H04L2209/60

Method for data privacy in a fixed content distributed data storage
09794232 · 2017-10-17 · ·

A storage cluster of symmetric nodes includes a data privacy scheme that implements key management through secret sharing. The protection scheme preferably is implemented at install time. At install, an encryption key is generated, split, and the constituent pieces written to respective archive nodes. The key is not written to a drive to ensure that it cannot be stolen. Due to the secret sharing, any t of the n nodes must be present before the cluster can mount the drives. To un-share the secret, a process runs before the cluster comes up. It contacts as many nodes as possible to attempt to reach a sufficient t value. Once it does, the process un-shares the secret and mounts the drives locally. Given bidirectional communication, this mount occurs more or less at the same time on all t nodes. Once the drives are mounted, the cluster can continue to boot as normal.

Systems and methods for authenticating and providing anti-counterfeiting features for important documents
09794069 · 2017-10-17 · ·

A method for authenticating a document comprises obtaining the contents of a document, obtaining biometric characteristics from an individual, forming a message based on the contents of the document and the biometric characteristics of the individual, generating a digital signature based on the message and a key, and writing the digital signature to an Radio Frequency Identification (RFID) tag affixed to the document.

Digital data content certification system, data certification device, user terminal, computer program and method therefor
09794071 · 2017-10-17 · ·

A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed simultaneously. A data authentication device (1) is provided with: an original data receiving means which is communicably connected to a user terminal (2) and a timestamp provision device (3), and receives original data to be authenticated from the user terminal (2); an intermediate file creation means which creates an authentication file corresponding to the original data, and attaches the actual original data to the authentication file to create an intermediate file; a timestamp request means which transmits the intermediate file to the timestamp provision device (3); a date/time security information acquisition means which receives from the timestamp provision device (3) date/time security information containing date/time information and a hash value for the intermediate file; an authenticated file creation means which embeds the received date/time security information in the intermediate file and creates an authenticated file; and an authenticated file transmission means which transmits the authenticated file to the user terminal (2).

Secure layered encryption of data streams
11671247 · 2023-06-06 ·

Technology permitting secure storage and transmission of data stream as well as tiered access to multiple data stream according to permission. Data streams may be encrypted using symmetric encryption performed with varying symmetric keys according to a key stream of symmetric keys. Native data may be discarded for safety. Whole or partial key streams may be encrypted using the public keys of authorized entities having permission to access respective data streams or portions thereof. Only the corresponding private keys can decrypt the encrypted key streams required to decrypt the encrypted data streams. Thus rigorous access control is provided. IT personnel accessing data stream files on a server or intruders maliciously obtaining files will not be able to derive the data stream. Sensitive data streams may be stored using cloud services despite inherent risks.

Data provisioning device for provisioning a data processing entity
11671246 · 2023-06-06 · ·

A data provisioning device is arranged for provisioning a data processing entity from a set of data processing entities sharing the same joint decryption key. The data provisioning device comprises: a network interface configured to receive the provisioning data for provisioning the data processing entity, a joint encryption key associated with the joint decryption key, and control information indicating a processing scheme to be deployed by the data provisioning device when provisioning the data processing entity; a processor configured to process the provisioning data according to the control information to obtain processed provisioning data, to cryptographically encrypt the processed provisioning data using the received joint encryption key to obtain encrypted processed provisioning data; and a device interface configured to transmit the encrypted processed provisioning data to the data processing entity.

EDGE CACHING OF HTTPS CONTENT VIA CERTIFICATE DELEGATION

Mechanisms may be used for edge caching Hypertext Transfer Protocol Secure (HTTPS) content via an owner-endorsed proxy. The edge servers of a mobile-content distribution network (CDN) may work as the proxy that dynamically gets the means to serve HTTPS content through rights delegated by content owners. Mechanisms may include dynamically assigning a domain with a Canonical name (CNAME) record in DNS based on the popularity of the domain at an edge server. Each edge server from the plurality of edge servers may be associated with a mobile content distribution (mobile-CDN) network, via the mobile-CDN, the right to establish a transport layer security (TLS) session is delegated to the edge server on behalf of the content owner, so that the HTTPS request to the content server may be served by the edge server. A mechanism to restrict the scope of HTTPS content served through the delegated right is presented as well.

ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, AND DECRYPTION METHOD

There is provided an encryption device including a data encryption unit configured to conduct encryption on the basis of a white box model in which at least a part of a plurality of round functions for sequentially conducting encryption processing on an input value is tabulated, and input and output values of the round function are recognizable from an outside. The plurality of round functions each have an encryption function that is tabulated and encrypts an input value in a black box model in which input and output values are recognizable from the outside and an intermediate value is not recognizable from the outside.

DATA SECURITY FOR CONTENT DELIVERY NETWORKS
20170295144 · 2017-10-12 ·

Various embodiments implement a secure content distribution architecture involving a content delivery network (CDN). A web server system can encrypt a content file and store the encrypted content file in an origin data center. The web server system can store a decryption key for decrypting the content file. The CDN can fetch the encrypted content file after the content file is first requested by the CDN from the origin cache system. When a client device requests access to a website supported by the web server system, the web server system can provide a blueprint of a page of the website, a link to the content file in the CDN, and the decryption key for decrypting the content file. The client device can then request the encrypted content file from the CDN and utilize the decryption key to decrypt the encrypted content file.

Retention management in a facility with multiple trust zones and encryption based secure deletion

A computing facility, including a storage management system belonging to a first trust zone having a first privilege level, a metadata management system belonging to a second trust zone having a second privilege level higher than the first privilege level, and a security management system belonging to a third trust zone having a third privilege level higher than or equal to the second privilege level. The storage management system is and configured to store multiple content entities, and the metadata management system is configured to manage, for each of the multiple content entities, metadata including a respective content encryption key and a respective retention time, each of the content entities being encrypted by its respective content encryption key. The security management system is configured to manage a master encryption key used to create the respective content encryption keys, and to confirm expiration of the respective retention times.

Challenge-response method and associated client device
09787479 · 2017-10-10 · ·

There is described a challenge-response method for a client device. The method comprises steps of: (a) receiving challenge data, wherein the challenge data is content encrypted using an encryption key, the content including a nonce; (b) using a secured module of the client device to access the content by decrypting the challenge data using a decryption key of the secured module, the decryption key corresponding to the encryption key; (c) processing a version of the content output by the secured module so as to obtain the nonce; and (d) providing the nonce as a response. There is also described a client device for implementing the above challenge-response method. There is also described a computer program which, when executed by a processor, causes the processor to carry out the above challenge-response method. Finally, there is described a computer readable medium storing the above-mentioned computer program.