H04L2209/26

METHOD FOR RESTORING PUBLIC KEY BASED ON SM2 SIGNATURE
20210160066 · 2021-05-27 · ·

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.

ASYNCHRONOUS PROCESSING OF BLOCKCHAIN BLOCKS

A computer-implemented method includes retrieving, by a bridge device communicatively linked to a blockchain network node of a blockchain network, a first set of blockchain blocks from the blockchain network node using a first set of threads of the bridge device; storing, by the bridge device, the first set of blockchain blocks in the bridge device; and verifying, by the bridge device, a second set of blockchain blocks that are stored in the bridge device using a second set of threads of the bridge device; and wherein retrieving the first set of blockchain blocks and verifying the second set of blockchain blocks are performed asynchronously using the first set of threads and the second set of threads.

System and method for testing authentication and reviewing implementation processes of an application programming interface in a software development platform

A system and method may simplify API design maintenance by providing an interface for configuring cryptographic parameters in the development of secure APIs to allow configuring MLE and X-Pay parameters, testing MLE and X-Pay-supported APIs, and directly viewing decrypted output of APIs which requires MLE. Rather than a pre-configured key store or creating a key store for each API, the system may refer to stored credentials and certificates to make, Mutual SSL and X-Pay token calls within the developer playground and create the key store programmatically. The configuration may be saved in a JSON format so that it may be reused at a later stage for retesting and also may allow saving the complete configuration including credentials, end point, request and response payload so that there is no need to update credentials in a centralized place. The solutions described herein may also eliminate sharing the private key over a network.

MLU-BASED MAGNETIC DEVICE HAVING AN AUTHENTICATION AND PHYSICAL UNCLONABLE FUNCTION AND AUTHENTICATION METHOD USING SAID MLU DEVICE
20210110023 · 2021-04-15 ·

A MLU-based magnetic device including a plurality of MLU-based magnetic cells, each MLU cell including a first ferromagnetic layer having a first magnetization, a second ferromagnetic layer having a second magnetization, and a spacing layer between the first and second ferromagnetic layers. An input device is configured for generating an input signal adapted for changing the orientation of the first magnetization relative to the second magnetization and vary a resistance of the MLU device. A bit line is configured for passing a sense signal adapted for measuring the resistance. A processing unit is configured for computing an electrical variation from the sense signal and outputting an electrical variation signature. The present disclosure further pertains to an authentication method for reading the MLU device.

RANDOMNESS VERIFICATION SYSTEM AND METHOD OF VERIFYING RANDOMNESS

A terminal exchanges a common key generated using a seed, the randomness of which was recognized in advance, with a verification server. The terminal generates verification data using a plurality of measured values from a noise source. The terminal encrypts the verification data with the common key and transmits the verification data to the verification server. The verification server verifies the randomness of verification data obtained by decrypting the encrypted verification data with the common key. When it is determined that the verification data has randomness, the verification server transmits a verification result indicating that the randomness of the verification data is recognized to the terminal. The terminal acquires a plurality of measured values and generates a new seed in accordance with the verification result from the server and preserves the new seed in a secure area.

TRUSTLESS PHYSICAL CRYPTOCURRENCY

A physical cryptocurrency may comprise a physical medium and an attached processor. The processor may generate a public-private key pair, or the public-private key pair may be generated in a secure and auditable manner external to the processor and stored on the processor. The private key may enable execution of a smart contract on a blockchain to transfer an asset from a starting address to a destination address on the blockchain.

Processes and related apparatus for secure access control
10970407 · 2021-04-06 ·

A process for linking a key to a component is disclosed herein along with apparatus that implements the process and related compositions of matter. In various aspects, the key may be a password, hash, key, encryption key, decryption key, seed value, unlock code, or other alphanumeric identifier, and the component includes a computer in networked communication, and may further include a specific user of the computer. The process may include the process step of identifying the component using environmental variables associated with the component, and the process step of forming a representation of the key unique to said component. The representation is tested to determine that the identified component is the source of the representation, in various aspects. Accordingly, the process may include the process step of testing the representation against previous representations thereby determining the representation is not statistically duplicative of previous representations, and the process may include the process step of testing the representation against possible representations from said component where the possible representations are unique to the component.

EXECUTING ENTITY-SPECIFIC CRYPTOGRAPHIC CODE IN A CRYPTOGRAPHIC COPROCESSOR

Disclosed are various embodiments for executing entity-specific cryptographic code in a cryptographic coprocessor. In one embodiment, encrypted code implementing a cryptographic algorithm is received from a service via a network. The cryptographic coprocessor decrypts the encrypted code. The cryptographic coprocessor executes the decrypted code to generate a cryptogram including information encrypted using the cryptographic algorithm. The cryptogram is sent to the service via the network.

BLOCKCHAIN-BASED DATA VERIFICATION METHOD, APPARATUS, AND ELECTRONIC DEVICE
20210049617 · 2021-02-18 · ·

The present application provides blockchain-based anti-counterfeiting methods, apparatuses, and systems. One method includes: obtaining an anti-counterfeiting verification request submitted by a user for a product; initiating anti-counterfeiting verification of the product in response to the anti-counterfeiting verification request, wherein the anti-counterfeiting verification comprises integrity verification of anti-counterfeiting information generated by a plurality of anti-counterfeiting participants on a blockchain, wherein the anti-counterfeiting information comprises a plurality of types of anti-counterfeiting identification information corresponding to the product; and returning an anti-counterfeiting verification result for the product to the user.

Methods and systems for supporting fairness in secure computations

A computer-implemented method, computerized apparatus and computer program product for supporting fairness in secure computations. A trusted execution platform with remote attestation (enclave) is provided to each of a plurality of participants. An authenticated public ledger accessible by all participants is also provided. Each of the enclaves is configured for obtaining at least a portion of an input to a function for computing a joint secret output, complementing the input by obtaining any remainder portion(s) thereof from one or more other enclaves, and, responsive to obtaining an indication from the ledger that the output can be computed by each of the enclaves, providing to the owner participant the output computed using the function and input. At least one of the enclaves is further configured for providing the indication to the ledger responsive to obtaining knowledge that the output can be computed by each of the enclaves.