H04L2209/26

Regulating communication comprising access to protected data
10951398 · 2021-03-16 · ·

Executable code, placed into a plurality of computing resources forming a distributed ledger, (e.g., smart contracts) are provided to enable communicating between parties without requiring trust or an intermediary, such as a broker or escrow service. Data may be deposited in a secure data storage for access by a party who satisfies the condition of the smart contract. A resource holding the deposited data then activates a link upon receiving an access token, as produced as a result of satisfying the smart contract. The distributed ledger is then updated to enable other parties to see a description of the data and the terms.

Authentication system

An authentication system includes a vehicle onboard ECU, an update tool for vehicle control software, and an authentication server for the update tool. The update tool substitutes predetermined-constant and first-random-number into predetermined-function to generate first-value and send it to the authentication server. The authentication server signs the first-value using secret-key and send it to the update tool. The update tool transmits the first-value and signature to the ECU upon connection. The ECU verifies the signature using public-key and substitutes the predetermined-constant and second-random-number into the predetermined-function to generate second-value and send it to the update tool. The update tool substitutes the second-value and first-random-number into the predetermined-function to generate third-value. The ECU substitutes the first-value and second-random-number into the predetermined-function to generate fourth-value upon verification of the signature. The ECU allows vehicle control software update by the update tool when the third-value and fourth-value are identical.

DYNAMIC SECRET KEY SECURITY SYSTEM FOR TEST CIRCUIT AND METHOD OF THE SAME
20210083868 · 2021-03-18 ·

A dynamic secret key security system for test circuit and a method of the same are disclosed. The security architecture includes a scan chain set, a dynamic key generator, a secret key checking logic, a fake response generator, and a controller. Scan chains of the scan chain set receive a test vector while the dynamic key generator produces different secret keys according to the test vector received. The secret key checking logic is used for comparing the test vector with the secret key so as to know whether they are the same. Thus whether the test vector being input is legal can be learned. Thereby the present dynamic secret key generation technique provides higher security level. Moreover, the secret key will not be stored in the memory in advance so that attackers cannot get the secret key through attacks on the memory.

Method for restoring public key based on SM2 signature

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.

Computing device having two trusted platform modules

A computing device is provided including a motherboard including a control module, a first trusted platform module (TPM), and a second TPM. The control module directs security operations to the first TPM, wherein the control module is operable to detect whether or not the first TPM is damaged, and wherein the control module, in response to detecting that the first TPM is damaged, is operable to direct subsequent security operations to be performed by the second TPM. A computer program product is also provided including non-transitory computer readable storage media embodying program instructions executable by a processor to direct security operations to a first TPM coupled to a motherboard of the computing device, detect whether or not the first TPM is damaged, and, responsive to detecting that the first TPM is damaged, direct subsequent security operations to a second TPM coupled to the motherboard of the computing device.

RFC-directed differential testing method of certificate validation in SSL/TLS implementations
10897484 · 2021-01-19 · ·

The present invention relates to the technical field of computer software analysis and discloses an RFC-directed differential testing method of certificate validations in a SSL/TLS implementations which includes: extracting rules from RFC and updating the rules, classifying the rules, further classifying consumer rules and shared rules into breakable rules and unbreakable rules, expressing the rules as variables, and generating a symbolic program; generating low-level test cases by applying the dynamic symbolic execution technique to the symbolic program; assembling high-level test cases i.e. digital certificates according to the low-level test cases; and employing the assembled digital certificates to the differential testing of the certificate validation in SSL/TLS implementations.

Trustless physical cryptocurrency

A physical cryptocurrency may comprise a physical medium and an attached processor. The processor may generate a public-private key pair, or the public-private key pair may be generated in a secure and auditable manner external to the processor and stored on the processor. The private key may enable execution of a smart contract on a blockchain to transfer an asset from a starting address to a destination address on the blockchain.

Methods and systems for cryptographically secured decentralized testing

A method of cryptographically secured decentralized testing, includes receiving, by a computing device and from a secure test apparatus, an output of a cryptographic function of a secret test result identifier, authenticating the output, and recording, in a data repository, an indication of a test result as a function of the output.

Optimizing performance of a blockchain

An example operation may include one or more of monitoring, by an adaptive traffic engine, transactions data of a blockchain, detecting, by the adaptive traffic engine, a transaction commit event time out in a blockchain, determining, by the adaptive traffic engine, a processing queue of a the blockchain, measuring, by the adaptive traffic engine, a sending rate of the blockchain, and adjusting the sending rate, by the adaptive traffic engine, based on the transaction commit event time out, the processing queue and the sending rate to optimize performance of the blockchain.

ELECTRONIC DEVICE AND CORRESPONDING METHOD OF OPERATION
20200394338 · 2020-12-17 ·

An electronic device such as a hardware security module device comprises a first cryptographic processing circuit configured to receive input data packets and apply thereto a first cryptographic processing to provide output data packets. A second cryptographic processing circuit is provided in the device, configured to receive the output data packets, apply thereto a second cryptographic processing inverse to the first cryptographic processing, and provide comparison data packets as a result of applying the second cryptographic processing to the output data packets received. A comparison processing circuit in the device is configured to compare the input data packets with the comparison data packets, and to produce an error signal as a result of the input data packets being different from the comparison data packets.