H04L9/0819

VALIDATING USING AN OFFLOAD DEVICE SECURITY COMPONENT

Generally described, physical computing devices in a virtual network can be configured to host a number of virtual machine instances. The physical computing devices can be operably coupled with offload devices. In accordance with an aspect of the present disclosure, a security component can be incorporated into an offload device. The security component can be a physical device including a microprocessor and storage. The security component can include a set of instructions configured to validate an operational configuration of the offload device or the physical computing device to establish that they are configured in accordance with a secure or trusted configuration. In one example, a first security component on the offload device can validate the operational computing environment on the offload device and a second security component on the physical computing device can validate the operational computing environment on the physical computing device.

Compressing websites for fast data transfers

A system encodes/compresses at least some portion of website data and transmits the encoded website data to a remote user. A storage device stores original website data representing an original webpage. Retrieval logic retrieves the original website data from the storage device. The retrieval may be responsive to a request from an electronic user device. A parser parses the original website data to detect and tag at least one type of website code within the website data. An encoder encodes the tagged website data and produces encoded website data representing the original website data. A transmitter transmits the encoded website data to the electronic user device. The electronic user device has previously been provided a decoder from the system to decode the encoded website data to recover the original website data. This allows the electronic user device to display the website on the electronic user device.

Method and device for managing a pairing request of a first device with a second device
20230239145 · 2023-07-27 ·

A method for managing a request to pair a first item of equipment with a second item of equipment is implemented by a device for managing a pairing request. The managing device is configured to communicate with the first item of equipment via an optical communication channel. The managing method includes: reception, via the optical communication channel, of a pairing request including data representative of the identity of the first item of equipment; and if the pairing request is authorized, transmission, via the optical communication channel, of a security key to the first item of equipment to be used during communications between the first item of equipment and the second item of equipment once the items of equipment have been paired.

System and Method for Providing Digital Content

A method of electronically displaying glyphs. The method includes receiving a glyph spacing, moving a first glyph toward a second glyph along an axis, identifying an intersection of a first axis coordinate of the first glyph with a second axis coordinate of the second glyph, and moving at least one of the glyphs along the axis to separate the first and second axis coordinates of the respective first and second glyphs by the glyph spacing.

DATA PROCESSING PERMITS SYSTEM WITH KEYS

Methods, systems, and devices for data processing are described. Some systems may support data processing permits and cryptographic techniques tying user consent to data handling. By tying user consent to data handling, the systems may comply with data regulations on a technical level and efficiently update to handle changing data regulations and/or regulations across different jurisdictions. For example, the system may maintain a set of data processing permits indicating user consent for the system to use a user's data for particular data processes. The system may encrypt the user's data using a cryptographic key (e.g., a cryptographic nonce) and may encrypt the nonce using permit keys for any permits applicable to that data. In this way, to access a user's data for a data process, the system may first verify that a relevant permit indicates that the user complies with the requested process prior to decrypting the user's data.

SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK
20230237167 · 2023-07-27 · ·

A cloud-based system for securely storing data, the system having a processor which obtains a source data file; splits it into at least three fragments; and uses an encryption key associated with the fragments to encrypt the fragments and distributes the encrypted fragments among at least three cloud storage providers, creates a pointer file containing information for retrieving the encrypted fragments. When a system user requests access to the data, the system uses the information stored in the pointer file to retrieve the stored encrypted fragments from the plurality of clouds; decrypts the fragments and reconstructs the data, and provides data access to the system user.

CONNECTED SECURE KEY REDISTRIBUTION SYSTEM AND METHOD
20230006817 · 2023-01-05 ·

In one embodiment, a method for securely distributing secret keys for hardware devices is disclosed. A distributor server transmits to a provider server an order for hardware devices. Each hardware device has a unique identifier and at least one secret key for authentication. The provider server sends a database associated with the distributor, for each of the hardware devices, the unique identifier and an unencrypted version of the at least one secret key. In response to an order received by the distributor from a customer for a portion of the hardware devices, the distributor server provides the database the unique identifiers and an associated customer order identifier, and the distributor server provides a customer server the unique identifiers. In response to the customer providing order information, the database provides the customer the unencrypted keys for the hardware devices to enable authentication.

CACHING AND DELIVERING MEDIA CONTENT FROM MULTIPLE STREAMING PROVIDERS
20230006810 · 2023-01-05 ·

In a system and method for distribution of media content, a cable provider gateway cooperates with a broker API, one or more streaming provider gateways, and one or more streaming applications to locally cache and display media content from the streaming provider gateways even when the streaming applications do not have connectivity to their gateways.

APPARATUS AND METHOD FOR GENERATING SECRET KEY, APPARATUS AND METHOD FOR GENERATING EVALUATION KEY
20230239143 · 2023-07-27 ·

In a method of generating a secret key according to an embodiment, a share of each of a user and a plurality of other users for a secret key of the user are generated, the share of each of the plurality of other users is provided to a user terminal of each of the plurality of other users, a share of the user for a secret key of each of the plurality of other users is received from the user terminal of each of the plurality of other users, and a new secret key of the user is generated using the share of the user for the secret key of the user and the shares of the user for the secret key of each of the plurality of other users.

Configurable device for lattice-based cryptography

Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.