Patent classifications
H04L2209/08
Copy protection for secured files
Embodiments of the present disclosure relate to copy protection. A request to copy a file from a requestor with one or more privileges sufficient to access the file may be received. The file may be determined to be subject to copy protection. In response to determining that the file is subject to copy protection, a notification of the copy attempt may be transmitted. Copy protection may then be applied to the file.
ENHANCED OBFUSCATION OR RANDOMIZATION FOR SECURE PRODUCT IDENTIFICATION AND VERIFICATION
The invention relates to a method of defining a numerical basis by combining at least two different ranges of numbers which can be used to obfuscate an alphanumeric character. This basis can be used for product identification or other methods of creating unique tracking or identification numbers when used in combination with conversion functions.
MUTUAL AUTHENTICATION OF CONFIDENTIAL COMMUNICATION
Embodiments of the invention relate to systems and methods for confidential mutual authentication. A first computer may blind its public key using a blinding factor. The first computer may generate a shared secret using its private key, the blinding factor, and a public key of a second computer. The first computer may encrypt the blinding factor and a certificate including its public key using the shared secret. The first computer may send its blinded public key, the encrypted blinding factor, and the encrypted certificate to the second computer. The second computer may generate the same shared secret using its private key and the blinded public key of the first computer. The second computer may authenticate the first computer by verifying its blinded public key using the blinding factor and the certificate of the first computer. The first computer authenticates the second computer similarly.
Managing information for model training using distributed blockchain ledger
Embodiments are directed to generating and training a distributed machine learning model using data received from a plurality of third parties using a distributed ledger system, such as a blockchain. As each third party submits data suitable for model training, the data submissions are recorded onto the distributed ledger. By traversing the ledger, the learning platform identifies what data has been submitted and by which parties, and trains a model using the submitted data. Each party is also able to remove their data from the learning platform, which is also reflected in the distributed ledger. The distributed ledger thus maintains a record of which parties submitted data, and which parties removed their data from the learning platform, allowing for different third parties to contribute data for model training, while retaining control over their submitted data by being able to remove their data from the learning platform.
INTEGRATED CIRCUIT (IC) SIGNATURES WITH RANDOM NUMBER GENERATOR AND ONE-TIME PROGRAMMABLE DEVICE
Systems and methods of generating a security key for an integrated circuit device include generating a plurality of key bits with a physically unclonable function (PUF) device. The PUF can include a random number generator that can create random bits. The random bits may be stored in a nonvolatile memory. The number of random bits stored in the nonvolatile memory allows for a plurality of challenge and response interactions to obtain a plurality of security keys from the PUF.
Memory system for portable telephone
A memory system is constituted of a file storage flash memory storing a control program required for a control portion and a large amount of data, and a random access memory storing a program used by the control portion and functioning as a buffer memory for received data. Thus, a memory system for a portable telephone capable of storing a large amount of received data at high-speed and allowing reading of the stored data at high-speed is provided.
Side-channel leakage evaluator and analysis kit
A method for analyzing side-channel leakage of an application running on a device including loading the application on a system comprising a device simulator, wherein the application is configured to accept public inputs and secret inputs and selecting a set of public inputs. The method includes, for each public input in the set of public inputs, executing the application on the system comprising the device simulator based on a respective public input and a first value for a secret input and extracting first intermediate values for the simulated device, and executing the application on the system based on the respective public input and a second value for the secret input and extracting second intermediate values for the simulated device. The method includes determining an amount of dependency of a location of the simulated device on the secret input based on a plurality of the first and second intermediate values.
OPTICAL CRYPTOGRAPHY SYSTEMS AND METHODS
Systems and methods for restoring or recovering linear polarization state of an optical signal as it exits the far end of an optical fiber are disclosed. The optical signal may have an expected pattern of polarization states through a birefringent material of the optical fiber from a first node to a second node. The optical signal may be received by the second node and resulting polarization states may be measured. In certain non-limiting examples, the measured polarization states may be compared to expected polarization states to determine a characterization angle indicative of an axis of the optical fiber.
Cryptographic processing device and cryptographic processing method
A memory stores therein first cryptographic information that represents an encrypted polynomial obtained by encrypting a first polynomial that corresponds to a first vector. From a terminal that receives second cryptographic information that represents an encrypted monomial obtained by encrypting a monomial generated by use of a random number, a receiver receives third cryptographic information that represents an encrypted result obtained by encrypting a result of a multiplication of a second polynomial that corresponds to a second vector by the monomial. A processor generates an encrypted polynomial that includes a result of an operation of the first vector and the second vector by use of the first cryptographic information, the third cryptographic information, and information that represents the monomial. An output interface outputs fourth cryptographic information that represents the encrypted polynomial generated by the generator.
Protection from side-channel attacks by varying clock delays
A system, comprising a logic circuit and delay circuitry, is described. The logic circuit is configured to perform a plurality of instances of a particular computation that is based on a plurality of inputs. The delay circuitry is configured to vary a power-consumption profile of the logic circuit over the plurality of instances, by applying, to the inputs, respective delays that vary over the instances, at least some of the delays varying independently from each other. Other embodiments are also described.