H04L9/0866

METHOD FOR PERFORMING MULTIPLE ENROLLMENTS OF A PHYSICALLY UNCLONEABLE FUNCTION

A data processing system having a PUF and method for providing multiple enrollments, or instantiations, of the PUF are provided. A PUF segment includes a plurality of SRAM cells on an integrated circuit. A PUF response from the PUF segment is used to create a first activation code and a first PUF key. A second PUF key may be created from the PUF response. Initially, during a second enrollment, the PUF response is combined with the first activation code to reproduce a codeword. The first secret string is reconstructed by encoding the codeword. The codeword is combined with the first activation code to reproduce the PUF response. Inverse anti-aging is applied to the PUF response. Then a second secret string is generated using a random number generator (RNG). The second secret string is encoded to produce a new codeword. The new codeword is combined with the recovered PUF response to create a second activation code. The second activation coded is hashed with the second secret string to provide a second PUF key.

System and methods for computation, storage, and consensus in distributed systems
11711220 · 2023-07-25 · ·

From the enterprise cloud to robot swarms, distributed systems are everywhere. However, because these systems are realized through the careful coupling of disparate technologies (e.g., databases, messaging systems, and application runtimes), they are difficult to create and maintain—even for experienced engineers. This is a problem because the engineers of these systems have to work harder, be better trained, and thus cost more to employ, making it harder to create new products and inventions. A solution herein is a Data Backbone that provides a single medium for processing, storing, and sharing data in near-real-time. By combining these features into a single medium, the Data Backbone consolidates the functionality of several disparate tools into one system.

BREAKDOWN-BASED PHYSICAL UNCLONABLE FUNCTION

A device and a method for implementing a physically unclonable function is disclosed. In one aspect, the device includes at least one electronic structure including a dielectric. A conductive path is formed at a random position through the dielectric due to an electrical breakdown of the dielectric, or the electronic structure is adapted for generating an electrical breakdown of the dielectric such that the conductive path is formed through the dielectric at a random position. The at least one electronic structure is adapted for determining a distinct value of a set comprising at least two predetermined values. The distinct value is determined by the position of the conductive path through the dielectric.

Electronic device and control method thereof

Disclosed is an electronic device. The electronic device includes a communicator comprising communication circuitry and a processor, the processor is configured to control the communicator to perform communication with an external device based on identifying that a strength of a signal received from an external device is equal to or greater than a predetermined threshold value, and after converting an electronic device to a low power mode, based on identifying that a strength of a signal received from an external device being within a first range, to control the electronic device to perform a secure pairing operation.

CRYPTOGRAPHY METHOD
20180013558 · 2018-01-11 · ·

The embodiments provide cryptography that is performed in each of two communicating devices and is based on information known only to the devices. The information is determined in each of the devices at the time of communications. Each of the devices determines the information without communicating key information related to the encryption key with each other. Channel characteristic reciprocity between the two devices allows creation of identical keys in each device. Each of the devices sends a first setup signal to the other device, receives a second setup signal from the other device, where the second setup signal may be a looped back version of the first setup signal, samples the second setup generates sampling results, creates a key based on the sampling results, and utilizes the key to exchange one or more secure data signals with the other device.

CRYPTOGRAPHY USING RF POWER MEASUREMENT
20180013553 · 2018-01-11 · ·

The embodiments provide a cryptography key for two communicating devices that is based on information known only to the devices. The information may only be determined by the devices. Each device determines the information without communicating key information related to the encryption key with the other. Channel characteristic reciprocity between the devices allows creation of identical keys in each device. Each device sends a signal to the other device at the same power level based on the distance between the devices. The power level may be set to result in a target receive power level at the other device. Each device samples the received signal, generates sampling results, creates a key based on the sampling results and a threshold power level, and utilizes the key. The threshold power level may be based on the target receive power level, or a median power determined from the sampling results.

SECURE COMMUNICATION OF USER DEVICE DATA

A method for facilitating secure communication between a user device and a network device. Encrypted data from a user device is received at the network device. The encrypted data is encrypted based on first physiological data captured by a first sensor of the user device. The first physiological data is representative of a physiological characteristic of a user of the user device. A second sensor of the network device captures second physiological data representative of the physiological characteristic of the user. A common key for encrypting further data transferred between the user device and the network device is determined, based on the encrypted data and the second physiological data. Further aspects relate to other methods for facilitating secure communication between a user and network device, a network, and a method of operating a network.

SYSTEMS AND METHODS FOR CONNECTING PRIVATE DEVICES TO PUBLIC DEVICES ACCORDING TO CONNECTION PARAMETERS
20230006985 · 2023-01-05 ·

Systems and methods for connecting a private device to a public device based on various connection parameters. For example, a media guidance application may receive a communication requesting to use the public device from a private device that is implementing a private interface application (e.g., Netflix™ a streaming media application). In response, the media guidance application may generate an authorization key that is unique to the private device and comprises connection parameters. The media guidance application may transmit the authorization key to the private interface application to initiate a session between the public device and the private device. Whenever a command is received from the private device, the media guidance application may verify the authorization key and determine whether the connection parameters are satisfied. In response to verifying the authorization key and the connection parameters, the public device may execute the received command.

DYNAMIC ENCRYPTION AND DECRYPTION METHOD AMONG LOCK CONTROL SYSTEM MODULES, MULTIPLE AUTHENTICATION LOCK CONTROL SYSTEM, LOCK CONTROL METHOD AND STRONGBOX
20230006822 · 2023-01-05 ·

Dynamic encryption and decryption method among lock control system modules comprise the following steps: step 1. filling hardware ID data, an unlocking communication protocol and a mask variable into an array according to a predefined variable space, and encrypting the array based on the mask variable to obtain an encrypted array; step 2. decrypting the encrypted array based on the mask variable to obtain a decrypted array, executing data division on the decrypted array according to the predefined variable space, matching the divided data with data recorded in advance one by one, and if the divided data are consistent with the data recorded in advance, executing related operations according to the decrypted unlocking communication protocol content; otherwise, executing no operation.

LIGHTWEIGHT DISTRIBUTED SIGNATURE PROTOCOL FOR MOBILE COMPUTING AND IOT DEVICES
20230006811 · 2023-01-05 ·

The techniques described herein may provide an efficient and secure two-party distributed signing protocol, for example, for the IEEE P1363 standard. For example, in an embodiment, method may comprise generating, at a key generation center, a first partial private cryptographic key for a user ID and a second partial private cryptographic key for the user ID, transmitting the first partial private cryptographic key to a first other device, transmitting the second partial private cryptographic key to a second other device, and generating a distributed cryptographic signature for a message using the first partial private cryptographic key and the second partial private cryptographic key.