Patent classifications
H04L2209/76
Encrypting data records and processing encrypted records without exposing plaintext
A computer implemented method of applying a unified search for a match of one or more features in a plurality of encrypted records, comprising using one or more processors of a server associated with a database comprising a plurality of encrypted records. The processor(s) is adapted for receiving a query for searching one or more plaintext features in the plurality of encrypted, searching for a match of the one or more plaintext features using a first search methodology and a second search methodology and outputting an indication of matching encrypted records according to the match. Wherein the second search methodology is asymptotically faster than the first search methodology and wherein the first search methodology is used for searching a subset of the plurality of encrypted records selected based on status indication associated with each encrypted record.
FACILITATING USE OF A UNIVERSAL INTEGRATED CIRCUIT CARD (UICC) FOR SECURE DEVICE UPDATES
Communications are facilitated via a mobile internet-enabled connection interface are provided. One apparatus is configured to perform various operations, including performing a first type of security function associated with determining whether an information package is authorized to be received and downloaded to a device other than the apparatus, wherein the information package is associated with updating a functionality of the device; and performing a second type of security function associated with identifying an authorized user of the apparatus.
ORTHOGONAL ACCESS CONTROL FOR GROUPS VIA MULTI-HOP TRANSFORM ENCRYPTION
Disclosed is an orthogonal access control system based on cryptographic operations provided by multi-hop proxy re-encryption (PRE) that strictly enforces only authorized access to data by groups of users, scalable to large numbers of users. Scalable delegation of decryption authority can be shared with a plurality of members of a group whether those members be users or devices, and members of a group can further create sub groups and delegate decryption authority to those members, whether users or devices. Members are granted access via generation of transform keys, and membership or access can be revoked merely be deleting the transform key—no elimination of the encrypted data, regardless of its storage location, is needed.
Cloud storage using encryption gateway with certificate authority identification
Systems and methods to securely send or write data to a cloud storage or server. In one embodiment, a method includes: establishing a connection to a client using a client-side transport protocol; receiving, over the connection, data from the first client; decrypting, using a client session key, the received data to provide first decrypted data; encrypting the first decrypted data using a stored payload key (that is associated with the client) to provide first encrypted data; encrypting, using a cloud session key, the first encrypted data using a remote-side transport protocol to provide second encrypted data; and sending the second encrypted data to the cloud storage or server.
Method and apparatus for performing operation using encrypted data
A method for performing an operation according to one embodiment includes performing a homomorphic operation using one or more ciphertexts that are homomorphically encrypted based on an encryption key, determining a count value for a ciphertext generated through the homomorphic operation based on count values for each of the one or more ciphertexts, requesting a key management apparatus, which holds the encryption key and a decryption key corresponding to the encryption key, to re-encrypt the generated ciphertext based on the determined count value, acquiring, from the key management apparatus, a ciphertext generated by re-encrypting the generated ciphertext through decryption based on the decryption key and encryption based on the encryption key; and determining a count value for the acquired ciphertext to be a preset initial value.
System and method for user authentication at a kiosk from a mobile device
A system and method for user authentication at a kiosk from a mobile device is disclosed. A particular embodiment is implemented for: configuring a kiosk to detect the presence of a mobile device in the proximity of the kiosk; configuring the mobile device to detect the presence of kiosk in the proximity of the mobile device; prompting a user of the mobile device to perform a login operation on the mobile device upon detection of the kiosk in the proximity of the mobile device; verifying the authentication of the user with the mobile device as a result of the login operation on the mobile device; and transferring unique kiosk session keys from the mobile device to the kiosk in proximity of the mobile device upon authentication of the user with the mobile device.
Wireless display streaming of protected content
A system and method of wireless display, including a transmitter processing a first encrypted content into a second encrypted content without decoding, and transferring the second encrypted content over a wireless display connection to a receiver.
Proxy service system for use with third-party network services
A proxy computer system provides a proxy service for a client to utilize a third-party network service by parsing content retrieved from a third-party network service to identify a link specifying a hostname with multiple subdomains of the third-party network service and substituting the hostname of the link with a mapped hostname that is mapped internally within the proxy service to the hostname of the link and is compatible with a wildcard proxy service certificate to enable the client to securely access a resource associated with the link without a compatible certificate for the hostname with multiple subdomains of the third-party network service.
AUTHENTICATION SYSTEM WITH REDUCED ATTACK SURFACE
Some embodiments are directed to an authentication system (100; 101; 102) for computing an authentication token for a service provider to authenticate a user system to the service provider, the authentication system comprising a processor configured to jointly blind with a user system an encrypted user identity and to compute an encrypted identity for the service provider from the blinded encrypted user identity.
CACHING ENCRYPTED CONTENT IN AN OBLIVIOUS CONTENT DISTRIBUTION NETWORK, AND SYSTEM, COMPTER-READABLE MEDIUM, AND TERMINAL FOR THE SAME
The disclosure describes methods and arrangements for caching encrypted content. Embodiments of the described inventions make use of a middle box to serve encrypted content rather than requiring a server to answer each request for content with a separate and distinct response, thereby allowing a network to operate effectively and efficiently even when serving encrypted content that looks different each time it is requested.