H04L9/0625

CONSTANT TIME SECURE ARITHMETIC-TO-BOOLEAN MASK CONVERSION
20210406406 · 2021-12-30 ·

A first arithmetic input share and a second arithmetic input share of an initial arithmetically-masked cryptographic value are received. A sequence of operations using the arithmetic input shares and a randomly generated number is performed, where a current operation in the sequence of operations generates a corresponding intermediate value that is used in a subsequent operation. At the end of the sequence of operations, a first Boolean output share and a second Boolean output share are generated. The arithmetic-to-Boolean mask conversion is independent of the input bit length.

ESTABLISHING A TRUSTED SESSION WITH A SMART SPEAKER

A trusted session is to be established between a smart speaker and a computer server. The computer server may receive an instruction to initiate a trusted session with the smart speaker. The instruction includes an indication of an account linking token for linking a first and second account associated with the smart speaker and the computer server, respectively. The computer server generates a session token and sends it to the smart speaker for acoustic signalling. The acoustic signal is captured by a mobile device and used to reconstruct the session token. The computer server receives the reconstructed session token along with identifying information from the mobile device. The computer server system uses the identifying information to confirm that the mobile device is associated with the second accord. Upon so confirming, the computer server may establish a trusted session between the first smart speaker and the computer server system.

FILE ENCRYPTION AND DECRYPTION METHOD AND ELECTRONIC DEVICE USING THE SAME
20220209935 · 2022-06-30 ·

A file encryption and decryption method used in an electronic device generates a symmetric key and asymmetric keys, according to the number of sharers who are to receive the file. The asymmetric keys comprise public and private keys. An original file is encrypted by the symmetric key to generate a first encrypted file, encrypt the symmetric key with the public key to generate a first ciphertext, calculates an MD5 value of the original file, and calculates a first total length of the MD5 value, the public key, and the first ciphertext. The first total length is taken as a header file of the first encrypted file, the header file, the public key, and the first ciphertext are added to the first encrypted file to generate a second encrypted file, the procedure being repeated for each of the number of sharers.

Method of response signal processing in traction power networks

A method of response signal processing applied in traction power networks, comprising establishing an data transmission channel between a target and a backend terminal through a relay router in a power distribution room; delivering a temperature-humidity information to the backend terminal by the target through the data transmission channel, and a response signal being delivered to the relay router; the relay router determining a second signal to noise ratio (SNR) according to a first SNR of the data transmission channel responded from the target when a noise ratio (NR) adjusting requirement is satisfied; the relay router determining a first identification of encryption algorithm based on the second SNR, and transmitting the first identification of encryption algorithm to the target. The present invention avoids the needs for retransmitting encrypted response signals for several times during transmission between the backend terminal and the charging controller.

Systems and methods for secure data transmission

The present disclosure relates to systems and methods for transmitting data. The methods may include obtaining, by a first module, a first packet, wherein the first packet includes a first random code, first data, and a first signature, wherein the first signature is generated by a second module by encryption based on an original random code and original data; generating, by the first module a second signature by encryption based on the first random code and a checksum of the first data; and generating, by the first module, a first response to the first packet upon determining whether the second signature matches the first signature.

Systems and methods for providing a marketplace where data and algorithms can be chosen and interact via encryption

A method includes receiving, on a computer-implemented system and from user, an identification of data and an identification of an algorithm and, based on a user interaction with the computer-implemented system comprising a one-click interaction or a two-click interaction. Without further user input, the method includes dividing the data into a data first subset and a data second subset, dividing the algorithm (or a Boolean logic gate representation of the algorithm) into an algorithm first subset and an algorithm second subset, running, on the computer-implemented system at a first location, the data first subset with the algorithm first subset to yield a first partial result, running, on the computer-implemented system at a second location separate from the first location, the data second subset with the algorithm second subset to yield a second partial result and outputting a combined result based on the first partial result and the second partial result.

CREATING DETERMINISTIC CIPHERTEXT USING WIDE-BLOCK ENCRYPTION
20220182219 · 2022-06-09 ·

A computer-implemented method according to one embodiment includes compressing an uncompressed instance of data to create a compressed instance of data; encrypting the compressed instance of data utilizing wide-block encryption in response to determining that a size of the compressed instance of data is less than a predetermined threshold; and adding a zero pad to the encrypted compressed instance of data to create a ciphertext string.

Data protection device and method and storage controller

A device and method for data protection, and a storage controller, related to the technical field of data protection. The device comprises: an encryption unit (11), used for receiving first data to be written into a storage module and first storage address information (401), and for encrypting the first data on the basis of the first storage address information and of feature information of the storage module (402); and a decryption unit (12), used for reading from the storage module second data corresponding to second storage address information (403), and for decrypting the second data on the basis of the second storage address information and of the feature information (404).

Circuits for data encryption and decryption, and methods thereof
11349650 · 2022-05-31 · ·

A circuit for data encryption is provided. The circuit includes an encryption controller configured to randomly generate a frequency parameter defining different timeframes corresponding to different frequencies. The circuit also includes a random-clock-signal generator configured to receive the frequency parameter to synthesize an encryption clock signal based on a base clock signal. The encryption clock signal includes a random combination of different clock frequencies respectively over multiple different timeframes. Additionally, the circuit includes an encryption sub-circuit configured to receive plain data and to encrypt the plain data by a sampling replacement driven by the encryption clock signal to obtain encrypted data.

Systems and methods for blind vertical learning

A method of providing blind vertical learning includes creating, based on assembled data, a neural network having n bottom portions and a top portion and transmitting each bottom portion of then bottom portions to a client device. The training of the neural network includes accepting a, output from each bottom portion of the neural network, joining the plurality of outputs at a fusion layer, passing the fused outputs to the top portion of the neural network, carrying out a forward propagation step at the top portion of neural network, calculating a loss value after the forward propagation step, calculating a set of gradients of the loss value with respect to server-side model parameters and passing subsets of the set of gradients to a client device. After training, the method includes combining the trained bottom portion from each client device into a combined model.