Patent classifications
H04L9/0656
SECURING DATA IN A BLOCKCHAIN WITH A ONE-TIME PAD
A system that generates a blockchain for a user wherein each block in the chain contains encrypted information associated with the user. The information in each block is encrypted and decrypted by a key that is generated based on a function, a starting point and a length that is shared with participants that have access to the data in each block. The access can be controlled with granularity by the owner of the information without having cumbersome passkey management.
Comprehensive framework for protecting intellectual property in the semiconductor industry
Methods and integrated circuit architectures for assuring the protection of intellectual property between third party IP providers, system designers (e.g., SoC designers), fabrication entities, and assembly entities are provided. Novel design flows for the prevention of IP overuse, IP piracy, and IC overproduction are also provided. A comprehensive framework for forward trust between 3PIP vendors, SoC design houses, fabrication entities, and assembly entities can be achieved, and the unwanted modification of IP can be prevented.
CRYPTOGRAPHIC SYSTEMS AND METHODS FOR MAINTENANCE OF POOLS OF RANDOM NUMBERS
Systems and methods include a random number pool where one or more sets of key data elements of the random number pool are transmitted and added or replaced with another set of key data elements.
Secure content routing using one-time pads
A method comprising receiving, by a one-time pad (OTP) hub, from a first user of a computer network, a communication encrypted with an OTP associated with said first user, wherein said communication is intended for a second user; encrypting, by said hub, said communication with an OTP associated with said second user; decrypting, by said hub, said communication with an OTP associated with said first user; and delivering said communication to said second user.
COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
According to an embodiment, a communication device includes one or more processors. The processors share encryption keys with a plurality of external communication devices. The processors, based on residual quantities of the encryption keys, decide on a route for sending transmission data. The processors encrypt, for each external communication device of one or more external communication devices included in the route, a header in which the external communication device is set as a destination, using an encryption key shared with the external communication device. The processors generate a packet that includes the transmission data and encrypted headers for the one or more external communication devices. The processors send the generated packet along the route.
BLOCKCHAIN DATA ACCESS AUTHORIZATION METHOD, APPARATUS, AND DEVICE
A method for authorizing a blockchain data access on a blockchain platform includes: obtaining from a third-party institution a data access request containing a user ID of data access, a data scope, and a random number of a signature, which is generated by the third-party institution after receiving a random number sent by a client terminal and signing on the received random number; performing a verification on the random number of the signature and the data scope; and after the verification is passed, sending data ciphertext corresponding to the user ID to the third-party institution, such that the third-party institution decrypts the data ciphertext using a data secret key sent by the client terminal.
YES AND NO SECRET SHARING WITH HIDDEN ACCESS STRUCTURES
A secret sharing scheme with yes and no shares and having a hidden access structure. The secret sharing scheme may include share generation in which yes shares and no shares are generated for, and distributed to, each party in the secret sharing scheme. In turn, upon an attempt to reconstruct the secret, participants in the reconstruction each provide a share, which is unknown to be a yes share or a no share to the other participants. The secret is only reconstructable if the shares used in the reconstruction include yes shares of a minimal authorized subset of the parties. However, prior to secret reconstruction, the access structure remains hidden and the participants in a reconstruction are unaware of the character of the shares provided by other participants in the reconstruction attempt.
Methods and systems for secure command, control, and communications
In some aspects, an apparatus for encoding data for delivery to or for decoding data retrieved from a storage medium comprises a memory device and at least one hardware processor. The memory device is configured to store at least one parameter associated with at least one cryptographic protocol, the at least one parameter comprising one or more of a first cryptographic scheme, a first cryptographic key operation, a first cryptographic key length, and first cipher directives. The hardware processor is configured to generate a first frame comprising a first field for one parameter selected from the first cryptographic scheme, the first cryptographic key operation, the first cryptographic key length, and the first cipher directives and excluding fields for non-selected parameters, wherein the first frame is associated with the data delivered to or retrieved from the storage medium.
Use Of Gradient Decent Function In Cryptography
A method of encrypting and decrypting multiple individual pieces or sets of data in which a computing device randomly selects a group of seeds that it then uses to generate irrational numbers. Sections of the generated irrational numbers can be used as one-time pads or keys to encrypt the corresponding data sets. Intended recipients can then reverse the process using their allowed keys to access data for which they have authorization.
Use Of Random Entropy In Cryptography
A system that uses a computing device to encrypt data by obtaining multiple series of random numbers, and then time-correlating these series to form a series of composite elements. By selecting a section of the series of composite elements, the computing device can obtain a key for encrypting data.