Patent classifications
H04L9/065
Method and devices for creating redundancy and encryption using Mojette Transform
A method for hyper security encoding includes receiving data to be encrypted, and padding the data to be encrypted with padding data to avoid un-obfuscated bits after encryption. The method also includes encrypting, with a Mojette Transform, the data to be encrypted after the data to be encrypted is padded with the padding data, and outputting a result of the encryption as encrypted data.
Systems and Methods for a Cryptographic File System Layer
The systems and methods disclosed herein transparently provide data security using a cryptographic file system layer that selectively intercepts and modifies (e.g., by encrypting) data to be stored in a designated directory. The cryptographic file system layer can be used in combination with one or more cryptographic approaches to provide a server-based secure data solution that makes data more secure and accessible, while eliminating the need for multiple perimeter hardware and software technologies.
REAL-TIME SOFT COMBINING, CRC VALIDATION, AND MIC VALIDATION OF DECRYPTED PACKETS
The apparatus receives a first PDU and a first CRC that is based on the first PDU. The first PDU is encrypted based on a first nonce. The apparatus decrypts the first PDU to obtain a first payload and a first cipher stream. The apparatus soft combines the decrypted first payload with a decrypted set of payloads. The set of payloads have been encrypted based on at least one nonce different than the first nonce. The apparatus generates a second CRC based on the soft combined decrypted payloads and based on the first cipher stream. The apparatus determines whether the generated second CRC for the soft combined decrypted payloads passes a CRC check against the first CRC.
EFFICIENT COMMON STORAGE OF PARTIALLY ENCRYPTED CONTENT
Techniques and mechanisms described herein facilitate the efficient common storage of partially encrypted content. According to various embodiments, a client device to transmit a designated representation of a media content item via a communications interface may be received. The media content item may be associated with a plurality of representations including the designated representation. The media content item may be associated with first media content data and second media content data. The first media content data may be shared among the plurality of representations. The second media content data may be specific to the designated representation. The first media content data may be combined with the second media content data to create a designated partially encrypted media content portion associated with the designated representation via a processor. The designated partially encrypted media content portion may be transmitted to the client device via the communications interface.
ENCRYPTION METHOD
A encryption method comprising: (a) segmenting a data stream into a plurality of equal length blocks, wherein each equal length block of the plurality of equal length blocks has a fixed length; (b) verifying the readability of the plurality of blocks segmented form the data stream, and then performing step (c) if any of blocks segmented from the data stream is sorted to be readable, and performing step (d) if the blocks segmented from the data stream are all un-readable; (c) encrypting the block that is readable; (d) encrypting the block in specific order in the sequence.
Optimized convolution for received XOR encrypted data streams
A receiver apparatus and method for optimized decryption and despreading of a very low frequency (VLF) bitstream is disclosed. In embodiments, the receiver includes antenna elements for receiving a transmission security (TRANSEC) encoded bitstream associated with an uncertainty window size and a spread factor. The receiver includes cryptographic processors that, when the spread factor is sufficiently large, select key section numbers A and data section numbers B based on the window size and spread factor. The cryptographic processors generate an output sequence of correlation windows, each correlation window associated with a symbol of the bitstream, via pipelined sectional mirrored-key convolution based on a key section number A and data section number B chosen to optimize performance (e.g., processor performance, memory performance).
Online-Streamer Image Model File Transmission in Co-Hosting During Livestreaming
This application provides an online-streamer image model file transmission method and computing device in co-hosting during livestreaming. The method includes: receiving an online-streamer image model file sent by a first online streamer end, and obtaining a target obfuscation key and a target encryption type; determining to-be-encrypted bytes in the online-streamer image model file based on the target encryption type, and encrypting the to-be-encrypted bytes based on the target obfuscation key to obtain an encrypted online-streamer image file; and receiving an interaction request between the first online streamer end and a second online streamer end, and sending the encrypted online-streamer image file to the second online streamer end based on the interaction request.
Generic encryption system for nonsecure datapaths
A secure generic encryption system for nonsecure datapaths comprises a format-specific adaptation layer/data path for receiving and processing nonsecure content data; an authentication engine located within a security perimeter and coupled to an external communication interface for authentication and supplying the format-specific adaptation layer/data path, located outside the security perimeter, with an output signal indicating whether authentication is successful; and a generic encryption module located within the security perimeter and coupled (1) to the authentication engine for receiving from the authentication engine initialization vectors, encryption keys, and the output signal indicating whether authentication is successful, and (2) to the format-specific adaptation layer/data path for (a) receiving a read signal from the format-specific adaptation layer/data path, and (b) providing the format-specific adaptation layer/data path with a data-available signal to indicate whether data is available to be read.
ITERATIVE ENCRYPTION AND RANDOM GENERATION AND SERIALIZATION OF CRYPTOGRAPHIC FUNCTIONS
Cryptography provides a wide variety of functions. For example, encryption provides data confidentiality and signatures provide data integrity. In one embodiment, a plurality of encryption functions is iteratively applied to produce a ciphertext. In one embodiment, a data sequence describing a cryptographic function is processed by a reader who outputs the cryptographic function. The data sequence may be stored or transmitted and the cryptographic function may be used for cryptographic purposes. In another embodiment, a generator produces random cryptographic functions.
TRANSACTION TRACING METHOD AND APPARATUS BASED ON BLOCKCHAIN
A method and an apparatus for tracing a transaction based on a blockchain are provided. The method may include: invoking a smart contract between an upstream node and an intermediate node; encrypting, by using a private key of the intermediate node, transaction details between the upstream node and the intermediate node to generate and write upstream transaction information into the blockchain; encrypting the private key of the intermediate node by respectively using public keys of the upstream node and an end node, and generating and writing secret-key information of the upstream node and the end node into the blockchain; and decrypting the secret-key information of the upstream node and the end node by using the private keys of the upstream node and the end node, and decrypting the upstream transaction information of the intermediate node by using the private key of the intermediate node to obtain the transaction details.