H04L2209/30

SYSTEMS AND METHODS FOR CERTIFICATION OF DATA UNITS AND/OR CERTIFICATION VERIFICATION
20170250815 · 2017-08-31 ·

In some implementations, a data unit may be hashed to generate a hash. A cryptographic structure, such as a Merkle tree or other cryptographic structure, maybe generated based on the hash and published on a block chain or distributed ledger. A proof associated with the data unit may be provided. The proof may allow for independent verification that the data unit is certified. Responsive to obtaining the data unit as at least one data unit to be verified, the data unit may be hashed. The associated proof may be obtained, where the obtained proof includes an index describing a position of the hash among one or more other hashes in the published cryptographic structure. The cryptographic structure may be reconstructed based on the index of the proof. Certification of the data unit may be verified by proving that the hash belongs to a root of the published cryptographic structure.

METHOD AND SYSTEM FOR PROVIDING AN UPDATE OF CODE ON A MEMORY-CONSTRAINED DEVICE
20170243012 · 2017-08-24 ·

A method for providing an update of code on a memory-constrained device includes a) determining a minimum necessary compressed code space (MNCCS) of the update of code, b) dividing the update of code into a plurality of chunks, c) applying an All-Or-Nothing Encryption scheme (AONE) on each chunk, d) providing integrity information of least one intermediate ciphertext block of each AONE encrypted chunk, e) verifying integrity of the one or more intermediate ciphertext blocks based on the provided integrity information, f) providing the encryption key of the AONE for decryption of the update of code if integrity was verified, and g) decrypting the intermediate ciphertext blocks using the provided encryption key and updating the code.

Install time creation of forward error correction data and integrity checksums

A system for transmitting data is disclosed that includes a file distribution system operating on a processor that is configured to identify one or more files for distribution to a device, forward error correction data for the one or more files, and a cryptographic key associated with the device. A Merkle tree system operating on the processor is configured to receive the forward error correction data and to generate an encrypted root hash. A data transmission system operating on the processor is configured to transmit the one or more files and the encrypted root hash to a predetermined device.

Data registration system
11455428 · 2022-09-27 · ·

Provided is a data registration system capable of efficiently registering data related to a vehicle while enhancing confidentiality. The data registration system includes an integration processing server and an integrated database server. The integration processing server creates a data mart having weather data, vehicle condition data, vehicle movement status data, fuel economy data, navigation data, a vehicle ID, and a user ID which are linked to one another and creates an encrypted data mart by encrypting the vehicle ID and the user ID in the data mart. The integrated database server stores the encrypted data mart as registered data in a storage region.

Retrieving Data in a Storage Network
20210397349 · 2021-12-23 ·

A method for execution by a dispersed storage and task (DST) client module includes issuing a read threshold number of read slice requests are issued to storage units of the set of storage units. One or more encoded slices of a selected read threshold number of encoded slices are received. When a next encoded data slice of a decode threshold number of encoded data slices is received within a response timeframe, outputting of the next encoded data slice is initiated. When the next encoded data slice is not received within the response timeframe, receiving of another decode threshold number of encoded slices of the set of encoded slices is facilitated. The other decode threshold number of encoded slices are decoded to produce recovered encoded data slices, where the recovered encoded data slices includes at least a recovered next encoded data.

Outputting of the recovered next encoded data slice is initiated.

SYSTEMS AND METHODS FOR COMPRESSION AND ENCRYPTION OF DATA
20210391990 · 2021-12-16 ·

Systems and methods for compression and encryption of data are described herein. A method includes creating a plurality of hash table keys by applying a bit mask to an encryption key, applying a hashing function to the encryption key, creating a hash table using the hashing function, the hash table including the plurality of hash table keys and index values, the index values each identifying a location of data in the hash table connected to one of the plurality of hash table keys, receiving input data, and encoding the input data to generate encoded data, the encoding including both compression and encryption of the input data using the encryption key and the hash table.

Systems and methods for transcoding and place shifting media content

A set-top box (STB), digital video recorder (DVR), video player or other host device receives and interacts with a transcode module to provide enhanced transcoding capabilities that may be useful in placeshifting or other applications. The transcode module includes a host interface that couples to and communicates with the host device. The transcode module also includes a processor that receives an encrypted media stream from the host device via the bus interface, decrypts the encrypted media stream, transcodes the encrypted media stream to a different format, re-encrypts the transcoded stream, and provides the re-encrypted media stream to the host device via the host interface. The transcoded media content may be placeshifted to a remote player, stored at the host, or used for any other purpose.

Digest listing decomposition

To identify slice errors, a processing module of a computing device in a dispersed storage network (DSN) sends first list digest requests to at least first and second dispersed storage (DS) units. The requests indicates a first range of slice names to include in a first list digest. The processing module receives digest responses from the DS units, and compares the digest responses to determine whether they identify the same slices. If they do not identify the same slices, the processing module sends second list digest requests indicating a sub-range of the first range of slice names to include in second list digests. The sub-range continues to be narrowed until the processing module identifies at least one sub-range of slice names where a slice error exists.

Computer-implemented method for error-correction-encoding and encrypting of a file

A computer-implemented method for error-correction-encoding and encrypting of a file is provided. The file is split into at least two blocks. The first block is encrypted using a given encryption key. The encrypted first block is encoded twice using a first and second forward error correction code of the first block. Each subsequent block is encrypted by performing an algebraic operation. The encrypted block is encoded twice using a first and second forward error correction code for this block, wherein a cryptographic indexing function provides a set of indices used by the second forward error correction code to produce the second encoded chunk. The first encoded chunks of each encrypted block are outputted. The computer-implemented method enables secure transmission of a file content between low power devices.

Employing a protected key in performing operations

A select processor obtains a request to perform a requested operation. The request includes encrypted data and a protected key. The protected key is to be used by the select processor on behalf of an entity unauthorized to use the protected key. The encrypted data is decrypted using the protected key to obtain decrypted data. The requested operation is performed on the decrypted data to obtain resulting data. The resulting data is encrypted (e.g., using the protected key) to obtain encrypted resulting data. The encrypted resulting data is provided to a requestor of the request.