Patent classifications
H04L2209/34
METHOD AND SYSTEM FOR RATELESS AND POLLUTION-ATTACK-RESILIENT NETWORK CODING INCLUDING DECODER(S)
A decoder deployed in one or more terminals, includes a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to receiving a noisy message and a noisy hash from the network, searching for a pair of matching candidates for the hash and message from two row spaces of noisy message vectors using a shared secret with an encoder, and outputting, by the decoder, a decoded message if the searching is successful.
Adaptive system profile
An approach to generating and regenerating a profile value from features of a system (e.g., a computer system), allows for certain changes of features of the system over time. The system may correspond to a client computer or a particular component of the client computer or a user of a client computer, and may also correspond to a combination of the user (i.e., a biometric characterization of the user) and the client computer or a component of the computer. The profile value may be used, for example, for purposes including identification, authentication, key generation, and other cryptographic functions involving the system.
Encoder and method for encoding thereof
A method of encoding and an encoder are provided. The method includes generating first one-hot bits for most significant bits (MSBs) and second one-hot bits for least significant bits (LSBs) using input one-hot bits; encoding the first one-hot bits to the MSBs and complementary MSBs through a first logical operation using a cross-connection; and encoding the second one-hot bits to the LSBs and complementary LSBs through a second logical operation using a cross-connection. The encoder includes a first bit generator, a first encoder, a second bit generator and a second encoder.
Security checks for proxied requests
A method begins by a storage unit of a dispersed storage network (DSN) executing transitioning storage of one or more groups of encoded data slices. The method continues while transitioning storage of the one or more groups of encoded data slices with the storage unit receiving a proxied data access request regarding an encoded data slice from another storage unit of the DSN. The method continues by the storage unit determining whether the other storage unit is an authentic storage unit of the DSN based on at least one of the encoded data slice, a previous version of the distributed agreement protocol, and a new version of the distributed agreement protocol. The method continues by when the other storage unit is the authentic storage unit, processing the proxied data access request to produce a data access response and sending the data access response to the other storage unit.
OPCODELESS COMPUTING AND MULTI-PATH ENCRYPTION SYSTEMS, METHODS, AND DEVICES
A system including: a storage; and a processor configured to: receive a data packet; and process the data packet without an instruction input to perform a definite task. The data packet may be encrypted. The processor may be configured to process the data packet based on a decryption mechanism required to decrypt the data packet.
SYSTEM AND METHODS FOR KEYED COMMUNICATIONS CHANNEL ENCRYPTION AND DECRYPTION
The present disclosure is directed to secure computations and transmission of encrypted data over a network. Two unequal unsigned integer numbers are used as keys, which are kept secret by users. Each key is supplied as the seed to a uniform pseudorandom number generator, and follows an algorithm to encrypt and decrypt a communications channel between two endpoints on the network. The communications channel is a stream of bits representing any data that may be represented or stored by a computer capable of processing binary data. In one illustrative embodiment, a network has multiple endpoints, such as different terminals disposed at different locations (for example, terminals at various branches of a financial institution that are connected to a common network). Using keys that are specific to transactions between specified terminals allows for greater security of the encrypted transmissions.
Quantum key distribution
Methods and apparatus for distribution of keys are disclosed. An optical signal for carrying encoded information in accordance with a quantum key distribution scheme is generated. The generated optical signal has a wavelength which is changed to another wavelength prior to transmission of the optical signal. The optical signal carrying the encoded information and having the changed wavelength is received, where after decoding of the information takes place by means of detector apparatus operating in the changed wavelength.
Method for compressing a quantum state vector and process for storing a quantum state vector
A method for compressing a quantum state vector includes: aggregating a group of several neighboring states of the vector into a cluster of states of the vector, a parameter representative of the probability of this cluster being associated with it and corresponding to the sum of the probabilities of the aggregated neighboring states in this cluster, the probability of each aggregated neighboring state being below a given aggregation threshold, and/or the sum of the probabilities of the aggregated neighboring states in a cluster being below another given aggregation threshold; and preserving a state of the vector not aggregated in a cluster, the parameter representative of its probability remaining unchanged. The method includes several steps of aggregating several distinct groups of several neighboring states of the vector, respectively into several clusters of states of the vector, and/or an aggregation step and a preservation step.
SYSTEM AND METHODS FOR PERMITTING OPEN ACCESS TO DATA OBJECTS AND FOR SECURING DATA WITHIN THE DATA OBJECTS
A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.
Processing a certificate signing request in a dispersed storage network
A method begins by a requesting device transmitting a certificate signing request to a managing unit, wherein the certificate signing request includes fixed certificate information and suggested certificate information. The method continues with the managing unit forwarding the certificate signing request to a certificate authority and receiving a signed certificate from the certificate authority, wherein the signed certificate includes a certificate and a certification signature and wherein the certificate includes the fixed certificate information and determined certificate information based on the suggested certificate information. The method continues with the managing unit interpreting the fixed certificate information of the signed certificate to identify the requesting device and forwarding the signed certificate to the identified requesting device.