H04L2463/062

System, apparatus and method for integrity protecting tenant workloads in a multi-tenant computing environment
11841806 · 2023-12-12 · ·

In one embodiment, a multi-tenant computing system includes at least one processor including a plurality of cores on which a plurality of agents of a plurality of tenants of the multi-tenant computing system are to execute, a configuration storage, and a memory execution circuit. The configuration storage includes a first configuration register to store configuration information associated with the memory execution circuit. The first configuration register is to store a mode identifier to identify a mode of operation of the memory execution circuit. The memory execution circuit, in a first mode of operation, is to receive encrypted data of a first tenant of the plurality of tenants, the encrypted data encrypted by the first tenant, generate an integrity value for the encrypted data, and send the encrypted data and the integrity value to a memory, wherein the integrity value is not visible to the software of the multi-tenant computing system. A memory coupled to the at least one processor is to store the encrypted data and the integrity value.

Sending secure communications using a local ephemeral key pool

A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.

COMMUNICATION METHOD BETWEEN MESH NETWORK AND CLOUD SERVER, MESH NETWORK SYSTEM AND NODE DEVICE THEREOF

A mesh network system suitable for connection to a cloud server is provided. The system includes: a first node device, configured to store a first private key and encrypt to-be-verified data according to the first private key to generate first encrypted data; and a second node device, configured to receive the first encrypted data and send the first encrypted data to the cloud server. After sending the first encrypted data, the second node device obtains, from the cloud server, second encrypted data generated by encrypting a first key according to the first public key. The second node device sends the second encrypted data to the first node device. The first node device decrypts the second encrypted data according to the first private key to obtain the first key from the second encrypted data, and performs encrypted communication with the cloud server according to the first key.

SYSTEMS AND METHODS FOR PROCESSING PEER-TO-PEER FINANCIAL PRODUCT MARKUP LANGUAGE AGENCY NOTICES
20210201406 · 2021-07-01 ·

Systems and methods for processing peer-to-peer financial product markup language agency notices are disclosed. According to one embodiment, in an information processing apparatus, a computer-implemented method for processing peer-to-peer financial product markup language agency notices may include: (1) receiving a FpML notice from a sender to a receiver; (2) obtaining a sender unique identifier for the sender and a receiver unique identifier for the receiver; (3) generating a FpML message body for a transaction associated with the notice; (4) generating FpML data comprising the unique identifiers and the FpML message body; (5) generating an electronic message comprising the FpML data; and (6) sending the electronic message FpML data to the receiver.

Enhanced email service

An enhanced email service that mitigates drawbacks of conventional email services by enabling transmission of encrypted content to a recipient regardless of the recipient having a prior relationship with the sender or having credentials issued from a certificate authority. A method is provided for receiving encrypted content and generating a message includes both the encrypted content as an attachment and a link to enable decrypted access to the decrypted content. The method may include transmitting the message to an intended recipient's mailbox while also storing the message in an organizational mailbox to provide for subsequent decryption of the encrypted content. The link may provide the intended recipient of the message with decrypted access to the encrypted content in various ways depending on, for example, whether the recipient is viewing the message through a webmail browser or through a local mail client that is compatible with the enhanced email service.

COMMUNICATION TERMINAL, SERVER APPARATUS, AND PROGRAM

A communication terminal which is capable of reducing load of a server apparatus by reutilizing a message key to be used for encrypting a message is provided. The communication terminal includes a session key storage part which stores a session key which is shared with another communication terminal and which is not shared with the server apparatus, a message key generating part which generates a message key, a message key storage part which stores the message key to be reutilized in association with a message key identifier, a message encrypting part which generates a message encrypted text based on a common key cryptosystem using the message and the message key, a message key encrypting part which generates a message key encrypted text based on a common key cryptosystem which can perform re-encryption using the session key and the message key, and an encrypted text transmitting part which transmits a group identifier which is an identifier of a group to which an own terminal belongs, the message key encrypted text or the message key identifier, and the message encrypted text to the server apparatus.

METHOD AND APPARATUS FOR ESTABLISHING TRUSTED CHANNEL BETWEEN USER AND TRUSTED COMPUTING CLUSTER
20210184838 · 2021-06-17 ·

Some embodiments of the present specification provide a method and an apparatus for establishing a trusted channel between a user and a trusted computing cluster. According to the method, when a user wants to establish a trusted channel with a trusted computing cluster, the user only negotiates a session key with any first trusted computing unit in the cluster to establish the trusted channel. Then, the first trusted computing unit encrypts the session key using a cluster key common to the trusted computing cluster to which the first trusted computing unit belongs, and sends the encrypted session key to a cluster manager. The cluster manager transmits the encrypted session key in the trusted computing cluster, so that other trusted computing units in the cluster obtain the session key and join the trusted channel. Thus, the user establishes a trusted channel with the entire trusted computing cluster.

SYSTEM AND METHOD FOR PROVIDING SIMPLIFIED IN-STORE, PRODUCT-BASED AND RENTAL PAYMENT PROCESSES
20210174426 · 2021-06-10 ·

Disclosed is a system and method for receiving, at a user device, data from a near-field-communication tag on an object, initiating, based on the data, a browser on the user device, navigating, based on the data and via the browser, to a site and transmitting authorized payment data or other task to the site based on payment data retrieved from either the user device or a network entity. The data can be communicated from the browser to the site through an application programming interface. Any task can be performed as well such as opening a door, starting a car, or renting a parking space.

SYSTEM AND METHOD FOR PROVIDING DATA TO A MERCHANT DEVICE FROM A USER DEVICE OVER A WIRELESS LINK
20210174429 · 2021-06-10 ·

A mobile device can establish a communication with a separate device via a single function action such as bringing the devices near to each other. A method can include establishing a communication between a mobile device and a separate device a via a wireless link, presenting an instruction associated with the potential purchase and receiving, after the instruction is displayed and interpreted by the mobile device, a combination of a first type of input and a second type of input with the mobile device, at least one of which can be a security measure to prevent unauthorized purchase. The method includes retrieving the payment data from a memory of the mobile device and transmitting the payment data via the wireless link to the separate device to make a purchase.

Method and apparatus for establishing trusted channel between user and trusted computing cluster

Some embodiments of the present specification provide a method and an apparatus for establishing a trusted channel between a user and a trusted computing cluster. According to the method, when a user wants to establish a trusted channel with a trusted computing cluster, the user only negotiates a session key with any first trusted computing unit in the cluster to establish the trusted channel. Then, the first trusted computing unit encrypts the session key using a cluster key common to the trusted computing cluster to which the first trusted computing unit belongs, and sends the encrypted session key to a cluster manager. The cluster manager transmits the encrypted session key in the trusted computing cluster, so that other trusted computing units in the cluster obtain the session key and join the trusted channel. Thus, the user establishes a trusted channel with the entire trusted computing cluster.