverse order according to the one-time pads received from the guard engines. The fully decrypted data packet is transferred to the second domain.
Systems and methods for storing and sharing transactional data using distributed computer systems
A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.
Systems and methods for storing and sharing transactional data using distributed computer systems
A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.
Semiconductor device and security system
A semiconductor device is provided. The semiconductor device includes a unique-information generation portion, a detection portion, a memory portion, and a readout portion. The unique-information generation portion operates in a plurality of operation environments to generate unique information. The unique information includes stable information and unstable information. The stable information is constant in the plurality of operation environments, and the unstable information is different in at least two of the plurality of operation environments. The detection portion detects the unstable information. The memory portion stores the unique information and identification information for identifying the unstable information. The readout portion reads out the unique information and the identification information and outputs the unique information and the identification information to an external portion.
Semiconductor device and security system
A semiconductor device is provided. The semiconductor device includes a unique-information generation portion, a detection portion, a memory portion, and a readout portion. The unique-information generation portion operates in a plurality of operation environments to generate unique information. The unique information includes stable information and unstable information. The stable information is constant in the plurality of operation environments, and the unstable information is different in at least two of the plurality of operation environments. The detection portion detects the unstable information. The memory portion stores the unique information and identification information for identifying the unstable information. The readout portion reads out the unique information and the identification information and outputs the unique information and the identification information to an external portion.
Semiconductor device and security system
A semiconductor device is provided. The semiconductor device includes a unique-information generation portion, a detection portion, a memory portion, and a readout portion. The unique-information generation portion operates in a plurality of operation environments to generate unique information. The unique information includes stable information and unstable information. The stable information is constant in the plurality of operation environments, and the unstable information is different in at least two of the plurality of operation environments. The detection portion detects the unstable information. The memory portion stores the unique information and identification information for identifying the unstable information. The readout portion reads out the unique information and the identification information and outputs the unique information and the identification information to an external portion.