H04L2209/30

Devices for providing a set of cryptographically secured and filtered and sorted transaction data sets of a block of a blockchain
11184151 · 2021-11-23 · ·

Apparatuses for a set of cryptographically protected and filtered and also sorted transaction data records of a link of a blockchain and to a method for forming a set of the sorted transaction data records is provided. One aspect is an apparatus for providing a set of cryptographically protected and filtered transaction data records from a set of integrity-checked and semantically sorted transaction data records of a link of a blockchain, which link is formed in particular using the method of providing at least one such link of a blockchain and coupling to a filtering device that ascertains the set of filtered transaction data records from the set of checked and semantically sorted transaction data records of the blockchain by using a filter criterion, and outputting the ascertained set of filtered transaction data records.

Security through data scattering

A method and apparatus of a device that stores an object on a plurality of storage servers is described. In an exemplary embodiment, the device receives an object to be stored and encrypts the object with a first key. The device further creates a plurality of bit vectors from the encrypted object. In addition, the device randomizes the plurality of bit vectors to generate a plurality of randomized bit vectors. Furthermore, the device sends the plurality of randomized bit vectors and the plurality of second keys to the plurality of storage servers, wherein each of the plurality of storage servers stores at least one each of the plurality of randomized bit vectors and the plurality of second keys.

Method and apparatus for managing enrollment certificate in security credential management system for V2X communication

A method for managing an enrollment certificate in an SCMS for V2X communication may comprise receiving a message requesting an authority for generating a CSR from a DCM; updating device certification data through a certification laboratory that manages performance and requirements of an EE, and verifying the EE that requested issuance of an enrollment certificate to the DCM by using the updated device certification data; transmitting response data indicating the authority for generating a CSR to the DCM based on a result of the verification; receiving a CSR generated according to the response data from the DCM; and verifying the received CSR, and requesting response data for the CSR to an ECA based on a result of the verification.

SYSTEM, METHOD AND COMPUTER PRODUCT FOR FAST AND SECURE DATA SEARCHING
20210350018 · 2021-11-11 · ·

A system for fast secured searching may include a user interface, a web layer configured for executing application logic and configured for interacting with a user via the user interface and configured to perform user authentication, and a database layer in communication with and accessible by the web layer and comprising a database configured for storing data, and a search engine configured for searching the database, wherein, communication to and from the database layer from and to the web layer is controlled by secure socket layer certificate authorization. The database layer may also include an inverted index in communication with the database and the search engine and configured for maintaining updated snapshots relating to the data in the database and an encryption/decryption layer for selective encryption of the data and configurable for field level, document level, and/or chunk level encryption.

Systems and methods of aggregate signing of digital signatures on multiple messages simultaneously using key splitting
11171791 · 2021-11-09 · ·

The systems and methods of aggregate signing of digital signatures on multiple messages simultaneously, comprising: receiving two or more digital messages wherein each message is signed using two or more digitally split keys from a private key and the two or more digital signatures of the message using the split key are combined to get a compressed short signature; receiving the compressed short signature for each message; receiving a public key associated with the private key for each message; aggregate signing the messages to output an aggregate signature. The aggregate signature can be further verified against any or all of the messages.

Method and system for detecting an attack on a physically unclonable function (PUF)
11171793 · 2021-11-09 · ·

A method and data processing system is provided for detecting an attack on a physically unclonable function (PUF). In the method, a first list of PUF responses to challenges is produced during production testing of an integrated circuit comprising the PUF. The first list is stored in a memory on the integrated circuit. A second list of PUF responses to the challenges is produced during normal operation of the integrated circuit in the field. The second list is compared to the first list. A difference between entries of the first and second lists computed. If the difference is greater than a threshold difference, then an indication of a hardware trojan is generated. The method may also include monitoring a series of challenges for an indication of a non-random pattern in the series. Detection of a non-random pattern may indicate a modeling attack.

Encrypting data to optimize data reduction

A method of data reduction in a partially encrypted volume includes receiving data to be stored on a storage array, decrypting the data using a first encryption key to generate first decrypted data, and decrypting the data using a second encryption key to generate second decrypted data. The method further includes comparing, by a storage array controller, a first compressibility value of the first decrypted data to a second compressibility value of the second decrypted data. The method further includes storing the first decrypted data if the first compressibility value is greater than or equal to the second compressibility value. The method further includes storing the second decrypted data if the second compressibility value is greater than the first compressibility value.

INSTALL TIME CREATION OF FORWARD ERROR CORRECTION DATA AND INTEGRITY CHECKSUMS

A system for transmitting data is disclosed that includes a file distribution system operating on a processor that is configured to identify one or more files for distribution to a device, forward error correction data for the one or more files, and a cryptographic key associated with the device. A Merkle tree system operating on the processor is configured to receive the forward error correction data and to generate an encrypted root hash. A data transmission system operating on the processor is configured to transmit the one or more files and the encrypted root hash to a predetermined device.

IMPLEMENTING RESILIENT DETERMINISTIC ENCRYPTION

A computer-implemented method according to one aspect includes creating an initialization vector, utilizing an instance of plaintext and a secret key; encrypting the instance of plaintext, utilizing the initialization vector, the secret key, and the instance of plaintext; combining the initialization vector and the encrypted instance of plaintext to create a ciphertext string; and outputting the ciphertext string.

Secure encryption of partial blocks

Encrypting data blocks by receiving blocks of compressed data, determining a size, in bytes, of the compressed data, appending a trailer to the compressed data, the trailer associated with the size in bytes of the compressed data, encrypting the compressed data and trailer, yielding encrypted data, where a header of the encrypted data comprises a number of complete encrypted data blocks, and providing the encrypted data to a user.