H04L2209/08

PROTECTION AGAINST RELAY ATTACKS IN A WHITE-BOX IMPLEMENTATION

A method is provided for performing a cryptographic operation in a white-box implementation on a mobile device. The cryptographic operation is performed in the mobile device for a response to a challenge from a mobile device reader. The mobile device reader includes a time-out period within which the cryptographic operation must be completed by the mobile device. In accordance with an embodiment, a first time period to complete the cryptographic operation on the mobile device is determined. A predetermined number of dummy computations are added to the cryptographic operation to increase the first time period to a second time period. The second time period is only slightly less than the time-out period by a predetermined safety value to make it less likely a relay attack with be successful.

Randomized Bilateral Trust (RABiT): Trust Building Connectivity for Cyber Space
20180351917 · 2018-12-06 ·

This invention amounts to tools and procedures designed to use randomness sources to establish a secure communication between two nodes in cyber space, and then building on these bilateral trust elements to spread trust throughout the network. Applications include online identity management, and secure payment platforms. This trust build-up from bilateral connections may serve as a blockchain alternative. The bilateral trust solution is not based on mathematical complexity, as the prevailing solutions, but rather on the perfect unpredictability of quantum grade randomness, and as such it is well positioned to withstand cryptanalytic attacks based on quantum computing capability now secretly developed by powerful adversaries.

Electromagnetic jamming device and method for an integrated circuit

A device is provided for jamming electromagnetic radiation liable to be emitted by at least one portion of an interconnect region located above at least one zone of an integrated electronic circuit produced in and on a semiconductor substrate. The device includes an antenna located above the at least one zone of the circuit and generating circuit coupled to the antenna and configured to generate an electrical signal having at least one pseudo-random property to pass through the antenna.

POS system with white box encryption key sharing
10140612 · 2018-11-27 · ·

Systems, and associated methods, involving both a trusted and an untrusted device where sensitive data or keys are shared between those devices are disclosed. A disclosed method includes storing a key in a secure memory on a first device, receiving sensitive data via a user interface on a second device, generating a set of white box encryption instructions based on the key using a white box encryption generator on the first device, generating a complete data representation of the set of white box encryption instructions using a secure processor on the first device, transmitting the complete data representation from the first device to the second device, and encrypting the sensitive data using the complete data representation on the second device. The complete data representation is not Turing complete and is not executable with respect to the second device.

CHALLENGE/RESPONSE SYSTEM
20180337789 · 2018-11-22 ·

A challenge/response system separates a physically unclonable function from the challenge/response. Bits in a challenge are used to qualify random data values. The random data values are permuted to generate a result. The result is used to encrypt a response that is sent in reply to the challenge. Additional permuting mechanisms may be used to further obfuscate the response.

LOCALLY PRIVATE DETERMINATION OF HEAVY HITTERS

Technologies are disclosed for computing heavy hitter histograms using locally private randomization. Under this strategy, agents can each hold a type derived from a large dictionary. By performing an algorithm, an estimate of the distribution of data can be obtained. Two algorithms implement embodiments for performing methods involving differential privacy for one or more users, and usually are run in the local model. This means that information is collected from the agents with added noise to hide the agents' individual contributions to the histogram. The result is an accurate enough estimate of the histogram for commercial or other applications relating to the data collection of one or more agents. Specifically, the proposed algorithms improve on the performance (measured in computation and memory requirements at the server and the agent, as well as communication volume) of previously solutions.

SYSTEM FOR ALLOWING SECURE ACCESS AND USE OF A VIRTUAL CREDENTIAL

Embodiments of the present invention provide a system for authorizing one or more actions using a random token. The system is typically configured for identifying initiation of a first action by a user via a user application located on a mobile device of the user, recording a time stamp and one or more parameters associated with the mobile device, generating a first random token and associating the generated first random token with the first action, transferring the first random token and associating the generated first random token with a virtual credential, receiving a request from an entity system to authorize the use of the first random token for completing the first action, and authorizing the use of the first random token with the virtual credential for completing the first action.

COPY PROTECTION FOR SECURED FILES
20180322294 · 2018-11-08 ·

Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the file may be received. The file may be determined to be subject to copy protection. In response to determining that the file is subject to copy protection, a notification of the copy attempt may be transmitted. Copy protection may then be applied to the file.

COPY PROTECTION FOR SECURED FILES
20180322296 · 2018-11-08 ·

Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the file may be received. The file may be determined to be subject to copy protection. In response to determining that the file is subject to copy protection, a notification of the copy attempt may be transmitted. Copy protection may then be applied to the file.

COPY PROTECTION FOR SECURED FILES
20180322297 · 2018-11-08 ·

Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the file may be received. The file may be determined to be subject to copy protection. In response to determining that the file is subject to copy protection, a notification of the copy attempt may be transmitted. Copy protection may then be applied to the file.