H04L2209/30

Method and system for compression and optimization of in-line and in-transit information security data

This document discloses a method and system for just-in-time compression and optimization of raw unstructured in-line and in-transit data by identifying low entropy data blocks or duplicated information security information in raw computer security alerts within a series of time windows. In particular, the method and system automatically manages; processes; and optimizes in-line and in-transit data blocks or raw information security alerts received from a plurality of information surveillance sources and/or peripheral monitoring devices simultaneously. The data blocks or raw information security alerts that are found to be unique in the various time windows are transposed into meta-definition tables to be further processed while redundant data blocks or raw alerts contained within each particular time window are identified, marked and processed accordingly.

DEVICES FOR PROVIDING A SET OF CRYPTOGRAPHICALLY SECURED AND FILTERED AND SORTED TRANSACTION DATA SETS OF A BLOCK OF A BLOCKCHAIN
20200387622 · 2020-12-10 ·

Apparatuses for a set of cryptographically protected and filtered and also sorted transaction data records of a link of a blockchain and to a method for forming a set of the sorted transaction data records is provided. One aspect is an apparatus for providing a set of cryptographically protected and filtered transaction data records from a set of integrity-checked and semantically sorted transaction data records of a link of a blockchain, which link is formed in particular using the method of providing at least one such link of a blockchain and coupling to a filtering device that ascertains the set of filtered transaction data records from the set of checked and semantically sorted transaction data records of the blockchain by using a filter criterion, and outputting the ascertained set of filtered transaction data records.

SYSTEMS, DEVICES, AND METHODS FOR ENCRYPTING GENETIC INFORMATION

Systems, devices, and methods for encrypting genetic information are provided herein. Also provided herein are systems, devices, and methods for encrypting compressed genetic data, transmitting encrypted compressed genetic data, and receiving, storing, accessing encrypted compressed genetic data. In some cases, a user interface is in communication with a system or device provided herein

User Apparatus and Method for the Protection of Confidential Data

A method and a user apparatus for the protection of confidential data, wherein the apparatus includes an image sensor and a processor configured for: capturing a plurality of images by way of the image sensor, generating a sensor fingerprint on the basis of the plurality of images, encoding at least a portion of the sensor fingerprint using an algorithm of random projections in such a way as to generate a compressed fingerprint, encrypting and/or decrypting the confidential data using the compressed fingerprint as a key.

Method and system for providing an update of code on a memory-constrained device
10853497 · 2020-12-01 · ·

A method for providing a code update on a memory-constrained device includes: determining, by a verifying entity, a minimum necessary compressed code space (MNCCS) of the code update; dividing, by the verifying entity, the code update into N chunks; encrypting, by the verifying entity, the N chunks, wherein encrypting the N chunks includes outputting at least one intermediate ciphertext block of each encrypted chunk, wherein the at least one intermediate ciphertext block of each encrypted chunk is permuted and permutation reference information is generated by the verifying entity; and sending, by the verifying entity, the encrypted chunks, the at least one intermediate ciphertext block of each encrypted chunk, and the permutation reference information to the memory-constrained device.

Electronic node and method for maintaining a distributed ledger
10846281 · 2020-11-24 · ·

An electronic device for maintaining a distributed ledger, which is maintained by multiple electronic nodes, wherein the distributed ledger includes multiple blocks which are associated at least with one of the previously recorded blocks and wherein a block can be added to the distributed ledger based on a mining process, has circuitry configured to perform a mining process of a block to be added to the distributed ledger, wherein the mining process by at least a part of the multiple electronic nodes includes compressing data of the block to be added to the distributed ledger.

WHITEBOX COMPUTATION OF KEYED MESSAGE AUTHENTICATION CODES

Some embodiments are directed to a keyed message authentication code (MAC) device (100) for computing a keyed MAC for an input message using encoded representations. The keyed MAC device may be configured to apply a sequence of compressions functions, at least one of which takes a state as input in an encoded representation.

BLOCKCHAIN LEDGER AUTHENTICATION

A computer-implemented method for performing authentication includes: determining, by a database server storing data in a blockchain ledger, a target ledger segment on which time service authentication is to be performed; generating a Merkle tree corresponding to the target ledger segment; determining a root hash of the Merkle tree, the root hash of the Merkle tree being based on a block hash of each data block in a set of one or more data blocks; executing a predetermined time capture process in a trusted execution environment to obtain a trusted time from an interface provided by a trusted time service organization; generating a digital signature for the trusted time and the root hash in the trusted execution environment; and generating a time service certificate including the trusted time, the root hash, and the digital signature.

BLOCKCHAIN LEDGER COMPRESSION
20200366497 · 2020-11-19 · ·

A method includes: obtaining, by a server storing data in a blockchain ledger, compression point information of the blockchain ledger, in which the compression point information includes identification information of a specified data block, a server digital signature, and a user digital signature, in which the compression point information indicates that a specified portion of the blockchain ledger has passed an integrity verification, and in which the specified portion of the blockchain ledger includes data blocks in the blockchain ledger previous to the specified data block in the blockchain ledger; and compressing data of the specified portion of the blockchain ledger.

Apparatuses for Providing a Set of Cryptographically Protected, Filtered, and Sorted Transaction Data Records of a Link of a Blockchain
20200366463 · 2020-11-19 · ·

Forming a set of protected and sorted transaction datasets of a blockchain may include: a) forming a second block chained to the first block; b) defining a search term in the second block; c) selecting a transaction dataset from a set of unsorted transaction datasets, wherein the selected transaction dataset has been checked for integrity; d) assigning the selected transaction dataset to the search term; e) repeating steps b) to d) until a predefined number of transaction datasets to be selected is reached or the set of unsorted transaction datasets is empty; f) semantically sorting the selected and assigned transaction datasets on the basis of a predefined sorting criterion, wherein the assigned search terms are in an order corresponding to the sorting criterion; and g) forming the set of cryptographically protected and semantically sorted transaction datasets using the order.