H04L9/0631

Anonymization method and apparatus, device, and storage medium

This disclosure provides an anonymization method and apparatus, a device, and a storage medium, and pertains to the field of communications network technologies. The method includes: receiving a data obtaining request of a first terminal, and obtaining requested target data based on the data obtaining request; determining behavior data generated when the target data is obtained; determining, based on the behavior data, a first permutation character sequence corresponding to the target data; and anonymizing, based on the first permutation character sequence, a to-be-anonymized character string in the target data, and outputting the anonymized target data. In this disclosure, because the behavior data is different each time and is not easy to crack, anonymization is implemented without relying on plaintext information, thereby improving anonymization security and meeting anonymization requirements specified by laws.

METHOD, APPARATUS, AND COMPUTER PROGRAM FOR SETTING ENCRYPTION KEY IN WIRELESS COMMUNICATION SYSTEM, AND RECORDING MEDIUM FOR SAME
20220417743 · 2022-12-29 · ·

The present disclosure relates to a method, apparatus, and computer program for setting an encryption key in a wireless communication system; and a recording medium for same. According to one embodiment of the present disclosure, a method for setting an encryption key size in a wireless communication system may comprise: a step in which a first controller of a first device receives a first message containing information on a minimum value of a first encryption key size from a first host of the first device; and a step in which the first controller transmits, to the first host, a second message indicating an encryption change. The second message may contain information on the first encryption key size.

METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATIONS IN A PROCESSING DEVICE, CORRESPONDING PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT
20220417012 · 2022-12-29 · ·

Encryption of data using a cryptographic device is protected. The protecting includes generating a first output of a first branch by encrypting a constant using a key, and generating a first output of a second branch by encrypting a constant using a key. The first output of the first branch, the first output of the second branch, and a first portion of plaintext data are XORed, generating a first portion of cypher text. A second output of the first branch is generated by encrypting the first output of the first branch using a key, and a second output of the second branch is generated by encrypting the first output of the second branch using a key. The second output of the first branch, the second output of the second branch, and a second portion of plaintext data are XORed, generating a second portion of cypher text.

RANDOM POSITION CIPHER ENCRYPTION USING SCRAMBLED ASCII STRINGS
20220417000 · 2022-12-29 ·

The present innovative solution increases security to interceptor attacks while not significantly minimizing the processing resource and time requirements of cryptography processes that are used. A novel RPC is used in conjunction with a public key, used to create private keys, for scrambling ASCII dictionary strings, which are then used to calculate distances among characters in the scrambled dictionary. The end result of the encryption process is not a ciphertext string but, instead, it is a string of character distances that any interceptor cannot use since he cannot recreate the scrambled dictionary or deduce what distances represent. The encryption process is simplified by converting computationally intensive operations into simple lookup operations in position strings calculated once for each scrambled dictionary. During decryption the scrambled dictionary and the matching position string are recreated and the original plaintext is recovered by simple lookup operations.

HANDLING UNALIGNED TRANSACTIONS FOR INLINE ENCRYPTION

Methods and apparatus relating to handling unaligned transactions for inline encryption are described. In an embodiment, cryptographic logic circuitry receives a plurality of incoming packets and store two or more incoming packets from the plurality of incoming packets in memory. The cryptographic logic circuitry is informs software in response to detection of the two or more incoming packets. Other embodiments are also disclosed and claimed.

Systems and methods for multi-region encryption/decryption redundancy
11539512 · 2022-12-27 · ·

Methods and systems for encrypting and decrypting data comprising sending sensitive information to a first cryptographic processing system in a first cloud region for encryption with a first key encryption key generated by and stored by the first cryptographic processing system. The first encrypted sensitive information received from the first cryptographic processing system is stored in a first database. The sensitive information is also sent to a second cryptographic processing system in a second cloud region different from the first cloud region for encryption with a second key encryption key generated by and stored by the second cryptographic processing system. The second encrypted sensitive information received from the second cryptographic processing system is stored in a second database. If the first encrypted sensitive information cannot be decrypted by the first cryptographic processing system, the second encrypted sensitive information is sent to the second cryptographic processing system.

System and method for providing secure and reliable communication over a low-energy wireless communication protocol
11540119 · 2022-12-27 · ·

A system and method for encrypting a data frame of a low-power communication protocol. The method includes providing an input data frame, the input date frame includes a random number, a unique identifier, and a payload data, encrypting the payload data, generating a Message Integrity Code (MIC), generating a rotating identifier by encrypting the unique identifier, and generating an output frame based on the generated rotating identifier, the generated MIC, and the encrypted payload data.

INFORMATION SECURITY PROTECTION SYSTEM AND INFORMATION SECURITY PROTECTION METHOD
20220407679 · 2022-12-22 ·

An information security protection method includes: repeatedly substituting a plaintext into an encryption algorithm to obtain a plurality of ciphertexts, and. determining whether the ciphertexts are all the same h the processor core. Each time the processor core substitutes the plaintext into the encryption algorithm, the encryption algorithm outputs a ciphertext. When the processor core determines that the ciphertexts are not all the same, the processor core outputs a hacker attack message, which means that an encryption process has suffered a hacker attack.

Support for increased number of concurrent keys within multi-key cryptographic engine
11531772 · 2022-12-20 · ·

A server includes a processor core including system memory, and a cryptographic engine storing a key data structure. The data structure is to store multiple keys for multiple secure domains. The core receives a request to program a first secure domain into the cryptographic engine. The request includes first domain information within a first wrapped binary large object (blob). In response a determination that there is no available entry in the data structure, the core selects a second secure domain within the data structure to de-schedule and issues a read key command to read second domain information from a target entry of the data structure. The core encrypts the second domain information to generate a second wrapped blob and stores the second wrapped blob in a determined region of the system memory, which frees up the target entry for use to program the first secure domain.

System and method for protecting browser data

A method for controlling access to process data includes encrypting process data of a process; receiving a request to access the process data; requesting a security code to access the encrypted process data; receiving the security code; authenticating the received security code; and granting access to the encrypted process data if the received security code is successfully authenticated and denying access to the encrypted process data if the received security code is not successfully authenticated.