H04L2209/04

BLINDING TECHNIQUES FOR POST-QUANTUM PUBLIC KEYS
20220255735 · 2022-08-11 ·

Blinding techniques can be used to obfuscate or otherwise modify a quantum-secure public key (and the corresponding private, or secret, key) such as a lattice-based public key. Blinding of a public key can include selecting a blinding parameter, which can be a vector or matrix, and applying the blinding parameter to the public key. A corresponding modification can be applied to the private key such that data encrypted using the blinded public key can be decrypted using the blinded public key. When a device needs to send a public key in the clear, e.g., in the course of establishing a secure communication session, the device can generate a blinded public key from its static public key and send the blinded key instead of the static public key.

Efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers
11411725 · 2022-08-09 · ·

The present disclosure involves systems, software, and computer implemented methods for a efficient distributed secret shuffle protocol for encrypted database entries using independent shufflers. Each of multiple data providers provides an encrypted secret input value. A set of shuffling clients, independent of the data providers, participate with a service provider in a secret shuffling of the encrypted secret input values. The protocol includes generation and exchange of random numbers, random permutations and different blinding values. A last protocol step includes using homomorphism, for each client, to perform computations on intermediate encrypted data to homomorphically remove a first blinding value and a second blinding value, to generate a rerandomized encrypted secret input value. As a result, the rerandomized encrypted secret input values are generated in an order that is unmapped to an order of receipt, at the service provider, of the encrypted secret input values.

DATA PROCESSING DEVICE AND METHOD FOR TRANSMITTING DATA OVER A BUS
20220283970 · 2022-09-08 ·

Systems, methods, circuits, and devices for data protection are provided. In one example, a data processing device incudes a Physical Unclonable Function (PUF) source that is configured to generate PUF values, a bus, a plurality of bus access components that are configured to access the bus, and a masking information generation circuit. The masking information generation circuit is configured to generate masking information for at least one pair of bus access components using at least one PUF value and to transmit said information to the bus access components. The pair is configured in such a way that one bus access component masks the data according to the masking information generated for the pair before the data is sent over the bus and the other bus access component de-masks the data received over the bus according to the masking information generated for the pair.

Method and apparatus for third-party managed data transference and corroboration via tokenization

A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database. By one approach, network elements provisioned with tokens jointly manage the protocol.

Methods and systems for revealing information in content selectively
20220270062 · 2022-08-25 ·

Methods and systems with “selective-information-revealing” features are described. The features enable a user of an online platform such as an online forum or online publishing platform to post content with one or more elements masked. With the features, an automatically generated suggestion of one or more elements of the content to mask is presented with the suggested elements visually differentiated from the other elements of the content. User interface elements are also provided enabling the user to modify the set of elements to be masked. Further described are additional earn-from-content features enabling a user to be rewarded by disclosing his masked content or selling the privilege of exclusive capabilities regarding his content to another user, and “share-revenue” features enabling revenue earned via earn-from-content features to be shared among a plurality of users.

Selectively private distributed computation for blockchain
11424916 · 2022-08-23 · ·

A method may include receiving, from a first trusted authority, a secret key specific to a party for use in posting to a blockchain. The method may also include receiving, from a second trusted authority, a correlated randomness component specific to the party and associated with a given temporal segment. The method may additionally include generating a party-generated randomized mask, and computing, using an input from the party, the correlated randomness component, and the party-generated randomized mask in a non-interactive multi-party computation (NIMPC), an NIMPC-encrypted input associated with the party for the given temporal segment. The method may also include encrypting the NIMPC-encrypted input according to a blockchain encryption algorithm to yield a ciphertext, and submitting the ciphertext to a block associated with the given temporal segment in a blockchain.

Methods and image processing devices for encoding and decoding private data
11463240 · 2022-10-04 · ·

Methods and image processing devices for encoding and decoding private data are proposed. The method for encoding private data includes to receive an original video frame, mask at least one private area in the original video frame to generate a protected video frame, generate a first encoded frame by encoding the protected video frame, and generate at least one output bitstream for streaming or storage according to the first encoded frame. The method for decoding private data includes to receive at least one input video bitstream to obtain a first encoded bitstream and a second encoded bitstream, decode the first encoded bitstream to generate a protected video frame including image data associated with at least one private area, and output the protected video frame to a display queue such that the at least one private area is displayed.

Methods for protecting computer hardware from cyber threats

A semiconductor intellectual property (IP) core comprising a transformation engine designed and configured to represent each element of a field GF(2.sup.8) using a polynomial of degree no higher than 7+d, where d>0 is a redundancy parameter. Also disclosed in the specification are several other IP cores and several different methods.

BUILDING SYSTEM WITH SMART ENTITY PERSONAL IDENTIFYING INFORMATION (PII) MASKING
20220114283 · 2022-04-14 ·

A building system for operating a building and managing private building information includes a processing circuit configured to receive a request for information for a building entity of a building entity database. The processing circuit is configured to select one of the mask templates from the entity database based on access values associated with the requesting device and a relational link between the building entity and the mask templates, retrieve private information for the building entity in response to a reception of the request for the information, and generate a masked information data structure based on the private information and the one of the mask templates.

Integrity protection

A message authentication code, for a message transmitted and received over a communications network, is formed by applying inputs to an integrity algorithm acting on the message. The inputs comprise: an integrity key; a value indicating a transfer direction; and a frame-dependent integrity input, wherein the frame-dependent integrity input is a frame-dependent modulo count value that also depends on a random value and on a frame-specific sequence number.