H04L2209/08

SYSTEM AND METHOD FOR COMPLEX CONFIRMATION OF BIOMETRIC INFORMATION WITHOUT STORED BIOMETRIC DATA
20230246839 · 2023-08-03 ·

A biometric capture is performed to capture multiple regions of a biometric modality of interest, such as regions of a user's face. A complex representation of the user's biometric data is generated, such that each data point within the complex representation is based on biometric information from multiple of the captured regions. Information that later allows reconstruction of the complex representation from another capture of the user's biometric information is stored in a public code that does not include any of the underlying biometric data from the user or information that can be used to derive the underlying biometric data.

SIGNAL PROCESSING SYSTEM

This invention addresses the problem of improving safety in data transmission/reception, and improving the convenience thereof. A base selection unit 123 of an optical transmission device 1 selects a base for arranging each piece of unit information on an IQ plane. A randomization amount adjustment unit 125 adjusts, on the basis of feedback, the randomization amount in random arrangement of the unit information pieces on the IQ plane. A cryptography signal generation unit 13 generates, as an optical signal, multi-value information equivalent to the random arrangement of the unit information pieces on the IQ plane, within the range of the adjusted randomization amount, in accordance with the selected base. An identification circuit unit 222 of an optical reception device 2 identifies, on the basis of the received optical signal, each of the unit information pieces constituting the multi-value information. A communication quality monitoring unit 24 evaluates the results of identifying the unit information pieces. A feedback unit 25 feeds back the evaluation results to the transmission device. The problem is solved thereby.

Randomness verification system and method of verifying randomness

A terminal exchanges a common key generated using a seed, the randomness of which was recognized in advance, with a verification server. The terminal generates verification data using a plurality of measured values from a noise source. The terminal encrypts the verification data with the common key and transmits the verification data to the verification server. The verification server verifies the randomness of verification data obtained by decrypting the encrypted verification data with the common key. When it is determined that the verification data has randomness, the verification server transmits a verification result indicating that the randomness of the verification data is recognized to the terminal. The terminal acquires a plurality of measured values and generates a new seed in accordance with the verification result from the server and preserves the new seed in a secure area.

Systems and methods for providing randomness-as-a-service
11190349 · 2021-11-30 · ·

Systems, apparatuses, methods, and computer program products are disclosed for facilitating on-demand delivery of unknown qubits. An example method includes determining a private set of quantum bases. The example method further includes generating a set of qubits based on the private set of quantum bases. The example method further includes transmitting the set of qubits over a quantum line to a remote device without transmitting the private set of quantum bases.

COMPUTING DEVICE PROCESSING EXPANDED DATA
20210367754 · 2021-11-25 ·

The present invention relates to a computing device for executing a first cryptographic operation of a cryptographic process on useful input data, said computing device comprising a first processor, a second processor and a selection circuit wherein: said selection circuit is configured: for receiving, from an input bus, expanded input data obtained by interleaving dummy input data with said useful input data, for determining positions of the dummy input data in said expanded input data, and for extracting said dummy input data and said useful input data from the expanded input data based on said determined positions, said first processor is configured for executing said first cryptographic operation of said cryptographic process on said extracted useful input data to obtain useful output data, said second processor is configured for executing a second operation on said extracted dummy input data to obtain dummy output data, said computing device being configured for having said operations executed such that leakage generated by said first cryptographic operation is jammed by leakage generated by the second operation.

DEVICES AND METHODS FOR PROTECTING CRYPTOGRAPHIC PROGRAMS
20210367755 · 2021-11-25 ·

There is provided a device for protecting a cryptographic program implemented in a cryptographic computing device, the cryptographic computing device includes one or more processors, the cryptographic program comprising instructions and being associated with an initial execution order of the instructions. The device comprises a compiler to compile the cryptographic program, which provides an intermediate representation of the cryptographic program comprising instructions and variables used to execute the instructions. The device is configured to: determine a graph of dependencies comprising nodes and edges, each node of the graph representing an instruction of the intermediary representation, and each edge of the graph representing a variable of the intermediary representation; mask the graph of dependencies by replacing each variable of the graph of dependencies with a masked variable, the processing unit determining the masked variable by applying a masking scheme to the variable, which provides a masked graph of dependencies; determine at least a set of independent instructions using the masked graph of dependencies; determine an execution order for each set of independent instructions from the initial execution order, the execution order representing the order of execution of the set of independent instructions by at least one of the one or more processors.

METHOD OF ENCRYPTING DATA IN NONVOLATILE MEMORY DEVICE, NONVOLATILE MEMORY DEVICE AND USER DEVICE
20210365388 · 2021-11-25 ·

A method of encrypting data in a nonvolatile memory device (NVM) includes; programming data in selected memory cells, sensing the selected memory cells at a first time during a develop period to provide random data, sensing the selected memory cells at a second time during the develop period to provide main data, encrypting the main data using the random data to generate encrypted main data, and outputting the encrypted main data to an external circuit, wherein the randomness of the random data is based on a threshold voltage distribution of the selected memory cells.

Cryptographic device and memory based PUF
11183083 · 2021-11-23 · ·

Some embodiments are directed to a cryptographic device, including a non-volatile memory, a range of the memory storing data, a selector arranged to receive a selector signal configuring a memory read-out unit for a regular read-out mode or for a PUF read-out mode of the same memory, a control unit arranged to send the selector signal to the selector configuring the memory read-out unit in the regular read-out mode, and reading the memory range to obtain the data, and send the selector signal to the selector configuring the memory read-out unit for PUF read-out mode and obtaining a noisy bit string from the memory range.

Cryptic vehicle shield
11184388 · 2021-11-23 · ·

A method of providing an alert of an occurrence of a hacker intrusion, the method comprising: detecting a hacker intrusion; and transmitting a concealed or camouflaged report of the hacker intrusion to provide an alert of the occurrence of the intrusion.

Configuring a device based on a DPA countermeasure

Input signals may be received. Furthermore, a control signal controlling the implementation of a Differential Power Analysis (DPA) countermeasure may be received. One of the input signals may be transmitted as an output signal based on the control signal. A cryptographic operation may be performed based on the first output signal that is transmitted based on the control signal.