H04L2209/34

Utilization Of Coordinate Systems For Compression And Encryption
20230115216 · 2023-04-13 ·

A numeric string of information is encoded into a graphic using first and second lines or other designations of length. The information can be decoded by measuring the first and second lengths, and then recreating the numeric string by applying a mathematical formula to the measured lengths. Lines can be touching or not touching, can have any angular relationship between them, and can be curved. Alphabetic and other non-numeric information can be translated into numbers, and then included in the numeric string being encoded. Numeric strings can be extremely long, and for example can be used as multi-million digit passcodes. A given graphic can contain more than two lines or other designations of lengths, which can be separately decoded, or can be used to assist in decoding of each other. All suitable mathematical formulae can be used, including for example, simple multiplication and division, addition, subtraction, roots, exponents, and logarithms. Different recipients having access to different mathematical formulae can derive different pieces of information from a single graphic.

MASKED DECODING OF POLYNOMIALS

Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset δ from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient a.sub.i of the polynomial a to produce Boolean shares â.sub.i that encode the same secret value a.sub.i; and performing in parallel for all coefficients a shared binary search to determine which of coefficients a.sub.i are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.

Cloud-based whitebox node locking

A secure cloud-based node-locking service with built-in attack detection to eliminate fuzzing, cloning and other attacks is disclosed. White-box base files are securely stored on the cloud service and are not vulnerable to accidental leakage. A secure cloud-based dynamic secret encoding service reduces the risk of exposure of unprotected secrets and other sensitive data.

Systems and methods for authenticating digital media content

The disclosed computer-implemented method for authenticating digital media content may include (i) receiving digital media content that has been captured by a capturing device and digitally signed through a cryptoprocessor embedded within the capturing device to provide an assurance of authenticity regarding how the capturing device captured the digital media content, and (ii) encoding an identifier of the received digital media content and a digital signature to an encrypted distributed ledger, the digital signature including at least one of a digital signature of the digital media content by the capturing device or a digital signature of the digital media content by an entity encoding the received digital media content such that the encoding becomes available for subsequent verification through the encrypted distributed ledger. Various other methods, systems, and computer-readable media are also disclosed.

DEVICE FOR SUPPORTING HOMOMORPHIC ENCRYPTION OPERATION AND OPERATING METHOD THEREOF

A device for supporting a homomorphic encryption operation includes a ciphertext conversion circuit configured to convert first ciphertexts corresponding to a first operation size to second ciphertexts corresponding to a second operation size, different from the first operation size, to convert the operated ciphertext having the second operation size to a third ciphertexts corresponding to the first operation size, and to perform a homomorphic encryption operation on the second ciphertexts.

Systems and methods for privacy-reserving data hiding

Described in detail herein is a method for encrypting or encoding time-stamped location data associated with a computing device. The method converts time and location information associated with the computing device into a vector format. The method generates a code vector based on the converted time and location vector. The method sorts entries in the code vector based at least in part on a predetermined ordering scheme. The method executes a random modification to each of the sorted entries. The method compares the code vector to at least one other code vector associated with another computing device. The method identifies other code vectors within a specified distance of the given code vector. The method concludes that the computing device and the at least one other computing device were in proximity to each other during a time period corresponding to the time information.

Method and system for blockchain-based information management among network devices

A method, a device, and a non-transitory storage medium are described in which an blockchain-based network information management service is provided. The service provides blockchain mechanisms that allows for the management and disbursement of network information among network devices of a RAN, a core network, and an application layer network. The service may define a structure for the network information that may be used by RAN devices, core devices, and application layer devices of different vendors and third parties.

PERMUTATION-BASED CONTENT ENCRYPTION WITH MANIFESTS IN A CONTENT CENTRIC NETWORK
20170366515 · 2017-12-21 · ·

One embodiment provides a system that facilitates encryption of manifest content based on permutation. During operation, the system partitions, by a computer system, a collection of data into a first set of content objects, wherein a content object is a chunk comprised of a plurality of bytes. The system performs a first permutation function on the first set of content objects to obtain a first set of permuted content objects. The system creates a manifest based on the permuted content objects, wherein a manifest is a content object which indicates a second set of content objects, wherein a respective content object of the second set is a data object or another manifest. The system encodes the first permutation function and the permuted content objects in the manifest, thereby facilitating an authorized entity that receives the manifest to reassemble the manifest contents based on the permutation function.

TIMELY RANDOMIZED MEMORY PROTECTION

In a system executing a program, a method comprises detecting one or more input/output calls associated with the program and re-randomizing memory associated with the program in response to the one or more input/output calls. A related system is also described.

MOBILITY DEVICE

A powered balancing mobility device that can provide the user the ability to safely navigate expected environments of daily living including the ability to maneuver in confined spaces and to climb curbs, stairs, and other obstacles, and to travel safely and comfortably in vehicles. The mobility device can provide elevated, balanced travel.