Patent classifications
H04L2209/76
Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of an apparatus, method, and system comprising a portable device configured to communicate with a terminal and a network server, and execute stored program code in response to user interaction with an interactive user interface. The portable device contains stored program code configured to render an interactive user interface on a terminal output component to enable the user the control processing activity on the portable device and access data and programs from the portable device and a network server.
Re-encryption key generator, re-encryption device, encryption device, decryption device, and program
A re-encryption key generator according to an embodiment generates a re-encryption key to obtain re-encrypted data that can be decrypted by a second private key of a second user device by re-encrypting ciphertext obtained by encrypting plaintext by a first public key of a first user device without decryption. The re-encryption key generator stores a first private key corresponding to the first public key. The re-encryption key generator stores a second re-encryption key generation key of the second user device that is different from a second public key corresponding to the second private key. The re-encryption key generator generates the re-encryption key based on the first private key and the second re-encryption key generation key.
METHOD OF PERFORMING KEYED-HASH MESSAGE AUTHENTICATION CODE (HMAC) USING MULTI-PARTY COMPUTATION WITHOUT BOOLEAN GATES
The subject matter discloses a method operated on at least two servers for a third-party client, the method comprising receiving by a first server a first result of the first irreversible function applied to a secret key from a first third-party client, receiving by a second server a second result of the second irreversible function applied to the secret key from the third-party client, receiving by the first server, a message from a second third-party client, the first server computing a first hash function on said first result and on said message, and sending a result of the first hash function from the first server to the second server, the second server computing a second hash function on said second result and on the result of the first hash function sent from first server and outputting the result generated by second server as HMAC result.
Cooperation service providing system and server apparatus
Upon receiving ciphertext data transmitted by each service apparatus, a cooperation apparatus according to an embodiment generates re encrypted data by performing re encryption processing for the ciphertext data using are encryption key. Each of the service apparatuses transmits, to the cooperation apparatus, a request to acquire user information of a user specified by an identification (ID) indicated by the ciphertext data and stored in the other service apparatus, together with the ciphertext data. Upon receiving the re encrypted data transmitted by the cooperation apparatus, the service apparatus acquires an ID by decrypting the re encrypted data using a private key, reads out user information, and transmits the user information to the other service apparatus.
CONTENT BLOCKER DETECTION AND CIRCUMVENTION
Methods and systems for circumventing content blocking systems are disclosed. Example implementations include detecting the presence of an existing blocker that disrupts a first content-type and circumventing the blocker, such that a circumvented first content-type is presented to a user. The method can also include determining that the blocker has adjusted to block the circumvented content, in which case, the method can include disrupting presentation of a second content-type.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR NETWORK BOUND PROXY RE-ENCRYPTION AND PIN TRANSLATION
A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (ga), the second value (ga) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (mi) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (mi); generate, with the payment network, a public key (pki) based on the second value (ga), the merchant product (M), and the random merchant number (mi) and a random key (rki) based on the merchant product (M) and the random merchant number (mi) for each respective merchant bank; and communicate, with the payment network, the public key (pki) and the random key (rki) to at least one respective merchant bank.
METHOD FOR CONFIDENTIALLY PROCESSING DATA OF A VEHICLE
The present invention concerns a method for confidentially processing the kinematic data of a vehicle (210), in particular a method for classifying this data in order to determine the driving style of the vehicle while respecting the confidentiality of the data in question. The data is encrypted (254) by the vehicle by means of a symmetric encryption algorithm using a secret key generated (251) by the vehicle. This secret key is encrypted (252) by the vehicle by means of a homomorphic asymmetric encryption algorithm by using the public key of a vehicle service provider (240). The data encrypted by means of the secret key, and the homomorphically encrypted secret key, are transmitted (253, 255) by the vehicle to an access point that transcrypts (261) them and transmits (262) the homomorphically encrypted data to a calculation platform (230). The platform performs (271) the confidential processing operation in the homomorphic domain and transmits (272) the homomorphically encrypted results to the server of the vehicle service provider (240).
Method and apparatus for trusted branded email
A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages is branded by embedding branding assets and validation signatures. Algorithms that generate validation signatures are dynamically selected to further strengthen the security aspects. Branding assets are presented to a user using a distinct indicia that represents to the user that the branding assets are secure.
OUTSOURCED DATA PROCESSING
An apparatus comprising at least one processing core (310), at least one memory (320) including computer program code, the at least one memory (320) and the computer program code being configured to, with the at least one processing core (310), cause the apparatus at least to generate a set of three permutation matrices {P, Q and R}(510), apply the set of permutation matrices on a data matrix V and matrices W.sup.1 and H.sup.1, wherein matrices W.sup.1 and H.sup.1 comprise only non-negative elements, such that: elements aa, bb and cc, and provide matrices dd, ee and ff to a server for processing (530).
COMMUNICATION CONTROL DEVICE AND COMMUNICATION SYSTEM
According to an embodiment, a communication control device includes a communication interface, a controller, and a memory. The controller configured to transmit, to a second communication control device connected between a second device and a network communication network, information obtained by encrypting information transmitted from the first device to the second device, and transmit, to the first device, information obtained by decrypting information transmitted from the second device to the first device, using a common key determined by a mutual authentication process with the second communication control device using a secret key and a client certificate. The controller transmits log information to a device management server at an execution time set based on the analysis information of the communication amount.