H04L9/0625

Establishing a trusted session with a smart speaker

A trusted session is to be established between a smart speaker and a computer server. The computer server may receive an instruction to initiate a trusted session with the smart speaker. The instruction includes an indication of an account linking token for linking a first and second account associated with the smart speaker and the computer server, respectively. The computer server generates a session token and sends it to the smart speaker for acoustic signalling. The acoustic signal is captured by a mobile device and used to reconstruct the session token. The computer server receives the reconstructed session token along with identifying information from the mobile device. The computer server system uses the identifying information to confirm that the mobile device is associated with the second accord. Upon so confirming, the computer server may establish a trusted session between the first smart speaker and the computer server system.

METHOD AND SYSTEM FOR ENCRYPTING DATA
20170353297 · 2017-12-07 · ·

The present disclosure relates to a method and a system for encrypting data by a data protection system. The data protection system receives one or more dataset and calculates the number of binary digit ‘1’ in each byte of the one or more dataset. The data protection system determines a slot value for each byte of the one or more dataset based on location of the each byte in a table of the plurality of tables. The data protection system identifies a pattern index for the each byte based on the location of the each byte in the one or more slots and generates an encrypted byte for the each byte of the one or more dataset. In an embodiment, the data protection system decrypts the encrypted dataset by receiving one or more encrypted byte.

AUTHENTICATION OF A CARD BY CONTACTLESS READING
20170353312 · 2017-12-07 ·

The invention relates to a method of authentication of a contactless communication circuit, PICC, by a contactless communication terminal, PCD. Within the PCC, a first number is generated and without encryption, transmitted to the PCD. Within the PCD a second number is determined by decryption of the first number with a first key. The determination of a third number is based on the second number, and the determination of a fourth number is by encryption of the third number with the first key. Decryption of the fourth number with the first key to obtain the third number and an interruption of the authentication if a sixth number obtained from the third number is different from a seventh number, is performed by the PICC.

Symmetrical iterated block encryption method and corresponding apparatus
09832014 · 2017-11-28 · ·

A symmetrical iterated block encryption method includes: a bitwise XOR combination of a predetermined data word of a predetermined block with a predetermined data word of a predetermined round key; and a bitwise XOR combination of the predetermined data word with at least one other predetermined data word.

METHOD OF PREVENTING PRY FOR RANDOM ACCESS MEMORY

The present invention provides a method of preventing pry for random access memory. A functional interface is designed between a computer program and a random access memory. When the computer program wants to store an original data into the random access memory, an encryption procedure is processed on the original data first, and then stoic into the random access memory for being an encrypted data. When the computer program ants to fetch related data float the random access memory, the functional interface is used to fetch the encrypted data for decryption, so that the original data is obtained for calculation.

PROVISIONING INITIATED FROM A CONTACTLESS DEVICE
20220060889 · 2022-02-24 ·

A method is disclosed. The method includes generating an initialization request message to provision access data, transmitting the initialization request to a server computer, and receiving, by the communication device, a dynamic data element from the server computer. The method also includes performing a message exchange process with a user device, wherein a cryptogram is received from the user device by the communication device during the message exchange process. The method also includes transmitting a provisioning request message including a user device identifier and the cryptogram to the server computer. The method also includes receiving, by the communication device, the access data.

CIPHER PROCESSING APPARATUS, CIPHER PROCESSING METHOD, AND PROGRAM
20170295010 · 2017-10-12 ·

A cipher processing configuration, of which the resistance against various attacks is improved, having a high security level is realized. In a cipher processing configuration in which a nonlinear transformation process and a linear transformation process are repeatedlyperformed for state data formed from a plurality of elements, a linear transformation unit performs a matrix operation applying a quasi-MDS matrix and a substitution process. As the substitution process, a substitution process is performed which satisfies the following (Condition 1) and (Condition A). (Condition 1) According to the substitution process of the substitution unit for the input X, each column element of the output Y is configured by elements of four mutually-different columns of the input X (Condition A) In a case where the substitution process performed by the substitution unit for the input X is repeatedly performed continuously twice, each column element of the output Y is configured by elements of three or more mutually-different columns of the input X.

ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, AND DECRYPTION METHOD

There is provided an encryption device including a data encryption unit configured to conduct encryption on the basis of a white box model in which at least a part of a plurality of round functions for sequentially conducting encryption processing on an input value is tabulated, and input and output values of the round function are recognizable from an outside. The plurality of round functions each have an encryption function that is tabulated and encrypts an input value in a black box model in which input and output values are recognizable from the outside and an intermediate value is not recognizable from the outside.

ENCRYPTED-BYPASS WEBRTC-BASED VOICE AND/OR VIDEO COMMUNICATION METHOD
20170331798 · 2017-11-16 ·

An encrypted-bypass webRTC-based voice and/or video communication method provides dynamic use of the encryption algorithms in WebRTC communication.

DEVICE AND METHOD FOR SOUND WAVE COMMUNICATION
20170288805 · 2017-10-05 · ·

A device for sound wave communication, including: a hardware correction table for setting a correction frequency band; a sound wave transmission unit for generating data frequencies at a predetermined base decibel level, generating separate reception filter frequencies at the base decibel level for receiving data carried by a sound wave transmitted from the nearest location when sound waves are received, and generating the correction reference frequency at the base decibel level for correcting hardware transmission; and a sound wave reception unit for receiving a sound wave signal transmitted from the sound wave transmission unit, extracting decibel levels at each of the data frequencies to form an array of decibel levels, correcting the array by shifting the array by a correction value extracted using the hardware correction table, and reconstructing data.