H04L9/0819

Inter-application delegated authentication
11539698 · 2022-12-27 · ·

Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application.

Time-based encryption key derivation
11539518 · 2022-12-27 ·

Techniques are disclosed securely communicating traffic over a network. In some embodiments, an apparatus includes a first circuit having a local clock configured to maintain a local time value. The first circuit is configured to determine a synchronized time value based on the local time value, the synchronized time value being an expected time value of a reference clock. The first circuit is further configured to generate a first encryption key by calculating a key derivation function based on the synchronized time value and encrypt a portion of a packet using the first encryption key, the portion of the packet being to be communicated to a second circuit. In some embodiments, the apparatus further includes a first network node coupled to the first circuit and configured to communicate the packet to a second network node coupled to the second circuit and to include the synchronized time value in the packet.

Method and system for securing data using random bits and encoded key data

Methods and systems for securing data using random bits and encoded key data. A plurality of true random number generator (TRNG) disks and a plurality of key data sets are provided. A key data set from the plurality of key data sets is associated with each of the plurality of TRNG disks, respectively. The key data set comprises at least a block of random bits of an associated TRNG disk. An encoded key data set is formed by encoding at least two of the key data sets together. The source data can be encrypted with the encoded key data set to produce a quantity of encrypted data. The encrypted data can be decrypted with the encoded key data set or the at least two of the key data sets retrieved from the associated TRNG disks.

Decryption of encrypted network traffic using an inline network traffic monitor
11539755 · 2022-12-27 · ·

An inline network traffic monitor is deployed inline between two endpoints of a computer network. A particular endpoint of the two endpoints works in conjunction with the inline network traffic monitor to decrypt encrypted network traffic transmitted between the two endpoints. A series of Change Cipher Spec (CCS) messages is exchanged between the inline network traffic monitor and the particular endpoint during a Transport Layer Security (TLS) handshake between the two endpoints. The series of CCS messages allows the particular endpoint and the inline network traffic monitor to detect each other on the computer network. After detecting each other's presence, the particular endpoint sends the inline network traffic monitor a session key that is used by the two endpoints to encrypt their network traffic. The inline network traffic monitor uses the session key to decrypt encrypted data of the network traffic transmitted between the two endpoints.

SMART BATTERY, CHARGER AND BATTERY CHARGING SYSTEM
20220407319 · 2022-12-22 ·

In a battery charging system (100), a charger (110) and a smart battery (160) enhance safety in recharging a cell (180) in the smart battery (160) by a power supply (130) of the charger (110). The smart battery (160) is communicable with the charger (110). If a communication failure occurs, the charger (110) disconnects the power supply (130) from the smart battery (160). The smart battery (160) and the charger (110) share the same symmetric encryption key for encrypting and decrypting message data, allowing one party to determine if the other part is an authentic one. When the smart battery (160) finds that the charger (110) is not authentic, or vice versa, the power supply (130) and the cell (180) are disconnected. When the smart battery (160) finds that a no-charging condition occurs due to abnormality in the cell (180), the smart battery (160) requests the charger (110) to stop charging, and also disconnects the cell (180) from the charger (110) even if the charger (110) fails to stop charging the smart battery (160).

SYSTEM AND METHOD FOR GENERATING AND DISTRIBUTING WEB FORM FOR COLLECTING DATA

The present disclosure describes method and system for generating and distributing a web form for securely collecting data. The system provides an interactive and visualized tool to add, edit, distribute web form and collect and analyze one or more response to the web form. Users of the system may edit the forms in a way that what you see is what you get. The system also automatically generates the data structure that can be easily transferred to and stored in the database, which only require minimal input from the user in terms of the data structure. The stored web form and the received responses are encrypted so as to be only available to the user. In some aspects, the system manages all the projects and workflow and allows for real time monitoring of this process through dashboard.

COMPUTER NETWORK APPARATUS
20220407717 · 2022-12-22 · ·

A system may include at least one hardware processor implementing a verification unit configured to: receive a set of data from a first computer network; transmit an encrypted version of the set of data to a destination within a second computer network; receive a signature associated with the set of data from the first computer network; verify that the signature is indicative of the set of data being from a known source; and in response to verification of the signature, transmit a decryption key associated with the encrypted version of the set of data to the destination, wherein the destination is configured to decrypt the set of data with the decryption key.

Methods of decrypting disk images, and decryption-enabling devices
11531771 · 2022-12-20 · ·

A decryption-enabling device for decrypting a disk image of a computer device, comprising a processor, memory and a hardware connector for connecting to the hardware interface connection of the computer device. The decryption-enabling device is arranged to create using the processor a copy of the random-access memory of the computer device, analyse using the processor the copy of the random-access memory to extract one or more potential decryption keys, and store the one or more potential decryption keys in the memory.

Method for controlling distribution of a product in a computer network and system
11533166 · 2022-12-20 · ·

A method for controlling distribution of a product in a computer network is provided, comprising: providing a computer network having a plurality of processing devices each comprising one or more processors and a storage; and providing keys for asymmetric cryptography in the computer network. In a first data processing device assigned to the manufacturer in the computer network, the following is provided: generating a matrix code by encoding first electronic information comprising the private product key; providing the public product key, the public manufacturer key, and the private manufacturer key; generating a first transaction assigned to the product, a first transaction content of the first transaction comprising the public product key, and the public manufacturer key; and signing the first transaction with both the private product key and the private manufacturer key. Imprint data are provided for imprinting an imprint of the matrix code on the product. Further, a system is provided.

Processing of requests

An example operation may include one or more of receiving, by a node, a request for a transport, determining, by the node, an availability of the requested transport, responsive to the availability, broadcasting the request including a suggested value to a plurality of nodes, receiving agreements from the plurality of the nodes, and recording a completed request on a remote storage.