Patent classifications
H04L2209/30
Systems, devices, and methods for encrypting genetic information
Systems, devices, and methods for encrypting genetic information are provided herein. Also provided herein are systems, devices, and methods for encrypting compressed genetic data, transmitting encrypted compressed genetic data, and receiving, storing, accessing encrypted compressed genetic data. In some cases, a user interface is in communication with a system or device provided herein.
Polymorphic digital security and methods of use thereof
Described herein are various methods of generating and using a digital signature, such as a polymorphic digital signature. One or more methods of creating a digital signature permit strings of characters, which may be simple or complex, to uniquely identify large numbers of people, things, and actions. Different people, things, and actions can use the same set of characters to identify themselves and yet still be uniquely identified.
METHOD AND APPARATUS FOR MANAGING ENROLLMENT CERTIFICATE IN SECURITY CREDENTIAL MANAGEMENT SYSTEM FOR V2X COMMUNICATION
A method for managing an enrollment certificate in an SCMS for V2X communication may comprise receiving a message requesting an authority for generating a CSR from a DCM; updating device certification data through a certification laboratory that manages performance and requirements of an EE, and verifying the EE that requested issuance of an enrollment certificate to the DCM by using the updated device certification data; transmitting response data indicating the authority for generating a CSR to the DCM based on a result of the verification; receiving a CSR generated according to the response data from the DCM; and verifying the received CSR, and requesting response data for the CSR to an ECA based on a result of the verification.
Encrypted and Compressed Data Transmission with Padding
In some examples, a system for executing instructions can include a processor to detect data to be transmitted to a storage device in response to a write operation. The processor can also determine that the data comprises a compressible characteristic that enables compression of the data to a size below a threshold value. Additionally, the processor can generate a modified data block by encrypting the compressed data, and adding a padding to the compressed and encrypted data. Furthermore, the processor can transmit the modified data block to the storage device.
Computer-Implemented method for error-correction-encoding and encrypting of a file
A computer-implemented method for error-correction-encoding and encrypting of a file is provided. The file is split into at least two blocks. The first block is encrypted using a given encryption key. The encrypted first block is encoded twice using a first and second forward error correction code of the first block. Each subsequent block is encrypted by performing an algebraic operation. The encrypted block is encoded twice using a first and second forward error correction code for this block, wherein a cryptographic indexing function provides a set of indices used by the second forward error correction code to produce the second encoded chunk. The first encoded chunks of each encrypted block are outputted. The computer-implemented method enables secure transmission of a file content between low power devices.
Enhanced secure provisioning for hotspots
A ticket-based shared secret authentication is provided. A client device receives a ticket, and performs an authentication with an access point using the ticket. The access point deploys a first public key-private key pair to an intermediate device. The intermediate device and access point share a master secret to protect information in the ticket. The access point receives an association request from the client device that includes a nonce public key and a signature using a second public key-private key pair provided by the intermediate device. The access point authenticates the client device using the nonce public key. The access point sends an association response to the client device based on the authentication and a signature using the first public key-private key pair. The access point initiates an association with the client device to permit the client device to connect to a network associated with the access point.
Recovering data in a dispersed storage network
A method for execution by a dispersed storage and task (DST) client module includes issuing a read threshold number of read slice requests are issued to storage units of the set of storage units. One or more encoded slices of a selected read threshold number of encoded slices are received. When a next encoded data slice of a decode threshold number of encoded data slices is received within a response timeframe, outputting of the next encoded data slice is initiated. When the next encoded data slice is not received within the response timeframe, receiving of another decode threshold number of encoded slices of the set of encoded slices is facilitated. The other decode threshold number of encoded slices are decoded to produce recovered encoded data slices, where the recovered encoded data slices includes at least a recovered next encoded data.
SIGNATURE COMPRESSION FOR HASH-BASED SIGNATURE SCHEMES
A digital signature over a message may be compressed by determining a plurality of values based at least in part on the message. A mapping of the plurality of values over a digital signature scheme may be used to determine a value from which a portion of the compressed digital signature is decompressible by cryptographically deriving one or more components of the uncompressed digital signature. A public key may be used to verify the authenticity of the compressed digital signature and message.
Mapping slice groupings in a dispersed storage network
A distributed storage network includes a method of receiving data and a corresponding task, selecting one or more storage units for the task based on a capability level associated with each of the storage units, identifying a plurality of data groups of the data, determining a chunk size based on the plurality of data groups, determining processing parameters of the data based on the chunk size, generating a set of chunksets from the plurality of data groups in accordance with the chunk size and processing parameters and encoding the set of chunksets in accordance with the processing parameters to produce slice groupings. The method further includes determining task partitioning based on the storage units and the processing parameters, partitioning the task based on the task partitioning to produce partial tasks and sending the slice groupings and corresponding partial tasks to the storage units.
Method for strongly encrypting .ZIP files
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well-established .ZIP file format to support higher levels of security and multiple methods of data encryption and key management, thereby producing a highly secure and flexible digital container for electronically storing and transferring confidential data.