H04L9/0631

WIDEBAND FEATURELESS RATELESS CHAOTIC WAVEFORM GENERATION METHOD

A wideband chaotic waveform that is rateless in that it may be modulated at virtually any rate and has a minimum of features introduced into the waveform. Further, the waveform provided may be operated below a signal to noise ratio wall to further enhance the LPD and LPE aspects, thereof. Additionally, the present disclosure may provide a mix of coherent and non-coherent processing techniques applied to signal samples to efficiently achieve coarse synchronization with a waveform that is faster, more efficient and more accurate than using time domain signal correlators alone.

Enhanced secure onboard communication for CAN

According to certain general aspects, the present embodiments relate generally to securing communication between ECUs. Example implementations can include a method of securely transmitting Controller Area Network (CAN) protocol frames via a CAN controller.

Secure wireless dataloading using in-flight entertainment connectivity systems

Devices, systems and methods for enhancing aircraft maintenance are disclosed. An exemplary method for improving dataloading in an airplane includes retrieving, from an in-flight entertainment connectivity (IFEC) system, at least one avionics software, the IFEC system comprising a mass storage device comprising a first storage segment and a second storage segment, the first storage segment being a secure storage segment configured to store the at least one avionics software, and the second storage segment being configured to store media content, and loading, using a wireless network converter coupled to a wired legacy port, the at least one avionics software onto a target avionics system.

Weight management method and system for neural network processing, and neural network processor

The present invention relates to a weight management method and system for neural network processing. The method includes two stages, i.e., off-chip encryption stage and on-chip decryption stage: encrypting trained neural network weight data in advance, inputting the encrypted weight into a neural network processor chip, and decrypting the weight in real time by a decryption unit inside the neural network processor chip to perform related neural network calculation. The method and system realizes the protection of weight data without affecting the normal operation of a neural network processor.

Establishing a secure communication link

This disclosure is directed to devices, systems, and techniques for establishing a secure connection between two or more devices. In some examples, a device is configured for wireless communication. The device comprises signal reception circuitry configured to receive communications transmitted according to at least a first communication protocol, communication circuitry configured for wireless communication according to at least a second communication protocol, and processing circuitry electrically coupled to the signal reception circuitry and the communication circuitry. The processing circuitry is configured to receive, via the signal reception circuitry, a first signal according to the first communication protocol. In response to receiving the first signal, the processing circuitry is further configured to transmit, via the communication circuitry, a second signal according to the second communication protocol and establish a secure link according to the second communication protocol.

Apparatus and method for encryption and decryption based on tweak converter to which key table is applied

A method according to one embodiment includes generating one or more key tables based on a first seed value; generating one or more secret values from a tweak value based on the one or more key tables; and performing encryption or decryption using the one or more secret values. An apparatus according to one embodiment includes a key table generator configured to generate one or more key tables based on a first seed value, a secret value generator configured to generate one or more secret values from a tweak value based on the one or more key tables, and an encryptor/decryptor configured to perform encryption or decryption using the one or more secret values.

Intrusion defense system for a vehicle

An Intrusion Defense System for protecting the computer systems of a vehicle includes a vehicle having a computer with a direct wired or Radio frequency or other contact-less remote connection diagnosis connection port interface. A hardware device for protecting the computer from hazardous software code intrusions into the computer system. is used to protect the computer from unwanted hacks or intrusions into the system. The hardware device includes at least one or more of: a Diagnostic Port Gateway; a CAN Conditioner; and a CAN Data Security Diode and combinations of these.

CRYPTOGRAPHIC COMPUTING USING ENCRYPTED BASE ADDRESSES AND USED IN MULTI-TENANT ENVIRONMENTS

Technologies disclosed herein provide cryptographic computing with cryptographically encoded pointers in multi-tenant environments. An example method comprises executing, by a trusted runtime, first instructions to generate a first address key for a private memory region in the memory and generate a first cryptographically encoded pointer to the private memory region in the memory. Generating the first cryptographically encoded pointer includes storing first context information associated with the private memory region in first bits of the first cryptographically encoded pointer and performing a cryptographic algorithm on a slice of a first linear address of the private memory region based, at least in part, on the first address key and a first tweak, the first tweak including the first context information. The method further includes permitting a first tenant in the multi-tenant environment to access the first address key and the first cryptographically encoded pointer to the private memory region.

SECURE FILE TRANSFER

A method for secure file transmission comprises: encrypting a file using a location key system having multi-part keys; generating an identification for the encrypted file; transmitting the identification from a sender to a recipient; transmitting a public key from the recipient to the sender; generating, by M of N devices of a set of devices associated with the sender, its respective partial secret for the encrypted file and encrypting respective partial shared secrets with the public key; transmitting, by the sender, the encrypted file and encrypted partial shared secrets to the recipient; decrypting, by the recipient, the received encrypted partial shared secrets; combining the decrypted partial shared secrets with a threshold scheme; and decrypting the encrypted file using the combined secrets.

Secure computation device, secure computation method, program, and recording medium

A secure computation device obtains concealed information {M(i.sub.0, . . . , i.sub.S−1)} of a table M(i.sub.0, . . . , i.sub.S−1) having one-variable function values as its members. It is to be noted that M(i.sub.b, 0, . . . , i.sub.b, S−1) generated by substituting counter values i.sub.b, 0, . . . , i.sub.b, S−1 into the table M(i.sub.0, . . . , i.sub.S−1) represents a matrix M.sub.b, γ, μ, which is any one of M.sub.b, 2, 1, . . . , M.sub.b, 3, 2. The secure computation device obtains concealed information {M.sub.b, γ, μ} by secure computation using concealed information {i.sub.b, 0}, . . . , {i.sub.b, S−1} and the concealed information {M(i.sub.0, . . . , i.sub.S−1)}, and obtains concealed information {M.sub.b, Γ, MU} of a matrix M.sub.b, Γ, MU, which is obtained by execution of a remaining process including those processes among a process P.sub.j, 1, a process P.sub.j, 2, a process P.sub.j, 3, and a process P.sub.j, 4, that are performed subsequent to a process P.sub.γ, μ.