Patent classifications
H04L2209/76
LOW LATENCY CALCULATION TRANSCRYPTION METHOD
A method for confidentially processing data stored on a platform is described. A transcryption module, receiving a request for access to a data block, transmits the access request to an access request prediction module which returns a list of data blocks. The transcryption module determines whether a corresponding key stream block is present in the cache. The homomorphic calculation module calculates homomorphic ciphertexts of key stream blocks corresponding to the data blocks of the list. The transcryption module transcrypts the data blocks by adding them with the homomorphic ciphertexts of the corresponding key stream blocks. The transcryption module transmits the data blocks thus transcrypted to the request management module.
Domain transcendent file cryptology network
A domain transcendent file cryptology network includes a first data cryptology node in a first data domain having a first security protocol. A hardware processor of the first data cryptology node executes a first instantiation of a software code to receive a request to transfer a data file from the first data domain to a second data domain having a second, different, security protocol, obtain one or more characteristics of the data file, and generate an authentication tag for the data file based on the characteristic(s). The first instantiation of the software code also encrypts the data file and transmits the encrypted data file, the authentication tag, and a decryption key to a second data cryptology node in the second data domain. The decryption key and the authentication tag enable decryption of the encrypted data file by a second instantiation of the software code on the second data cryptology node.
Apparatus, Method and System for a Tunneling Client Access Point
The disclosure details the implementation of an apparatus, method, and system comprising a portable device configured to communicate with a terminal and a network server, and execute stored program code in response to user interaction with an interactive user interface. The portable device contains stored program code configured to render an interactive user interface on a terminal output component to enable the user the control processing activity on the portable device and access data and programs from the portable device and a network server.
Hypervisor protected key
A method, a computer system, and a computer program product may provide a cryptographic key object to a guest virtual server for use in cryptographic operations. The guest virtual server may register with a hypervisor. The hypervisor may generate a guest wrapping key associated with guest credentials from the registering. The hypervisor may also generate a satellite virtual server instance. The guest virtual server and the satellite virtual server instance share a master key that cannot be accessed by the hypervisor or by any guest virtual server. The trusted hypervisor may pass a copy of the guest wrapping key to the satellite virtual server instance. A random guest key may be generated and may be wrapped with a guest wrapping key thereby producing a wrapped guest key. The hypervisor may convert the wrapped guest key to be a protected key that serves as the cryptographic key object.
DISTRIBUTED COMPUTING ON THE EDGE
A computer-implemented method includes: receiving, by a computing device, a request from a requester; determining, by the computing device, one or more delegates that are currently capable of handling the request; sending, by the computing device, a request package to each of the one or more delegates, the request package including an authentication challenge; receiving, by the computing device, a solution to the authentication challenge from a supplier, the solution being provided by a particular delegate of the one or more delegates; determining, by the computing device, the solution to the authentication challenge is valid; and instructing, by the computing device and in response to determining the solution to the authentication challenge is valid, the particular delegate to proceed with handling the request.
SYSTEMS AND METHODS FOR MANAGING PUBLIC KEY INFRASTRUCTURE CERTIFICATES FOR COMPONENTS OF A NETWORK
A device may determine that a network function of a network has been instantiated to facilitate communication via the network. The device may request a certificate authority to provide a certificate for the network function. The device may receive, from the certificate authority, the certificate. The device may generate a certificate profile to enable other network functions of the network to authenticate communications with the network function, wherein the certificate profile identifies: the certificate and a certification protocol. The device may provide, to the network function, the certificate profile to cause the network function to use the certificate to communicate with the other network functions.
SYSTEMS AND METHODS FOR CONFIGURING A NETWORK FUNCTION PROXY FOR SECURE COMMUNICATION
A device may determine that a network function of a network is to use a secure communication protocol. The network function may be configured to facilitate communication via the network. The device may identify a component of a resource configuration that is to instantiate the network function. The device may instantiate, using the component, a proxy for the network function. The device may configure the proxy to obtain a certificate that is associated with the secure communication protocol. The device may cause the proxy to use the certificate to communicate with another proxy that is associated with the network function to perform an operation associated with the network function.
WIRELESS DISPLAY STREAMING OF PROTECTED CONTENT
A system and method of wireless display, including a transmitter processing a first encrypted content into a second encrypted content without decoding, and transferring the second encrypted content over a wireless display connection to a receiver.
Conversion key generation device, ciphertext conversion device, privacy-preserving information processing system, conversion key generation method, ciphertext conversion method, and computer
A key acquisition unit (411) acquires a decryption key sk.sub.i in a pair of a conversion source and a public key pk.sub.j in a pair of a conversion target, out of a plurality of pairs of a decryption key and a public key. A conversion key generation unit (412) encrypts the decryption key sk.sub.i acquired by the key acquisition unit (411) with the public key pk.sub.j, so as to generate a conversion key rk.sub.i.fwdarw.j for converting a ciphertext encrypted with a public key pk.sub.i in the pair of the conversion source into a converted ciphertext that can be decrypted with a decryption key sk.sub.j in the pair of the conversion target. An output unit (413) outputs the conversion key rk.sub.i.fwdarw.j generated by the conversion key generation unit (412).
Storing decrypted body of message and key used to encrypt and decrypt body of message
A non-transitory computer-readable storage medium comprising instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a computing system to at least receive a message, the message including a header, an encrypted symmetric key, and an encrypted body, decrypt the encrypted symmetric key using a private key to generate a decrypted symmetric key, decrypt the encrypted body using the decrypted symmetric key to generate a decrypted body, and store the header, the decrypted symmetric key, and the decrypted body in long-term storage.