Patent classifications
H04L2209/76
SYSTEMS AND METHODS TO SECURE AUTHENTICATION DATA FOR ACCESSING RESOURCES IN A DISTRIBUTED MANNER
Described embodiments provide systems and methods for securely storing private information of a user on a device of the user. A server may register a mobile device to store credentials of a user thereon, based on authentication of the user of the mobile device. The server may encrypt credentials of the user using a key of the server. The server may send the encrypted credentials to the registered mobile device for storage thereon without the key. The server may send a code to an endpoint device to initiate authentication of the user with use of the mobile device. The server may receive the encrypted credentials from the mobile device in response to the authentication. The server may decrypt the encrypted credentials using an encryption key of the server. The server may send the decrypted credentials to the endpoint device to authenticate the user at the endpoint device.
Apparatus, method and system for a tunneling client access point
The disclosure details the implementation of an apparatus, method, and system comprising a portable device configured to communicate with a terminal and a network server, and execute stored program code in response to user interaction with an interactive user interface. The portable device contains stored program code configured to render an interactive user interface on a terminal output component to enable the user the control processing activity on the portable device and access data and programs from the portable device and a network server.
NETWORK ARRANGEMENT FOR SECURE USE OF A PRIVATE KEY REMOTELY ACCESSED THROUGH AN OPEN NETWORK
Carrying out, over a network infrastructure, secure execution of cryptographic operations using a public/private key pair is described, wherein the private key is permanently stored on a second computing device that is remote to and accessible to the first computing device through an open network. The method includes establishing a secure connection over the open network between the first computing device and the second computing device, sending a file via the secure connection over the open network to the second computing device and instructing the second computing device to: encrypt or decrypt the file with a private key, of the public/private key pair, that is stored on the second computing device; and send the encrypted or decrypted file to the first computing device via the secure connection over the open network. The encrypted or decrypted file is then received over the open network from the second computing device.
REQUEST PROCESSING METHOD BASED ON CONSORTIUM BLOCKCHAIN, DEVICE, AND STORAGE MEDIUM
Request processing method based on a consortium blockchain, a device, and a storage medium. The implementation solution is: receiving a transaction processing request from a first party authority proxy service of a first party blockchain node through a second party authority proxy service of a second party blockchain node; performing authority verification on the transaction processing request; and in a case where the authority verification passes, sending the transaction processing request to the second party blockchain node to make the second party blockchain node process the transaction processing request. Therefore, the flexibility and convenience of request processing can be improved.
Multi-tier Encryption Non-Fungible Token System
In certain embodiments, one aspect provides a method of securely distributing multi-tier multimedia contents on the Internet, using Non-Fungible Token (NFT) Blockchain and comprising the steps of: signal processing data splitting phase, converting an original multimedia file into multiple data portions; access control encryption phase, converting each of the multiple data portions into an encrypted data portion and uploading the encrypted data portion to a storage cloud; access control storage phase, storing the encrypted data portion on the storage cloud; access control decryption phase, downloading the encrypted data portion from the storage cloud and reconstructing each of the encrypted data portions into each of said multiple data portions; and signal processing data merging phase, reconstructing appropriate multimedia data content depending on a user's tier level.
Cryptographic Pseudonym Mapping Method, Computer System, Computer Program And Computer-Readable Medium
The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymized database (DB) from data relating to entities and originating from data sources (DS.sub.i), wherein the data are identified at the data sources (DS.sub.i) by entity identifiers (D) of the respective entities, and wherein the data are identified in the pseudonymized database (DB) by pseudonyms (P) assigned to the respective entity identifiers (D) applying a one-to-one mapping. According to the invention, one mapper (M) and one key manager (KM) are applied, and a respective pseudonym (P) is generated by the mapper (M), for each encrypted entity identifier (C.sub.i) encrypted by the data source (DS.sub.i), utilizing the mapping cryptographic key (hi) corresponding to the particular data source (DS.sub.i). The invention is further a computer system realizing the invention, as well as a computer program and a computer-readable medium.
Methods and apparatus for encrypted communication
Aspects of the present disclosure relate to an apparatus comprising first interface circuitry to communicate with a first computing device and second interface circuitry to communicate with a second computing device. The first interface circuitry is configured to receive a handshake message from the first computing device. The second interface circuitry is configured to transmit the handshake message to the second computing device and to receive a handshake response message from the second computing device. The first interface circuitry is configured to transmit the handshake response message to the first computing device, whereby to establish a communication session between the first computing device and the second computing device. Apparatus comprises trusted execution environment circuitry to determine a cryptographic session key associated with said communication session, and use said session key to decrypt content of messages transmitted between the first and second computing devices via the apparatus, and analyse said decrypted content.
Virtualized intrusion detection and prevention in autonomous vehicles
Various approaches are disclosed to virtualizing intrusion detection and prevention. Disclosed approaches provide for an embedded system having a hypervisor that provides a virtualized environment supporting any number of guest OSes. The virtualized environment may include a security engine on an internal communication channel between the guest OS and a virtualized hardware interface (e.g., an Ethernet or CAN interface) to analyze network traffic to protect the guest OS from other guest OSes or other network components, and to protect those network components from the guest OS. The security engine may be on a different partition than the guest OS and the virtualized hardware interface providing the components with isolated execution environments that protect against malicious code execution. Each guest OS may have its own security engine customized for the guest OS to account for what is typical or expected traffic for the guest OS.
KEY EXCHANGE METHOD, KEY EXCHANGE SYSTEM, KEY DEVICE, TERMINAL DEVICE, AND PROGRAM
A random number generating unit generates random numbers s.sub.1, s.sub.2, s′.sub.1, and s′.sub.2. A public keys randomizing unit generates first randomized public keys information obtained by randomizing public keys using the random number s.sub.1 and second randomized public keys information obtained by randomizing the public keys using the random number s.sub.2. A proxy calculation unit calculates a first commission result by using a secret key and calculates a second commission result by using the secret key. A verification unit calculates a first verification value by using the random number s.sub.2, calculates a second verification value by using the random number s.sub.1, and verifies whether or not the first verification value and the second verification value coincide with each other. A common key calculation unit calculates a common key by using the random numbers s′.sub.1 and s′.sub.2 if the first verification value and the second verification value coincide with each other.
Intercepting Secure Session upon Receipt of Untrusted Certificate
A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device and the security gateway, receiving a first secure session request from the client device, generating a second secure session request based on the first secure session request, receiving a server certificate from the server device, sending the second secure session request to the server device, receiving first secure content from the client device over the first secure data session, creating first encrypted secure content using the first secure content and the server certificate, and sending the first encrypted secure content to the server device over the second secure data session.