Patent classifications
H04L2463/062
Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device
A cryptographic service device includes: a processor; and a memory storing instructions executable by the processor, wherein the processor is configured to execute the instructions to operate as a registration module, a working key creation module, and a cryptographic operation calling module. The registration module is configured to call a secondary security module to generate an asymmetric key pair including a target public key and a target private key. The working key creation module is configured to receive a working key creation request of a business system, and call a primary security module to generate a working key for the business system. The cryptographic operation calling module is configured to receive a cryptographic operation request of the business system, and call a target security module to obtain an operation result of the target security module.
Methods and systems for providing a customized network
In some embodiments, a system is a reverse-proxying HTTP cache server that handles user session management and dynamically forwards requests to origin/backend servers based on the content being requested. It caches data from origin servers in order to reduce the stress placed on each origin server. It uses encrypted authorization tokens to handle session management and is able to modify origin data on-the-fly in order to inject per-client authorization information into the data stream. It can enforce maximum concurrent session limits, user bans, limit exemptions and time-limited live content previews.
System and method for authorizing secondary users to access a primary user's account using blockchain
Described herein is a system for authorizing secondary users to access a primary user's account using blockchain. The primary user can transmit a request for providing access to a primary user's account to a secondary user. In response to receiving the request, the system may generate a new block in the blockchain ledger specifying the permissions of the secondary user. Furthermore, the new block may include the permission details. This way, when the secondary user attempts to access the primary user's account, the system may verify the secondary user based on the permission details in the last block in the sequence of blocks. Each new block may include the permission details.
Semiconductor device with secure access key and associated methods and systems
Memory devices, systems including memory devices, and methods of operating memory devices are described, in which security measures may be implemented to control access to a fuse array (or other secure features) of the memory devices based on a secure access key. In some cases, a customer may define and store a user-defined access key in the fuse array. In other cases, a manufacturer of the memory device may define a manufacturer-defined access key (e.g., an access key based on fuse identification (FID), a secret access key), where a host device coupled with the memory device may obtain the manufacturer-defined access key according to certain protocols. The memory device may compare an access key included in a command directed to the memory device with either the user-defined access key or the manufacturer-defined access key to determine whether to permit or prohibit execution of the command based on the comparison.
Method and apparatus for managing encryption keys and encrypted electronic information on a network server
Method and apparatus for storing and managing encrypted electronic information, which enables on-demand access to a data owner's encrypted electronic information only to the data owner or to authorized data recipients, and only so long as the authorization is not rescinded by the data owner. The authorized data recipient's access to the data owner's information is limited solely to those portions of the data owner's encrypted electronic information designated by the data owner. Moreover, the authorized data recipient's limited access to the encrypted electronic information is accomplished without ever revealing or exposing the data owner's secret or private encryption key(s) to the authorized data recipient. The data owner can also immediately disable this access at any time by rescinding the access authority, if so desired, thereby terminating the authorized recipient's access to any existing information on the system, or any additional information yet to be uploaded, encrypted and stored on the system. Thus, embodiments of the present invention also enables rescinding and terminating such granted access without the data owner having to discard and replace their private encryption keys. Not even the operators and administrators of the apparatus can gain access the unencrypted information or unencrypted private keys of the data owner without the express authorization of the data owner.
Data protection in a storage system
In a storage system that includes a plurality of NVMe SSDs, data protection may be carried out by: for each of the plurality of NVMe SSDs, encrypting a device key using a master secret, wherein the device key, when not encrypted, is used to encrypt and decrypt data in one or more namespaces on the NVMe SSD; generating a plurality of shares from the master secret; and storing a separate share of the plurality of shares in a namespace prohibited from encryption on each NVMe SSD.
Methods and systems for detecting persons in a smart home environment
The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.
Method and system for generating a smart time-lapse video clip
An electronic device with a display, processor(s), and memory displays a video monitoring user interface. The interface includes a video window displaying video feed from a camera located remotely from the device. A subset of the video includes a first motion event associated with an event category and a second motion event not associated with the event category. The device detects a user request for video playback. In response to the request, the device identifies a segment of the video for playback. The segment includes a first portion associated with the first motion event and a second portion associated with the second motion event. The device causes generation of a time-lapse video clip of the segment of the video for playback, including configuring the first portion to play at a different speed from the second portion. The device displays and plays the video clip of the segment.
METHODS AND APPARATUS TO MANAGE CREDENTIALS IN HYPER-CONVERGED INFRASTRUCTURES
Methods, apparatus, systems and articles of manufacture manage credentials in hyper-converged infrastructure s are disclosed. An example method includes establishing, by executing an instruction with at least one processor, a communication between a software defined data center manager of the hyper-converged infrastructure and a component of the hyper-converged infrastructure using first credentials included in a known hosts file. The example method also includes generating, by executing an instruction with the at least one processor, second credentials at the component in response to a power-on event detected by the software defined data center manager. The example method also includes recording, by executing an instruction with the at least one processor, the second credentials at the known host file.
CRYPTOGRAPHIC OPERATION METHOD, WORKING KEY CREATION METHOD, CRYPTOGRAPHIC SERVICE PLATFORM, AND CRYPTOGRAPHIC SERVICE DEVICE
A cryptographic service device includes: a processor; and a memory storing instructions executable by the processor, wherein the processor is configured to execute the instructions to operate as a registration module, a working key creation module, and a cryptographic operation calling module. The registration module is configured to call a primary security module to generate a master key for a newly added secondary security module. The working key creation module is configured to receive a working key creation request of a business system, call the primary security module to generate a working key for the business system, and acquire a working key ciphertext. The cryptographic operation calling module is configured to receive a cryptographic operation request of the business system; call a target security module, and obtain an operation result of the target security module.