Patent classifications
H04L9/0618
Verification of bitstreams
An apparatus, method, and system assess the trustworthiness of a design representation while maintaining its confidentiality and thwarting attempts at unauthorized access, misappropriation, and reverse engineering of confidential proprietary aspects of the design representation and/or its bit stream. A utility/tool is provided for trust assessment and verification of designs and/or bit streams. The utility/tool may be instantiated on a semiconductor device or implemented as a utility executable on a mobile computing device or other information processing system, apparatus, or network.
Method for authenticating Digital Content Items with blockchain and writing Digital Content Items data to blockchain
Method, systems, and apparatus for receiving one or more digital content items, processing a digital content item into characteristic digital content item data, selecting characteristic digital content item data from received digital content item, writing the selected data to a blockchain network, processing the digital content item into characteristic digital content item data, comparing characteristic digital content item data to blockchain data, analysis of digital content item comparison provided.
LINKING BLOCKCHAIN OPERATIONS
A node in a blockchain network may create a mapping scheme operation header for a subsequent operation, identify a first preceding operation in a first preceding block, the first preceding operation linked to the subsequent operation, and include a location of the first preceding block in the mapping scheme operation header for the operation proposal.
Methods, systems and computer program products for data protection by policing processes accessing encrypted data
The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, Trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management. The process-based encrypted data access policing system may be implemented as a kernel level file system filter and a user-mode filter companion application, which polices the reading/writing of encrypted data in either a server system or an endpoint computer and protects data from data breaches and known or unknown attacks including ransomware and/or phishing attacks.
Distributed blockchain data storage under account model
Disclosed herein are methods, systems, and non-transitory, computer-readable medium for blockchain data storage. One of the methods includes identifying an account identifier (ID) of a blockchain account involved in the transaction, wherein the transaction is included in a current block to be appended to a blockchain associated with the blockchain network based on performing a consensus algorithm; updating an account state corresponding to the account ID of the blockchain account to an updated account state based on the blockchain transaction after the current block is appended to the blockchain; hashing the updated account state to generate a hash value of the updated account state; identifying the hash value of the account state corresponding to the blockchain account based on the account ID of the blockchain account; and updating, in the current state database, the hash value of the account state to the hash value of the updated account state.
Electronic device for sorting homomorphic ciphertext using shell sorting and operating method thereof
Provided are an electronic device for sorting homomorphic ciphertext by using shell sorting and an operating method thereof to sort ciphertext generated by using homomorphic encryption according to a size of an original number corresponding thereto.
GENERATING AND STORING UNIQUE MARKING CODES FOR LIQUID FOOD PACKAGES
A method of generating marking codes to uniquely identify packages of liquid food is performed within a system comprising a code generator operable to generate a marking code by encrypting package production data that uniquely represents the production of an individual package, and to provide the marking code for marking of the individual package. The system further comprises a key generator operable to generate a partition key as a function of the marking code, and a storage interface coupled to a database comprising a plurality of partitions. The storage interface is operable to determine a selected partition among the plurality of partitions based on the partition key and to store, in the selected partition, package itemization data comprising the marking code and the package production data.
METHOD AND DEVICES FOR CREATING REDUNDANCY AND ENCRYPTION USING MOJETTE TRANSFORM
A method for hyper security encoding includes receiving data to be encrypted, and padding the data to be encrypted with padding data to avoid un-obfuscated bits after encryption. The method also includes encrypting, with a Mojette Transform, the data to be encrypted after the data to be encrypted is padded with the padding data, and outputting a result of the encryption as encrypted data.
INFECTIVE COUNTERMEASURES
The invention proposes a novel type of infective countermeasure against fault injection attacks. Instead of determining the injected error before amplifying it, the novel countermeasure applies the same diffusion function to two intermediate ciphers obtained by executing a cryptographic operation on an input. The error is therefore amplified within the same intermediate ciphers, referred to as infective ciphers after diffusion. It is then possible to use diffusion functions which do not map the cipher 0 as an output equal to 0. A cipher recomposed from bits of undiffused ciphers is also generated. These infective and recomposed ciphers are XOR-combined to provide an output cipher. This approach makes it possible to adapt, by simple duplication of the pairs and associated specific diffusion functions, the protection offered by the countermeasure to a desired number of injected faults.
Homomorphic inference device, homomorphic inference method, computer readable medium, and privacy-preserving information processing system
A range determination unit (412) takes as input an input ciphertext C.sub.i resulting from encrypting input data, determines whether a value obtained from the input data is within a reference range, and generates a range ciphertext a.sub.j depending on a determined result. A result generation unit (413) performs a homomorphic operation on the range ciphertext a.sub.j generated by the range determination unit (412), so as to generate a result ciphertext D of a result of performing inference including a non-polynomial operation on the input data. An output unit (414) outputs the result ciphertext D.