Patent classifications
H04L2209/76
Orthogonal access control for groups via multi-hop transform encryption
Disclosed is an orthogonal access control system based on cryptographic operations provided by multi-hop proxy re-encryption (PRE) that strictly enforces only authorized access to data by groups of users, scalable to large numbers of users. Scalable delegation of decryption authority can be shared with a plurality of members of a group whether those members be users or devices, and members of a group can further create sub groups and delegate decryption authority to those members, whether users or devices. Members are granted access via generation of transform keys, and membership or access can be revoked merely be deleting the transform keyno elimination of the encrypted data, regardless of its storage location, is needed.
METHOD AND SERVER FOR DELEGATED QUANTUM COMPUTING USING A HARDWARE ENCLAVE
The invention relates, in particular, to a quantum-enabled server (S) comprising an enclave (SE), a qubit source (SS), and quantum-computing means (SM), this enclave comprising means for: receiving information from a remote client through a secured communication channel; determining transformation data from said information; transforming at least one qubit received from said qubit source, according to transformation data; providing the at least one transformed qubits to said quantum-computing means.
SYSTEM FOR SECURE ARBITRARY DATA TRANSPORT
Methods of communicating and facilitating secret communication are provided, with the steps of having a first party provide an encryption key to a first client and a decryption key to a second client, having the first client generate a first and second information, both in combination forming the secret communication, first client encrypting the first information with the encryption key and sending the encrypted information to the second client by an independent communication channel such as a third party server, having the first client send the second information to the second client through the first party, having the second client decrypt the encrypted information with the decryption key to recover the first information, and second client combining the first and second information to recover the secret information.
Blockchain Overwatch
Various embodiments of the present technology provide a distributed overwatch system that allows transactions with government-grade privacy and security. The security and privacy can be achieved by a combination of distributed trusted proxies, to which anonymous users connect with the overwatch of a variety of network security engines. The structured ecosystem provides mechanism for the blockchain to be monitored by an overwatch capability combining big data analytics, intelligent learning, and comprehensive vulnerability assessment to ensure any risks introduced by vulnerabilities are effectively mitigated. The system may include multiple proxy servers geographically distributed around the world. Each proxy can be associated with local network security engines to probe and analyze network traffic. Each proxy can mask sensitive data (e.g., personally identifiable information) within the transaction before it is stored. Various embodiments can interface with most blockchain or distributed ledger technologies that support multi-signature transactions and/or smart contracts.
VIRTUALIZED INTRUSION DETECTION AND PREVENTION IN AUTONOMOUS VEHICLES
Various approaches are disclosed to virtualizing intrusion detection and prevention. Disclosed approaches provide for an embedded system having a hypervisor that provides a virtualized environment supporting any number of guest OSes. The virtualized environment may include a security engine on an internal communication channel between the guest OS and a virtualized hardware interface (e.g., an Ethernet or CAN interface) to analyze network traffic to protect the guest OS from other guest OSes or other network components, and to protect those network components from the guest OS. The security engine may be on a different partition than the guest OS and the virtualized hardware interface providing the components with isolated execution environments that protect against malicious code execution. Each guest OS may have its own security engine customized for the guest OS to account for what is typical or expected traffic for the guest OS.
PROTECTING VEHICLE BUSES FROM CYBER-ATTACKS
Various approaches are disclosed for protecting vehicle buses from cyber-attacks. Disclosed approaches provide for an embedded system having a hypervisor that provides a virtualized environment supporting any number of guest OSes. The virtualized environment may include a security engine on an internal communication channel between the guest OS and an external vehicle bus of a vehicle to analyze network traffic to protect the guest OS from other guest OSes or other network components, and to protect those network components from the guest OS. Each guest OS may have its own security engine customized for the guest OS to account for what is typical or expected traffic for the guest OS (e.g., using machine learning, anomaly detection, etc.). Also disclosed are approaches for corrupting a message being transmitted on a vehicle bus to prevent devices from acting on the message
Securely identifying a device using a DNS-controlled proxy
Systems and methods for identifying a device identifier of a computing device using a browser. A proxy executing on a computing device holds open a connection request from a browser and establishes a secure connection between the proxy and a web server. The proxy sends the first user identifier and the device identifier to a web server. The web server stores the first user identifier and the device identifier as an entry in a cache. The proxy then connects with the browser and establishes a secure connection between the browser and the web server via the proxy. The proxy receives and forwards a second user identifier from the browser to the web server. The web server determines that the second user identifier matches the first user identifier, extracts the associated device identifier, and sends the device identifier to the browser via the proxy.
METHOD OF PROVIDING A HASH VALUE FOR A PIECE OF DATA, ELECTRONIC DEVICE AND COMPUTER PROGRAM
A method of providing a hash value for a piece of data is disclosed, where the hash value provides for a time-stamp for the piece of data upon verification, for limiting a risk of collisions between hash values. The method comprises collecting one or more root time-stamps for a root of a hash tree structure defining a hash function, wherein the root-time stamp is a root time-stamp from the past, determining whether a nonce may be received from a server, and upon failure to receive the nonce from the server, providing the hash value by a hash function of the root time-stamp and the piece of data, or upon success in receiving the nonce from the server, providing the hash value by the hash function of the root time-stamp, the piece of data and the nonce. An electronic device and a computer program are also disclosed.
SYSTEMS AND METHODS FOR USING A CRYPTOGRAM LOCKBOX
Systems and methods for using a cryptogram lockbox are disclosed. In one embodiment, in a merchant-specific cryptogram lockbox comprising at least one computer processor, a method for generating a cryptogram locally using a cryptogram lockbox may include: (1) receiving, from merchant backend, a request for a cryptogram comprising an account identifier received from a customer in a transaction; (2) generating a cryptogram for the account identifier using a limited use key for the account identifier; and (3) returning the cryptogram to the merchant backend. The merchant may conduct the transaction using the cryptogram.
SECURE AND DISTRIBUTED MANAGEMENT OF A PROXY RE-ENCRYPTION KEY LEDGER
A device, system, and method for decentralized management of a distributed proxy re-encryption key ledger by multiple devices in a distributed peer-to-peer network. A network device may receive shared data defining access to a proxy re-encryption key. The network device may locally generate a hash code based on the shared data. The network device may receive a plurality of hash codes generated based on versions of the shared data at a respective plurality of the other devices in the network. If the locally generated hash code matches the received plurality of hash codes, the network device may validate that the shared data is the same across the network devices and may add the received proxy re-encryption key access data and locally generated hash code to a local copy of the distributed proxy re-encryption key ledger.