H04L2209/34

Client, computing platform, and methods for conducting secure transactions
11317279 · 2022-04-26 · ·

The present invention is generally related to client and computing platforms that may be used for conducting secure transactions.

Client-side compression

A method of sending blocks of data from a client to be stored at a storage server, wherein for each block compression and encryption is performed at the client, and deduplication is performed at the server. Security is thus enhanced as the block is compressed and encrypted when it is sent over an unsecured network and when it is stored in potentially a third-party backup system. Provisions are made to enable addition of new compression algorithms and for retirement of old compression algorithms, while ensuring that a client would not receive a block which was compressed using an unsupported, e.g., retired, compression algorithm. In some examples a compression algorithm ID is tied to an encryption key version to enable refresh of blocks compressed with old algorithm.

Delayed encoding of resource identifiers

A resource identifier to be encoded dynamically upon detection of a triggering event is identified. The resource identifier is allowed to remain not encoded prior to detection of the triggering event. The triggering event that will cause the resource identifier to be consumed by a web browser is detected. In response to detecting the triggering event, the resource identifier is encoded, and an encoded version of the resource identifier is provided for consumption by the web browser.

Secure boot of a processing chip
11768611 · 2023-09-26 · ·

Techniques in electronic systems, such as in systems including a processing chip and one or more external memory chips, provide improvements in one or more of system security (such as intrusion and/or virus/malware prevention), performance, cost, and efficiency. For example, the processing chip includes at least one CPU and circuitry enabling the at least one CPU to securely boot from an external, non-volatile memory chip containing encrypted, executable code. The circuitry comprises immutable hardware to copy the executable code from the non-volatile memory to another external memory from which the at least one CPU is able to access it. The encryption uses a key created at a manufacturing time of and unique to the processing chip that is never CPU-accessible, forming a secure hardware association between the processing chip and the non-volatile memory chip.

System for facilitating secure communication in system-on-chips

A system to facilitate communication of a critical signal between functional circuitries of a system-on-chip utilizes a dynamic pattern to securely communicate the critical signal. The system includes selection and comparison circuits. The selection circuit is configured to select and output a set of dynamic pattern bits or a set of fixed reference bits, based on a logic state of the critical signal that is received from one functional circuitry. The comparison circuit is configured to output an output signal based on the set of dynamic pattern bits, and a set of intermediate bits that is derived from the set of dynamic pattern bits or the set of fixed reference bits. The output signal is provided to the other functional circuitry when a logic state of the output signal matches the logic state of the critical signal, thereby securely communicating the critical signal to the other functional circuitry.

OPERATING DEVICE AND METHOD USING MULTIVARIATE PACKING
20220029783 · 2022-01-27 · ·

An encoding method is disclosed. The present encoding method comprises the steps of: receiving a plurality of messages; encoding the plurality of messages into a polynomial expression having been multivariately defined, and encoding the multivariately defined polynomial expression so as to generate a homomorphic cyphertext.

Method for broadcast service signaling

Systems, methods, and devices enable a receiver device to determine completeness of low level signaling (LLS) tables received via broadcast transmissions. In various embodiments, broadcast service signaling may include generating a directory table identifying one or more LLS tables to be broadcast and sending the directory table in a broadcast stream of the one or more LLS tables. In various embodiments, broadcast service signaling may include calculating a cyclic redundancy check (CRC) code for, generating a hash value for, and/or applying a digital signature to one or more LLS tables in a broadcast stream.

Execution unit for calculations with masked data

According to one embodiment, an execution unit is described, which includes a mask generation circuit configured to generate a mask by multiplying a mask generation vector by blocks of codewords of a plurality of cyclic codes, a masking circuit configured to mask data to be processed by means of the mask, and an arithmetic logic unit configured to process the masked data by means of additions and rotations.

System for use in quantum encryption, decryption and encoding
11190348 · 2021-11-30 · ·

A system for use in quantum encryption, decryption, and encoding, comprises a photon production sub-system, a transmission channel sub-system, and a data encoding sub-system. The transmission channel sub-system makes use of the combination of quantum state vectors derived from the photon production sub-system for optical communication with quantum key. The data encoding sub-system includes a plurality of dynamic data encoding modules, and at least one of these modules performs to express the quantum key with bases in an individual Hilbert Space, and divides the transmitting data into segments for data encoding with the individual space bases. In addition to the use in data encoding, the sub-system can also improve the signal-decays and the eavesdropping issue within the quantum channel via implementation of the Laplace Transformation unit and the Quantum Fourier Transformation unit.

RECYCLING METHODS AND SYSTEMS, AND RELATED PLASTIC CONTAINERS

A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.