Patent classifications
H04L2209/34
DYNAMIC WHITE BOX-BASED DATA PROCESSING METHOD, APPARATUS, AND DEVICE
Provided in the embodiments of the present application are a dynamic white box-based data processing method, apparatus, and device, the method comprising: using a pre-generated key obfuscation mapping relationship set to perform obfuscation processing on an original key to obtain a redundant key; and inputting the redundant key and to-be-processed data into a white box algorithm library to implement encryption and decryption processing; thus, in the technical solution provided in the embodiments of the present application, different redundant keys can be inputted into the white box algorithm library, so that there is no need to change the white box algorithm library and the key together, increasing the flexibility of the solution.
Secure Safety-Critical System Log
Embodiments are disclosed for secure safety-critical system log. In an embodiment, a method comprises: obtaining data to be added to a log; creating an entry for the data; and adding the entry to a sequence of chained entries in the log, wherein: the sequence of chained entries includes a number of data entries and a number of sentinels interleaved with the number of data entries, wherein each data entry in the chain of entries is appended to an error-detecting code computed for the entry and a previously computed error-detecting code of a preceding data entry or an error-detecting root, and each sentinel in the chain of entries includes an error-detecting code computed for the sentinel and a previously computed error-detecting code of a preceding data entry or the error-detecting root, and each sentinel includes a previously computed and encrypted blockchain value of a preceding sentinel or a blockchain root value.
MEMORY SYSTEMS AND DEVICES INCLUDING EXAMPLES OF ACCESSING MEMORY AND GENERATING ACCESS CODES USING AN AUTHENTICATED STREAM CIPHER
Examples of systems and method described herein provide for accessing memory devices and, concurrently, generating access codes using an authenticated stream cipher at a memory controller. For example, a memory controller may use a memory access request to, concurrently, perform translation logic and/or error correction on data associated with the memory access request; while also utilizing the memory address as an initialization vector for an authenticated stream cipher to generate an access code. The error correction may be performed subsequent to address translation for a write operation (or prior to address translation for a read operation) to improve processing speed of memory access requests at a memory controller; while the memory controller also generates the encrypted access code.
CLIENT-SIDE COMPRESSION
A method of sending blocks of data from a client to be stored at a storage server, wherein for each block compression and encryption is performed at the client, and deduplication is performed at the server. Security is thus enhanced as the block is compressed and encrypted when it is sent over an unsecured network and when it is stored in potentially a third-party backup system. Provisions are made to enable addition of new compression algorithms and for retirement of old compression algorithms, while ensuring that a client would not receive a block which was compressed using an unsupported, e.g., retired, compression algorithm. In some examples a compression algorithm ID is tied to an encryption key version to enable refresh of blocks compressed with old algorithm
Low cost and low latency logical unit erase
A memory device comprises a memory array including memory cells, a communication interface to a host device, and a memory control unit operatively coupled to the memory array and the communication interface. The memory control unit is configured to generate a scrambler seed and a logical block address (LBA) for a block of write data received via the communication interface, scramble the block of data using the scrambler seed, encrypt the scrambler seed and the LBA using an encryption key, initiate writing a scrambled block of data and encrypted LBA and scrambler seed to the memory array, and change the encryption key in response to an erase command received via the communication interface.
Partitioning Data Into Chunk Groupings For Use In A Dispersed Storage Network
A computing device for use in a storage network includes one or more network interfaces, memory with operational instructions and a processing module. The processing module is configured to execute the operational instructions receive a storage request for data and select a plurality of memory devices for storage of the data. The processing module partitions the data into a plurality of chunk sets and encode each chunk set of the plurality of chunk sets according to a dispersed storage error coded function to produce a plurality of chunks. Finally, the processing module facilitates storage of each chunk of the plurality of chunks in a memory device of the plurality of memory devices.
VISUAL SENSOR VALIDATION SYSTEM
Technology descried here can be used for collecting information about malicious attacks on computer devices. Hosting hardware can be configured to host virtual machines, virtual machines of ECU images, and ECUs to collect records of malicious attacks. An attack analyzer can generate fingerprints from the malicious attacks.
Intercepting not directly interceptable program object property
One or more instances in program code that references an identifier of the standard web object model program object property that is prevented by a web browser from being directly reassigned are identified. The one or more instances in the program code that references the identifier of the standard web object model program object property that is prevented by the web browser from being directly reassigned are modified with one or more corresponding replacement references that include a replacement identifier. The replacement identifier id defined in the program code as being associated with a new program object property defined to invoke the standard web object model program object property in addition to being defined to perform additional processing of a resource identifier associated with the invocation of the standard web object model program object property.
Extra-compact key with reusable common key for encryption
Techniques for secure public exposure of digital data include extracting first digital data comprising one or more batches, each batch comprising a plurality of no more than a number T of packets, each packet containing a plurality of a number n of bits. A random binary matrix CK consisting of T rows and n columns is generated. For a first batch, a first random n-bit temporary key is generated and positions of the nT elements of matrix CK are randomized to produce matrix CK(RP). For a packet in the first batch, a first packet vector key is generated based on non-overlapping pairs of bit positions for both the temporary key and for a first packet-corresponding row of matrix CK(RP). An encrypted packet is generated for the packet based on the packet and the first packet vector key. The encrypted packet is exposed publicly.
SYSTEM FOR SIMPLIFYING EXECUTABLE INSTRUCTIONS FOR OPTIMISED VERIFIABLE COMPUTATION
The invention relates to distributed ledger technologies such as consensus-based blockchains. Computer-implemented methods for reducing arithmetic circuits derived from smart contracts are described. The invention is implemented using a blockchain network, which may be, for example, a Bitcoin blockchain. A set of conditions encoded in a first programming language is obtained. The set of conditions is converted into a programmatic set of conditions encoded in a second programming language. The programmatic set of conditions is precompiled into precompiled program code. The precompiled program code is transformed into an arithmetic circuit. The arithmetic circuit is reduced to form a reduced arithmetic circuit, and the reduced arithmetic circuit is stored.