H04L9/088

Key Diversification in a Tracking Device Environment

A tracking device can use a permanent encryption key pair to encrypt a temporary private key that corresponds to a set of diversified temporary public keys. When a community mobile device subsequently detects the tracking device, the central tracking system provides a diversified temporary public key to the community mobile device. The community mobile device uses the diversified temporary public key to encrypt location data representative of a location of the community mobile device, and provides the encrypted location data to the central tracking system. When a user subsequently requests a location of the tracking device from the central tracking system, the central tracking system provides the encrypted temporary private key and the encrypted location data to a device of the user, and the device can decrypt the encrypted temporary private key using the permanent encryption key pair, and decrypt the encrypted location data using the decrypted temporary private key.

Method and apparatus for optical encryption communication using a multitude of hardware configurations
11563582 · 2023-01-24 · ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.

Systems And Methods For Encrypted Content Management
20230231709 · 2023-07-20 · ·

Systems and methods for encrypted content management are provided and include generating a user private key, a user public key, and a symmetric encryption key. A group private key, a group public key, and a group symmetric encryption key are generated and the group private key is encrypted with the group symmetric encryption key. A first shared-secret key is generated based on the user public key and the group private key using a diffie-hellman exchange algorithm. The group symmetric encryption key is encrypted using the first shared-secret key to generate an escrow key. Plaintext data is encrypted using a content symmetric key. A second shared-secret key is generated based on an ephemeral private key and the group public key using a diffie-hellman exchange algorithm. The content symmetric key is encrypted using the second shared-secret key.

DATA PROCESSING METHOD AND APPARATUS FOR BLOCKCHAIN SYSTEM

A data processing method includes: determining, in response to a request of an access terminal for writing target data to a blockchain, a target node role with a read permission for the target data, an access terminal connected with each node device having a permission of a node role corresponding to the node device; acquiring an encryption key corresponding to the target node role; performing encryption processing on the target data according to the encryption key to obtain a cipher text corresponding to the target data, the cipher text corresponding to the target data being decryptable for an access terminal corresponding to the target node role; and storing the cipher text corresponding to the target data to the blockchain.

Application programming interface for certificate management systems

A system can include a certificate application programming interface (API) device that is operable to receive, via an application programming interface (API), an enrollment request for the at least one computerized device. The certificate API device can also generate, via the API, an enrollment package and an end entity certificate package for the at least one computerized device by obtaining the enrollment package and the end entity certificate package from a certificate management service (CMS). The certificate API device can also transmit, via the API, the enrollment package and the end entity certificate package to the at least one computerized device. The system can also include the CMS that is operable to provide the enrollment package and the end entity certificate package to the certificate API device.

METHOD AND SYSTEM FOR ONE-TO-MANY SYMMETRIC CRYPTOGRAPHY AND A NETWORK EMPLOYING THE SAME

One-to-many cryptographic systems and methods are disclosed, and a network employing the same, including numerous industry applications. The embodiments of the present invention can generate and regenerate the same symmetric key from a random token. The one-to-many cryptographic systems and methods include a central location and a cryptographic module being in communication with each other. The cryptographic module is configured to encrypt and/or decrypt data received a remote location and output encrypted and/or decrypted data. The cryptographic module includes a key generator configured to use two or more inputs to reproducibly generate the symmetric key and a cryptographic engine configured to use the symmetric key for encrypting and decrypting data. Corresponding methods, and network employing the same, are also provided.

METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATIONS IN A PROCESSING DEVICE, CORRESPONDING PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT
20230017265 · 2023-01-19 · ·

One or more keys are derived from a master key by executing a plurality of encryption operations. A first encryption operation uses the master key to encrypt a plaintext input having a plurality of bytes. Multiple intermediate encryption operations are performed using a respective intermediate key generated by a previous encryption operation to encrypt respective plaintext inputs having a number of bytes. At least two bytes of a plaintext input have values based on a respective set of bits of a plurality of sets of bits of an initialization vector, wherein individual bits of the respective set of bits are introduced into respective individual bytes of the plaintext input and the respective set of bits has at least two bits and at most a number of bits equal to the number of bytes of the plaintext input.

PHYSICALLY UNCLONABLE FUNCTION DEVICE
20230015627 · 2023-01-19 ·

In an embodiment an integrated device includes a first physical unclonable function module configured to generate an initial data group and management module configured to generate an output data group from at least the initial data group, authorize only D successive deliveries of the output data group on a first output interface of the device, D being a non-zero positive integer, and prevent any new generation of the output data group.

SECURE AND ROBUST FEDERATED LEARNING SYSTEM AND METHOD BY MULTI-PARTY HOMOMORPHIC ENCRYPTION

It is provided a federated learning system for aggregating gradient information representing a result of training an AI model in an edge device, the federated learning system comprising the edge device and a server apparatus, the training module in the edge device being configured to generate an edge switch share in which the encrypted aggregated gradient is encrypted, and to transmit the generated edge switch share to the server apparatus, the encryption/decryption module in the server apparatus being configured to generate an encrypted aggregated gradient for decryption by adding edge switch shares received from the plurality of the edge device, generate an aggregated gradient by decrypting the generated encrypted aggregated gradient for decryption, and to transmit the generated aggregated gradient to the edge device, the training module in the edge device being configured to train the AI model by using the aggregated gradient received from the server apparatus.

BLOCKCHAIN-POWERED OFFER MANAGEMENT AND TRANSACTION MANAGEMENT SYSTEM
20230222609 · 2023-07-13 ·

A transaction system has Internet-connected partner platforms which display webpages with an Offer-Now button initiating coded instructions to display an electronic input form enabling a person to configure a transaction offer, and an Internet-connected service enterprise providing the coded instructions to the partners, configured specifically to partner requirements. Upon the person activating the Offer Now button from a mobile device, a verification code is sent to the device, to be returned to verify the device, and offer input provided through the device and the electronic form is tracked to be saved as an offer for the transaction.