Patent classifications
H04L2209/24
Resistance to cache timing attacks on block cipher encryption
Technology is generally described for improving resistance to cache timing attacks made on block cipher encryption implementations. In some examples, the technology can include identifying one or more tunable parameters of the block cipher encryption algorithm; creating multiple encryption algorithm implementations by varying one or more of the parameter values; causing a computing system to encrypt data using the implementations; measuring average execution times at the computing system for the implementations subjecting the implementations to a cache timing attack; measuring average execution times at the computing system for the implementations subjected to a cache timing attack; computing a time difference between the average execution times for the implementations when not subjected and when subjected to a cache timing attack; selecting an implementation having a lower time difference; and using the selected implementation for a subsequent encryption operation.
System and method for providing massage related services
A method of providing massage related services comprises providing a massage apparatus, establishing a connection between a terminal device and a server computer, transferring a massage program executable on the massage apparatus from the server computer to the terminal device, establishing a connection between the terminal device and the massage apparatus, and transferring the massage program from the terminal device to the massage apparatus. Once the new massage program is downloaded in the massage apparatus, a graphical user interface displayed by a remote controller of the massage apparatus can be updated with a new icon associated with the new massage program. The new massage program then can be executed either from the remote controller or the terminal device. In some embodiments, a massage apparatus and a system including the massage apparatus are also described.
Visible-light communication-based encryption, decryption and encryption/decryption method and system
Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication. A transmit end performs a logical operation on an original data signal and a pseudocode signal varying with a unit interval to obtain a scrambling code signal, and sends the scrambling code signal in a form of a visible light signal. A receive end receives the visible light signal sent by the transmit end, and converts the visible light signal into a digital signal; and decodes the digital signal and a pseudocode signal varying with a unit interval, so as to obtain the original data signal. The visible light signal transmitted between the transmit end and the receive end is not original data, but a scrambling code signal varying with a unit interval, thereby improving security of the photonic Internet of Things.
System and method for performing homomorphic aggregation over encrypted data
A system and method for converting an input dataset based on a query received via a user interface into one or more defined range values is provided wherein the input dataset is converted into one or more defined range values based on a conversion value matrix. The present invention provides for encrypting the defined range values of the input dataset into a first cipher text matrix. Further, the present invention provides for encrypting the conversion value matrix into second cipher text matrix. The present invention provides for performing a computation operation between the first cipher text matrix and the second cipher text matrix to generate an aggregated cipher text matrix. The present invention provides for decrypting the aggregated cipher text matrix into a decrypted result matrix. The present invention provides for performing an aggregation operation by counting pre-defined digit in each column of the decrypted result matrix.
WWAN-WLAN AGGREGATION SECURITY
One feature pertains to a method for secure wireless communication at an apparatus of a network. The method includes receiving a user equipment identifier identifying a user equipment and a cryptographic key from a wireless wide area network node, and using the cryptographic key as a pairwise master key (PMK). A PMK identifier (PKMID) is generated based on the PMK and the two are stored at the network. A PMK security association is initialized by associating the PMK with at least the PMKID and an access point identifier identifying an access point of the apparatus. An association request is received that includes a PMKID from the user equipment, and it's determined that the PMKID received from the user equipment matches the PMKID stored. A key exchange is initiated with the user equipment based on the PMK to establish a wireless local area network security association with the user equipment.
Moderation of network and access point selection in an IEEE 802.11 communication system
A method for use in a front-end network communications device, arranged to operate as an access point, for establishing a data connection between a mobile communications terminal and one or more data communications networks comprises receiving, from the mobile communications terminal, a service provider request comprising a MAC address of the mobile communications terminal; sending, to a master server, request information pertaining to the service provider request; receiving, from the master server, a policy message comprising a visibility policy, said visibility policy containing rules for controlling the visibility of at least one of the one or more data communications networks; determining a subset of communications networks that should be visible to the mobile communications terminal based on said rules; and enforcing said visibility policy by allowing said mobile communications terminal to connect only to said subset of data communications networks.
In-field smart device updates
Methods and systems for causing a device to join a network or fabric. A joining device sends an indication that the electronic device is not connected to a network type and receives a device ID for an assisting device to assist the electronic device in joining a network of the network type. Moreover, the assisting device resides on the network. The joining device then authenticates to the assisting device from the assisting device and receives network credentials for the network. Furthermore, the joining device joins the network using the network credentials.
Verification of stored encryption keys in multi-tiered encryption system
A background module in a multi-tiered encryption system verifies the integrity of keys used to encrypt and decrypt data. Each encryption tier in the system can include a node programmed to service encryption and/or decryption requests, a key store to store encryption keys, and an audit log to store key identifiers. Each computing node may include a background module that continuously or periodically verifies the integrity of keys. For example, the background module may retrieve an identifier in the audit log, retrieve the object stored at a location in the key data store identified by the identifier, decrypt the encrypted key in the object, and use the decrypted key to decrypt the encrypted identifier in the object. The identifier is compared with the decrypted identifier, and if the identifiers do not match, the background module generates an alert indicating that the key is not valid.
STEGANOGRAPHIC EMBEDDING OF INFORMATION IN CODING GENES
The invention relates to the storage of information in nucleic acid sequences. The invention also relates to nucleic acid sequences containing desired information and to the design, production or use of sequences of this type.
EPHEMERAL CRYPTOGRAPHY KEYS FOR AUTHENTICATING COMPUTING SERVICES
Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.