H04L2209/30

SYSTEM AND METHOD FOR CONTROLLING DATA USING CONTAINERS
20220198034 · 2022-06-23 ·

An electronic device for managing secured data containers, the electronic device comprising at least one network interface, at least one memory storing executable instructions, and at least one processor coupled to the at least one network interface and the at least one memory. Execution of the executable instructions by the at least one processor causes the electronic device to receive a request for data container creation, retrieve data related to the request for data container creation, retrieve one or more parameters constraining use of the data, encrypt the data using a public encryption key, encode the encrypted data into a data storage area of a data container, encode the one or more parameters constraining use of the data into a machine readable parameter storage area of the data container, and assign a UUID to the data container.

Method and device for compressing and decompressing unit files for EPUB file encryption
11360941 · 2022-06-14 · ·

Disclosed are a method and a device for compressing and decompressing unit files when encrypting an electronic publication (EPUB) file. The method for compressing unit files for EPUB file encryption comprises: a step of determining an encryption target unit file from among a plurality of unit files forming an EPUB file; a step of performing encryption of the compressed encryption target unit file; and a step of performing compression of general unit files among the plurality of unit files in addition to the encryption target unit file. As such, by performing compression of the encryption target unit file before the general unit files, it is possible to effectively reduce the size of a single packaged EPUB file.

CREATING DETERMINISTIC CIPHERTEXT USING WIDE-BLOCK ENCRYPTION
20220182219 · 2022-06-09 ·

A computer-implemented method according to one embodiment includes compressing an uncompressed instance of data to create a compressed instance of data; encrypting the compressed instance of data utilizing wide-block encryption in response to determining that a size of the compressed instance of data is less than a predetermined threshold; and adding a zero pad to the encrypted compressed instance of data to create a ciphertext string.

IMPLEMENTING RESILIENT DETERMINISTIC ENCRYPTION
20220182217 · 2022-06-09 ·

A computer-implemented method according to one aspect includes creating an initialization vector, utilizing an instance of plaintext and a secret key; encrypting the instance of plaintext, utilizing the initialization vector, the secret key, and the instance of plaintext; combining the initialization vector and the encrypted instance of plaintext to create a ciphertext string; and sending the ciphertext string to a storage device performing deduplication.

OBFUSCATION FOR PROTECTION OF STREAMING MEDIA AND OTHER DATA FLOWS
20220171618 · 2022-06-02 · ·

A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.

METHOD FOR DETERMINING A PREIMAGE ELEMENT OF A CRYPTOGRAPHIC HASH FUNCTION, COMPUTER PROGRAM, AND DATA PROCESSING SYSTEM
20220166627 · 2022-05-26 · ·

A method for determining a preimage element of a cryptographic hash function includes providing an output value of a cryptographic hash function and hash function operations of the cryptographic hash function; for each of the hash function operations, determining at least one hash function relation, comprising an equation and/or an inequality; determining an optimization problem comprising: the output value, at least one constraint assigned to an iteration of the cryptographic hash function, and optimization variables comprising internal state variables of the cryptographic hash function and at least one preimage variable, wherein the at least one constraint is determined from the at least one hash function relation and comprises preceding internal state variables assigned to a preceding iteration; and solving the optimization problem and determining a preimage element of the cryptographic hash function from an optimizing value of the at least one preimage variable.

SYSTEMS AND METHODS FOR PACKET-BASED FILE COMPRESSION AND STORAGE

A system described herein may provide a technique for compressing sets of files using a packet-based conversion algorithm. The algorithm may compress and decompress files using a packet-based approach, whereby packet-sized sections of file data are compressed and arranged in a specified order such that the sections may be retrieved, decompressed, and reassembled to restore the original files as needed. The packet-based approach may allow for the size of a file set to be dramatically reduced, while the resulting compressed data may not be easily accessed by unauthorized entities. Compression and decompression may utilize a pointer associated with each file in the set of files. The pointer may be generated based on data associated with a file, such as file name, size, and/or other attributes or metadata. The compressed packets may be arranged relative to the pointer within a compressed file such that the packets may be identified and decompressed.

The Generation Of One Way Functions, Based On Mutual Hiding Predefined Success Criteria

A method for creating a one-way function from a computation problem instances with a predefined success criteria, based on mutual hiding of the success criteria, comprising the steps of selecting at least a first and a second original computation tasks, each having an original corresponding success criterion; applying a function (such as a bitwise XOR operation) over both original corresponding success criteria, to form a single combined success criterion for a mutual computation task being a combination of the at least a first and a second original computation tasks; outputting the original computation tasks along with the combined success criterion, while excluding the original corresponding success criteria.

METHOD AND SYSTEM FOR AN EFFICIENT CONSENSUS MECHANISM FOR PERMISSIONED BLOCKCHAINS USING AUDIT GUARANTEES
20220141018 · 2022-05-05 · ·

A method for addition of a block to a permissioned blockchain using efficient consensus includes: storing a blockchain; receiving transaction messages having transaction values from consensus nodes; generating a Merkle root for the transactions messages using transaction references; generating a proposed block header having the Merkle root and a hash of the header of the most recently added block in the blockchain; hashing the proposed block header; transmitting a proposal message having a digital signature and the hashed proposed block header to auditing nodes; receiving a response message accepting the digital signature from a majority of auditing nodes; transmitting an accept message to the auditing nodes; transmitting a confirmation message to the consensus nodes including the hashed proposed block header and digital signature; and writing a new block to the blockchain having the transaction values from the transaction messages and a header including the proposed block header and digital signature.

Apparatus and method for determining encoded parameter value in wireless communication system
11770249 · 2023-09-26 · ·

The present disclosure generally aims to prevent failure of decoding data in a wireless communication system. A method for operating a receiving end comprises the steps of: receiving a packet from a transmitting end; decoding the received packet using encoded parameters; detecting failure to release compression of a header in the decoded packet; and adjusting the value of the encoded parameters according to the detection of failure to release compression.