Patent classifications
H04L2209/26
Client software attestation
A server computing device can determine if a software application executing on a client computing device has not been tampered. Software executes on the server device and communicates either directly or indirectly with an attestation service; a client software application running on the client computing device communicates with the same attestation service. A client software application that is able to calculate a cryptographic hash fingerprint of its executing code image communicates to the attestation service to prove it is untampered with. The attestation service then generates a pass or fail attestation result. The attestation result is communicated between the attestation service and the server computing device. The behaviour of the server computing device is controlled in a way that is conditional on whether a prior attestation of the client software was a pass or fail attestation result.
Secure communications amongst connected dice
A plurality of dice having at least a first die and a second die. The first die can generate a measure of the first die using a cryptographic algorithm, a public key and a private key, and a digital signature according to the measure and the private key. The digital signature can include a digest encrypted by the private key. The digest can include the measure. The first die can communicate the measure, the digital signature, and the public key to the second die. The second die can store a validation code representative of a measure of the first die and validate the digital signature using the public key as well validate the measure by comparing the measure to the validation code.
BIT LEVEL SHARDING OF SENSITIVE DATA FOR INCREASED SECURITY
Techniques for obfuscating and/or de-obfuscating data using bit-level shard masks are disclosed. Shard masks are generated. The shard masks are designed to shard a block of data into a number of shards for distribution and storage among a number of storage arrays. The shard masks shard the block of data at a bit-level granularity. The shard masks are applied to the block of data to generate the shards. The shards are then distributed among the storage arrays for storage on the storage arrays.
Mutual authentication system and mutual authentication method
To provide a mutual authentication system which is not required to erase master key when a slave device is replaced. The storage part stores a temporary key which is key data used temporarily and a master key which is key data used for authentication. The storage part stores the temporary key. The key confirmation unit inquires whether the slave device stores the master key. The key confirmation response unit confirms whether the master key has already been stored in the storage part for an inquiry from the master device and responds. The key introduction unit encrypts the master key by using the temporary key and transmits to the slave device. The key storage unit decrypts the encrypted master key by using the temporary key and stores in the storage part. The main authentication unit and the sub-authentication unit authenticate with each other by using the master key.
ELECTRONIC TEST EQUIPMENT AND OPTIONAL FUNCTION CONFIGURING METHOD
The present application relates to an electronic test equipment and an optional function configuring method. A ciphertext decryption authentication unit performs a decryption authentication operation according to a function option key and a function option ciphertext, performs a corresponding operation on a function device corresponding to the function option ciphertext according to an authentication result signal, and outputs the authentication result signal to an operation control unit, such that the operation control unit operates, according to the authentication result signal, a target function corresponding to the function option ciphertext.
CRYPTOGRAPHIC SYSTEMS AND NON-DETERMINISTIC RANDOM NUMBER GENERATORS BASED ON QUANTUM SYSTEMS
This disclosure relates to protocols and systems for generating random bit strings by amplifying weak bit strings using certified quantum random bit strings generated by measuring a quantum state of entangled photons. Some disclosed systems include a quantum apparatus comprising one or more quantum systems configured to generate entangled photons and measure their quantum state. Certain disclosed systems include one or more security tests, wherein at least one security test evaluates the quantum nature of the measurements using a Bell inequality. A randomness extractor can amplify the randomness of weak random strings using random strings certified by the security tests. The generated random bit strings may be used as cryptographic keys.
Method and apparatus for two-step data signing
A system and method for signing data is presented. In one embodiment, the method comprises: generating a data signing key; transforming the data signing key into a first subkey and a second subkey; encrypting the first subkey according to a secret key of an ODSS; generating a signature verification public key; providing the signature verification public key, the encrypted first subkey, and the second subkey for storage in a client device; accepting a request to sign the data, the request having a representation of the data and the encrypted first subkey; generating a partially computed signature of the data according to the representation of the data and the encrypted first subkey; and providing the partially computed signature of the data to the client device.
Simulation device and method for homomorphic cryptosystem
An electronic device is disclosed. The electronic device comprises: a memory for storing at least one instruction; and a processor for executing at least one instruction, wherein the processor executes the at least one instruction so as to, when an operation command for a homomorphic ciphertext is input, obtain an operation result by using a plaintext operation corresponding to the operation command and a plaintext corresponding to the homomorphic ciphertext, and output the obtained operation result in a manner corresponding to the operation command.
Methods for fast, secure boot from nonvolatile memory device and corresponding systems and devices for the same
A method can include storing host code executable by a host device in a nonvolatile memory (NVM) device and NVM code executable by the NVM device. The NVM device can validate the integrity of the NVM code in response to predetermined conditions and generate a code integrity value for validating the NVM code. The code integrity value having a size independent of a size of the host code. An authentication code can be sent to the host device that is generated with at least the code integrity value. In response to read requests from the host device, returning at least portions of the host code for execution by the host device. Corresponding devices and systems are also disclosed.
Homomorphic encryption-based testing computing system
A homomorphic encryption-based testing computing system provides a risk-based, automated, one-directional push of production data through a homomorphic encryption tool and distributes the encrypted data to use in testing of applications. Data elements and test requirements are considered when automatically selecting a homomorphic encryption algorithm. A decisioning component selects an algorithm to use to homomorphically encrypt the data set and a push mechanism performs one or both of the homomorphic encryption and distribution of the encrypted data set to at least one intended host. Once delivered, the testing software and/or testing procedures proceed using the encrypted data set, where results of the testing may be stored in a data store. A validation mechanism may validate the test data against production data and communicates whether testing was successful.