H04L2209/34

Digest listing decomposition

To identify slice errors, a processing module of a computing device in a dispersed storage network (DSN) sends first list digest requests to at least first and second dispersed storage (DS) units. The requests indicates a first range of slice names to include in a first list digest. The processing module receives digest responses from the DS units, and compares the digest responses to determine whether they identify the same slices. If they do not identify the same slices, the processing module sends second list digest requests indicating a sub-range of the first range of slice names to include in second list digests. The sub-range continues to be narrowed until the processing module identifies at least one sub-range of slice names where a slice error exists.

Cryptographic system memory management

In one example, a system for managing encrypted memory comprises a processor to store a first MAC based on data stored in system memory in response to a write operation to the system memory. The processor can also detect a read operation corresponding to the data stored in the system memory, calculate a second MAC based on the data retrieved from the system memory, determine that the second MAC does not match the first MAC, and recalculate the second MAC with a correction operation, wherein the correction operation comprises an XOR operation based on the data retrieved from the system memory and a replacement value for a device of the system memory. Furthermore, the processor can decrypt the data stored in the system memory in response to detecting the recalculated second MAC matches the first MAC and transmit the decrypted data to cache thereby correcting memory errors.

Computer-implemented method for error-correction-encoding and encrypting of a file

A computer-implemented method for error-correction-encoding and encrypting of a file is provided. The file is split into at least two blocks. The first block is encrypted using a given encryption key. The encrypted first block is encoded twice using a first and second forward error correction code of the first block. Each subsequent block is encrypted by performing an algebraic operation. The encrypted block is encoded twice using a first and second forward error correction code for this block, wherein a cryptographic indexing function provides a set of indices used by the second forward error correction code to produce the second encoded chunk. The first encoded chunks of each encrypted block are outputted. The computer-implemented method enables secure transmission of a file content between low power devices.

SYSTEM FOR RECORDING VERIFICATION KEYS ON A BLOCKCHAIN

Systems and methods described herein relate to the execution of locking transactions in a blockchain system. In the context of smart contracts, it may be advantageous to have a public record (e.g., recorded on a blockchain) of a proof of correct execution of a circuit published by a worker and the verification key, thereby allowing anyone (e.g., nodes of the blockchain) to verify validity of the computation and proof. However, there are challenges to recording large blocks of data (e.g., large keys that may comprise multiple elliptic curve points) on the blockchain. For example, in a Bitcoin-based blockchain network, a protocol that utilizes standard transactions may be constrained to locking scripts and unlocking scripts that are collectively no t larger than a first predetermined size limit, and the size of a redeem script (if utilized) may be limited to being no more than a second predetermined size limit

Authentication of Medical Device Computing Systems by Using Metadata Signature

Computer code embedded in an electronic component (e.g., a processor, a sensor, etc.) of a medical device, such as a dialysis machine, can be authenticated by comparing a metadata signature derived from the computer code of the electronic component to a key derived from a pre-authenticated code associated with the electronic component. The metadata signature can be derived by running an error-check/error-correct algorithm (e.g., SHA256) on the computer code of the electronic component. A use of the metadata signature enables detection of any unauthorized changes to the computer code as compared to the pre-authenticated code.

SYSTEM FOR ENCODING GENOMICS DATA FOR SECURE STORAGE AND PROCESSING

A system is provided for encoding genomics data for secure storage and processing. In particular, the system may comprise a client and server operating environment that uses a unique encoding algorithm to transform genomics data and/or metadata to produce encoded genomics data and/or metadata. In some embodiments, the encoded genomics data and/or metadata may be encrypted using one or more encryption algorithms. The encoded and/or encrypted genomics data may be stored on a secure server (e.g., a cloud environment) that may perform subsequent processing steps on the encoded and/or encrypted genomics data. Once the processing steps have been completed, the server may transmit one or more outputs associated with the genomics data and/or metadata to a client device. In this way, the system provides an efficient and secure way to store and process genomics data.

Duplicating authentication information between connections
11360851 · 2022-06-14 · ·

A method includes authenticating, by a computing device, a first connection between one or more storage units and at least one of the computing device and a first user computing device. The method further includes determining, by the computing device, to add a second connection between the one or more storage units and at least one of the computing device and a second user computing device. The method further includes generating, by the computing device, a secret code and sending the secret code to the one or more storage units via the first connection. The method further includes sending, by the one or more storage units, responses to the secret code to the computing device via the second connection. The method further includes authenticating, by the computing device, the second connection based on the authentication of the first connection and the responses from the one or more storage units.

Stream ciphering

A technique for ciphering source data (306) into target data (308) is described. As to a method aspect of the technique, a level (302) of ciphering is determined for the source data (306). A key sequence (304) is generated depending on the determined level (302) of ciphering. The source data (306) and the key sequence (304) are combined resulting in the target data (308).

OBFUSCATION FOR PROTECTION OF STREAMING MEDIA AND OTHER DATA FLOWS
20220171618 · 2022-06-02 · ·

A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.

VERIFIABLE ACCESS CREDENTIAL

The invention allows using a commodity hardware (e.g. a smartphone, a tablet, a computer . . . ) to automatically establish a high level of assurance authentication and identification of any government-issued identity document of a user (e.g. identity card, driving license, passport . . . ) and link that to digital identity counterpart. Moreover, the invention allows personalizing a material-based security feature provided of said government-issued identity document to create a link between the identity document and its data content that can be read by such a commodity hardware and serves as reliable credential for accessing a service once the material-based security feature has been authenticated via the commodity hardware and a signature of the identity data of the user has been authenticated by a server of an authority.