Patent classifications
H04L2209/30
Method of generating a secure record of a conversation
A method is provided for generating a tamper-proof record of a conversation recorded using a recording device. During or after the recording, successive sections, chunks or other form of fragments of the audio recording are sent continuously or intermittently to a secure remote server. The successive fragments are automatically encrypted and stored securely on the recording device until a network connection is available.
Compression in Lattice-Based Cryptography
Compiling a compression function of a lattice-based cryptographic mechanism by (i) basing the compression function on a lossy compression function, (ii) determining an error based on a loss introduced by an integer division, and (iii) determining an output of the compression function based on the error.
System for data sharing platform based on distributed data sharing environment based on block chain, method of searching for data in the system, and method of providing search index in the system
A method of providing a search index based on a Bloom filter in a distributed data sharing environment based a block chain includes generating, by a data generating device, Bloom filters used as the search index on the basis of a hash value calculated by applying a hash function to a keyword set for searching for data which is to be shared, generating, by a block providing server, a new block on the basis of the Bloom filters and the data received from the data generating device and performing proof of work (PoW) on the new block, for adding the new block to the block chain, and distributing, by a block distributing server, block chain data including the new block added to the block chain.
System and method for controlling data using containers
An electronic device for managing secured data containers, the electronic device comprising at least one network interface, at least one memory storing executable instructions, and at least one processor coupled to the at least one network interface and the at least one memory. Execution of the executable instructions by the at least one processor causes the electronic device to receive a request for data container creation, retrieve data related to the request for data container creation, retrieve one or more parameters constraining use of the data, encrypt the data using a public encryption key, encode the encrypted data into a data storage area of a data container, encode the one or more parameters constraining use of the data into a machine readable parameter storage area of the data container, and assign a UUID to the data container.
Validating requests based on stored vault information
A system includes a plurality of storage units, where one or more storage vaults is associated with the plurality of storage units and each storage vault of the one or more storage vaults represents a software-constructed grouping of storage units of the plurality of storage units. The software-constructed grouping of storage units stores encoded data slices. A data segment is encoded using an information dispersal algorithm to produce the encoded data slices. The system further includes a grid access manager that generates a data structure pertaining to the software-constructed grouping of storage units. A storage unit of the software-constructed grouping of storage units receives, from a client computer of the system, a request regarding the data segment, obtains, from the data structure, information regarding the request, determines whether the request is valid based on the information regarding the request, and when the request is valid, executes the request.
Systems and methods for packet-based file compression and storage
A system described herein may provide a technique for compressing sets of files using a packet-based conversion algorithm. The algorithm may compress and decompress files using a packet-based approach, whereby packet-sized sections of file data are compressed and arranged in a specified order such that the sections may be retrieved, decompressed, and reassembled to restore the original files as needed. The packet-based approach may allow for the size of a file set to be dramatically reduced, while the resulting compressed data may not be easily accessed by unauthorized entities. Compression and decompression may utilize a pointer associated with each file in the set of files. The pointer may be generated based on data associated with a file, such as file name, size, and/or other attributes or metadata. The compressed packets may be arranged relative to the pointer within a compressed file such that the packets may be identified and decompressed.
Digital currency mining circuitry having shared processing logic
An integrated circuit may be provided with cryptocurrency mining capabilities. The integrated circuit may include control circuitry and a number of processing cores that complete a Secure Hash Algorithm 256 (SHA-256) function in parallel. Logic circuitry may be shared between multiple processing cores. Each processing core may perform sequential rounds of cryptographic hashing operations based on a hash input and message word inputs. The control circuitry may control the processing cores to complete the SHA-256 function over different search spaces. The shared logic circuitry may perform a subset of the sequential rounds for multiple processing cores. If desired, the shared logic circuitry may generate message word inputs for some of the sequential rounds across multiple processing cores. By sharing logic circuitry across cores, chip area consumption and power efficiency may be improved relative to scenarios where the cores are formed using only dedicated logic.
Method for Authenticating Messages in Resource Limited Systems
The present invention provides a method for message authentication, in particular in case of low of transmission or storage capacities. The present invention further provides corresponding devices for generating or sending authenticated messages and for receiving or retrieving authenticated messages as well as a system comprising such devices. In an embodiment, the method may comprise (a) preparing a data block having an uncompressed length; (b) compressing the data block so that the data block has a compressed length smaller than the uncompressed length; (c) determining an available length from at least the compressed length and a maximum length of a data frame; (d) calculating a message authentication code, MAC, from at least the data block, having a MAC length not greater than the available length; and (e) creating the data frame, comprising the data block and the MAC.
Compression and homomorphic encryption in secure query and analytics
Systems and methods for end-to-end encryption and compression are described herein. A query is encrypted at a client using a homomorphic encryption scheme. The encrypted query is sent to a server where the encrypted query is evaluated over target data to generate encrypted response without decrypting the encrypted query. The result elements of the encrypted response are grouped, co-located, and compressed, without decrypting the encrypted query or the encrypted response. The compressed encrypted response is sent to the client where it is decrypted and decompressed to obtain the results of the query without revealing the query or results to the owner of the target data, an observer, or an attacker.
Method for index-based and integrity-assured search in a blockchain
The present invention relates to methods for a blockchain search system, and particularly, the present invention relates to methods for assuring the data integrity on blockchain hybrid storage. Furthermore, the present invention provides a cost-efficient update scheme to maintain the on-chain index and authenticated data structure and is efficient and scalable under various operational parameters.