Patent classifications
H04L2209/08
Systems and methods for privacy-preserving functional IP verification utilizing fully homomorphic encryption
A privacy-preserving verification methodology for SoC computing systems is described. The verification methodology utilizes the principles of Multi-Party Computation (MPC), and enables meaningful manipulation of encrypted data in the encrypted domain through the use of a fully homomorphic encryption (FHE) scheme. In the described verification methodology, IP logic is transformed and test vectors utilized to verify the IP logic are encrypted. The parties involved in the verification (e.g., the designer, the manufacturer, a third-party verification service, etc.) can functionally verify the IP core via the encrypted test vectors while the encrypted test vectors remain in the encrypted domain. Accordingly, the IP core is verified without revealing unwarranted information, such as the underlying IP behind the SoC.
Optical cryptography systems and methods
Systems and methods for restoring or recovering linear polarization state of an optical signal as it exits the far end of an optical fiber are disclosed. The optical signal may have an expected pattern of polarization states through a birefringent material of the optical fiber from a first node to a second node. The optical signal may be received by the second node and resulting polarization states may be measured. In certain non-limiting examples, the measured polarization states may be compared to expected polarization states to determine a characterization angle indicative of an axis of the optical fiber.
Method to Mitigate Timing Based Attacks on Key Agreement Schemes over Controller Area Network
A method of operating at least one node in a communication network that uses a shared communication medium has been developed to reduce or eliminate timing side-channel attacks performed by an adversary that is connected to the shared communication medium. The method includes generating, with a controller in a first node, a first jitter time offset randomly generated from within a predetermined time range, and transmitting, with a transceiver in the first node, a first data bit through an output of the transceiver that is connected to a shared communication medium, the first data bit being transmitted at a first time corresponding to the first jitter time offset added to a first predetermined transmission time.
DEVICE AND METHOD FOR MANAGING PERFORMANCE OF QUANTUM NOISE-BASED RANDOM NUMBER GENERATOR
The present invention presents a device and method for managing the performance of a quantum noise-based random number generator, the device ensuring the performance stability of a random number generator on the basis of an output value for each pixel, which is outputted in correspondence to an optical strength value of an optical signal emitted from a light source and inputted into each pixel, so as to be capable of outputting, within a certain range regardless of devices, a value of an entropic signal outputted from an image sensor, thereby enabling sufficient randomness to be continuously maintained while minimizing deviation between pixels.
Method to Mitigate Voltage Based Attacks on Key Agreement over Controller Area Network (CAN)
A method of operating at least one node in a communication network that uses a shared communication medium has been developed. The method includes adjusting, with a controller in a first node, a resistance of a first potentiometer in the first node to a first resistance level that the controller in the first node determines randomly, the first potentiometer in the first node being connected to an output of a transceiver in the first node and to a shared communication medium, and transmitting, with the transceiver in the first node, a first data bit through the output that is connected to the shared communication medium with the first potentiometer producing the first resistance level.
DEVICE AND METHOD FOR RESONANT CRYPTOGRAPHY
A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator, pseudo-random number generator, and any non-repeating sequence of numbers having a characteristic of a random number stream, and generating a first stream of random numbers. A transmitter, electrically coupled to the random number generator, is also included to transmit the generated first stream of random numbers.
Electronic authentication systems
Methods and devices are provided for use in facilitating transactions between transaction devices and points of interactions. In connection therewith, one transaction device generally includes an input and an output for communicating with a point of interaction with regard to a transaction by a consumer at the point of interaction involving the transaction device. The transaction device also includes a processor in communication with the input and the output. The processor is configured to interact with the point of interaction in connection with the transaction, store transaction data relating to the transaction in a data store during the course of the transaction, and, in response to an interruption in the transaction with the point of interaction, retrieve transaction data stored in the data store in order to resume the transaction with the point of interaction when communication with the point of interaction is restored.
BLOCK COMPUTING FOR INFORMATION SILO
Systems and method for applying security measures to data sets requiring external quantum-level processing. Specifically, segmenting a data set into a plurality of data blocks/segments, such that each data block is communicated to different external entities for subsequent quantum-level computing processing of the data blocks. Once the data blocks have been quantum-level processed by the external entities and returned to the data provider/owner, the data blocks are combined to re-form the data set.
Systems and methods for tokenization to support pseudononymization of sensitive data
Systems and methods for tokenization to support pseudonymization are provided herein. An example method includes receiving an input set, seeding a random number generator with one or more secret data, transposing the input set using a first random number/transposition parameter generated by the random number generator to create a transposed input set, transposing a token set using a second random number/transposition parameter generated by the random number generator to create a transposed token set, and generating a token by substituting transposed input set values with transposed token set values.
Certification device and method using image sensor
A mobile device method for certifying a mobile device includes: generating first fixed pattern noise (FPN) information based on column FPN of an image sensor included in the mobile device; and controlling the mobile device to perform a certification by using the first FPN information.