H04L9/36

SELF-TEST OF AN ASYNCHRONOUS CIRCUIT
20180299509 · 2018-10-18 ·

An indication of an operating mode of an asynchronous circuit may be received. A determination may be made as to whether the operating mode of the asynchronous circuit corresponds to a self-test of the asynchronous circuit. In response to determining that the operating mode of the asynchronous circuit corresponds to the self-test, a first clock signal may be provided to a first portion of a self-test component in a feedback path of the asynchronous circuit and a second clock signal may be provided to a second portion of the self-test component in the feedback path of the asynchronous circuit. Furthermore, a test value may be generated based on the first clock signal and the second clock signal.

Cryptographic block identification apparatus, cryptographic block identification method, and non-transitory computer readable recording medium storing cryptographic block identification program

The present invention relates to a cryptographic block identification apparatus which, in order to analyze encryption logic used by malware to conceal communication, identifies a cryptographic block where encryption logic is stored within a program of the malware. The cryptographic block identification apparatus includes a block candidate extraction part and a cryptographic block identification part. The block candidate extraction part analyzes an execution trace in which an execution step of malware is recorded, calculates an evaluation value representing cipher likeliness of the execution step based on whether or not an operation type that characterizes cipher likeliness of the execution step is included in the execution step, and extracts an execution step where the evaluation value exceeds a threshold L, as a block candidate which is a candidate of a cryptographic block. The cryptographic block identification part identifies a region of the execution trace in which the block candidates are consecutive beyond a threshold M, as a cryptographic block.

Cryptographic block identification apparatus, cryptographic block identification method, and non-transitory computer readable recording medium storing cryptographic block identification program

The present invention relates to a cryptographic block identification apparatus which, in order to analyze encryption logic used by malware to conceal communication, identifies a cryptographic block where encryption logic is stored within a program of the malware. The cryptographic block identification apparatus includes a block candidate extraction part and a cryptographic block identification part. The block candidate extraction part analyzes an execution trace in which an execution step of malware is recorded, calculates an evaluation value representing cipher likeliness of the execution step based on whether or not an operation type that characterizes cipher likeliness of the execution step is included in the execution step, and extracts an execution step where the evaluation value exceeds a threshold L, as a block candidate which is a candidate of a cryptographic block. The cryptographic block identification part identifies a region of the execution trace in which the block candidates are consecutive beyond a threshold M, as a cryptographic block.

SECURITY APPARATUS, ATTACK DETECTION METHOD, AND STORAGE MEDIUM

A security apparatus is provided that is connected to a bus. The security apparatus includes a receiver that receives a first frame from the bus, a memory that stores an examination parameter defining a content of an examination on the first frame, and processing circuitry that performs operations. The performed operations include first determining whether a predetermined condition is satisfied for the first frame. The performed operations also include, in a case where the first determining determined that the predetermined condition is satisfied, updating the examination parameter stored in the memory. The performed operations further include second determining whether the first frame is an attack frame based on the updated examination parameter stored in the memory.

SECURITY APPARATUS, ATTACK DETECTION METHOD, AND STORAGE MEDIUM

A gateway serving as a security apparatus connected to one or a plurality of buses includes a receiver that receives a frame from a bus, a parameter storage that stores an examination parameter defining a content of an examination of the frame, an updater configured to, in a case where a predetermined condition is satisfied for the frame received by the receiver, update the examination parameter stored in the parameter storage, and an examiner that performs an examination, based on the examination parameter stored in the parameter storage, in terms of judgment of whether or not the frame received by the receiver is an attack frame.

SECURE TRANSMISSION OF CONTENT UPDATES VIA QKD NETWORKS
20240364543 · 2024-10-31 ·

A quantum computing device determines that an error occurred during a transmission of an update for content from a server computing device to a client computing device over a quantum communication channel (QCC) that is using a quantum key distribution (QKD) protocol and a key generated by the QKD protocol. The quantum computing device determines a risk of discovery of a vulnerability in the update for the content based on a severity level of the vulnerability in the update for the content transmitted from the server computing device to the client computing device over the QCC, an amount of the key discovered, and an amount of the update for the content transmitted from the server computing device to the client computing device over the QCC discovered. The quantum computing device performs an action based on the risk of discovery of the vulnerability in the update for the content.

Method and apparatus for assuring location data integrity with minimum location disclosure

An invention relates to method and apparatus of a location assurance system and particularly, although not exclusively, the present invention also relates to method and apparatus for assuring location data integrity with minimum location disclosure. The present invention also relates to method and apparatus for assuring location data integrity with minimum location disclosure with protocols to authenticate both spatial and spatio-temporal predicates.

Systems and methods for token authentication

In some embodiments, an authentication system may be configured to process one or more tokens that incorporates one or more tailored-wavelength-range coded patterns, codes represented within a steganographic image, or overlapping codes. As an example, such a token may include (i) one or more invisible-ink-printed patterns printed using infrared ink corresponding to different tailored wavelength ranges within the infrared light spectrum, (ii) one or more steganographic images in which invisible-ink-printed patterns are interweaved within the steganographic images, (iii) visible-ink-printed patterns and invisible-ink-printed patterns printed substantially within the visible ink portions of the visible-ink-printed patterns, or (iv) other features, where the invisible-ink-printed patterns correspond to one or more authentication codes or other data for token authentication.

Communication terminal, sensing device, and server
12160530 · 2024-12-03 · ·

Among information regarding a sensing device (IoT device), only particular content (attribute information) is disclosed. A communication terminal includes a packet-signal reception unit, an attribute-information extraction unit, and an attribute-information transmission unit. The packet-signal reception unit receives a packet signal transmitted from a sensing device around the communication terminal. The attribute-information extraction unit extracts attribute information on the sensing device from the packet signal transmitted from the sensing device around the communication terminal. The attribute-information transmission unit transmits the attribute information that has been extracted to a server.

Communication terminal, sensing device, and server
12160530 · 2024-12-03 · ·

Among information regarding a sensing device (IoT device), only particular content (attribute information) is disclosed. A communication terminal includes a packet-signal reception unit, an attribute-information extraction unit, and an attribute-information transmission unit. The packet-signal reception unit receives a packet signal transmitted from a sensing device around the communication terminal. The attribute-information extraction unit extracts attribute information on the sensing device from the packet signal transmitted from the sensing device around the communication terminal. The attribute-information transmission unit transmits the attribute information that has been extracted to a server.