H04L9/0618

Blockchain based vehicle control

A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.

Service processing methods, apparatuses, devices and systems

A message processing request is received from a channel partner device, where the message processing request includes a ciphertext message encrypted in a trusted execution environment (TEE) of a service provider device based on a service processing request that includes a plaintext message of the ciphertext message, and where the service processing request requests at least a portion of the plaintext message to be sent to a target user. A first smart contract deployed in a blockchain of the blockchain network is invoked using a TEE of a blockchain node of a blockchain network. The ciphertext message is decrypted based on the first smart contract to obtain the plaintext message. The plaintext message is sent to an operator device to forward the at least a portion of the plaintext message to the target user.

Managing access to data
11477025 · 2022-10-18 · ·

A method including determining an assigned key pair associated with a device, the assigned key pair including an assigned public key and an associated assigned private key; determining an access key pair associated with content to be encrypted, the access key pair including an access public key and an associated access private key; encrypting the access private key using a combination encryption key determined based at least in part on the access private key and the assigned public key; encrypting a randomly generated key by utilizing the access public key; and encrypting the content utilizing the randomly generated key. Various other aspects are contemplated.

Encryption/decryption using key encapsulation/decapsulation

Systems and methods relating to the encryption and decryption of messages to be sent through a communications link. The system and method uses a random data source at the receive and transmit sides, along with a trusted random sampler that produces correlated random samples from the random data source to be used at the send and receive sides. At the transmit side, the correlated random sample is used to generate a symmetric key as well as a ciphertext. The symmetric key is then used to encrypt the message. The ciphertext is transmitted, along with the encrypted message, to the receive side. The receive side then uses the ciphertext, along with its own correlated random sample, to recover the symmetric key. The symmetric key is then used to decrypt the encrypted message.

PERMUTATION CIPHER ENCRYPTION FOR PROCESSOR-ACCELERATOR MEMORY MAPPED INPUT/OUTPUT COMMUNICATION
20230117518 · 2023-04-20 · ·

Technologies for secure data transfer of MMIO data between a processor and an accelerator. A MIMO security engine includes a first permutation cipher pipeline to defuse a count and a key into a permutation state; a first exclusive-OR (XOR) to generate ciphertext data from 64-bits of the new permutation state; and plaintext data; a concatenator to concatenate the plaintext data and additional authenticated data (AAD) to produce a concatenation result; a second XOR to generate an XOR result from the concatenation result and the latest permutation state; and a second permutation pipeline to generate an authentication tag of the XOR result and the key.

A METHOD FOR STATISTICAL ANALYSIS OF AGGREGATE ENCRYPTED DATA WITH KEY-LEAKAGE RESILIENCE FOR SMART GRIDS

This invention publishes a method for statistical analysis of aggregate encrypted data with key-leakage resilience for smart grids. In this invention, every user area is managed by a fog node which plays the role of data aggregation gateway and data relay. All the users' electricity consumption data sent by smart meters in the same user area are firstly aggregated by the fog node to generate a fog-level aggregate ciphertext. Then the fog node further generates a digital signature for the fog-level aggregate ciphertext and sends these data to a cloud server for long-time storage. The cloud server stores all the aggregate ciphertexts and digital signatures received from different user areas in its database, and provides data query and statistical analysis services for the control center of smart grids. On the premise of without violating users' privacy, the cloud server could provide enough information for the control center, enabling it to compute the sum, arithmetic mean and variance of all users' data in specified areas in a privacy-preserving way.

PROCESSOR WITH BLOCK CIPHER ALGORITHM, AND A DATA ENCRYPTION AND DECRYPTION METHOD OPERATED BY THE PROCESSOR
20230067896 · 2023-03-02 ·

A processor with a block cipher algorithm and a data encryption and decryption method operated by the processor are shown. The processor uses a register to store an input key pointer pointing to an input key. In response to one single block cipher instruction of an instruction set architecture (ISA), the processor obtains input data from a first system memory area, performs the block cipher algorithm on the input data based on the input key indicated by the input key pointer stored in the register to encrypt or decrypt the input data to generate output data, and stores the output data in a second system memory area, or an internal storage area within the processor.

CUSTOMIZABLE CRYPTOCURRENCY CARD
20230121749 · 2023-04-20 ·

A physical card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. A unique identifier visible on the card may be transmitted to a server-system to utilize functionalities corresponding to the card (e.g., based on information associated with the unique identifier) on a decentralized computing platform, like a blockchain-based decentralized computing platform. Private access information, like a secret, private key that corresponds to a public key (e.g., a public-private key-pair) or a representation of the private key (like a ciphertext thereof) and corresponding encryption key, may be physically concealed with tamper-evident components such that a user can readily determine whether the private access information was divulged. In some examples, a user is required to activate one or more tamper-evident features, thereby altering a visible state of the card, to utilize functionalities corresponding to the card.

LARGE-PRECISION HOMOMORPHIC COMPARISON USING BOOTSTRAPPING

Systems and methods for improving homomorphic encryption are provided. A processor receives an encrypted ciphertext; splits the encrypted ciphertext into a plurality of smaller digits; applies a homomorphic floor function to clear a least significant bit from a current smaller digit; scales down the encrypted ciphertext, using modulus switching, thereby changing the ciphertext modulus to a new modulus; applies a bootstrapping procedure for a sign evaluation function to determine a sign of the scaled down encrypted ciphertext; and transmits the sign with the ciphertext to a server for subsequent use.

PERFORMANCE IMPROVEMENT FOR ENCRYPTED TRAFFIC OVER IPSEC
20230066604 · 2023-03-02 ·

A packet that includes a header and a payload can be acquired. A first portion of the payload can be selected such that the first portion that is smaller than the payload. The header and the first portion of the payload can be encrypted based on an encryption algorithm to generate an encrypted packet. The encrypted packet can be transmitted to a node on a network.