Patent classifications
H04L9/0869
DATA TRANSMISSION METHOD, APPARATUS, AND SYSTEM, COMPUTER DEVICE, AND STORAGE MEDIUM
A data transmission method, apparatus, and system, a computer device, and a storage medium. The method includes: performing two-way authentication with a first interaction device; receiving encrypted interaction data obtained by encrypting interaction data based on a working key and transmitted by the first interaction device, after the two-way authentication is completed, the working key being obtained by the first interaction device by mapping an authentication key used in the two-way authentication; decrypting the encrypted interaction data according to the working key obtained by mapping the authentication key on the communication adapter; transmitting interaction data obtained through the decryption to a second interaction device through a simulated device node identifiable by the second interaction device and based on a communication protocol of the second interaction device that is natively adapted to the device node.
MESSAGE CHAIN-BASED CAN SECURITY SYTEM AND METHOD WITH HASH FUNCTION
There is provided a message chain-based CAN security system with a hash function, including: a hash value generating unit generating a hash value H.sub.(r,ID,i)/H′.sub.(r,ID,i) using a received Hash Reset Key HRK.sub.r and ID to be transmitted or received by the system when an arbitrary node transmits the HRK.sub.r; a CAN message transmitting unit transmitting a CAN message including the hash value H.sub.(r,ID,i)/H′.sub.(r,ID,i); a validity determining unit determining whether H.sub.(r,ID,i) of a CAN message received by a node which has received the CAN message matches a value held by the system; a message receiving and executing unit allowing message reception and executing a command when the validity determining unit determines that the CAN message is valid; and a warning transmitting unit transmitting an intruder detection warning.
Enhanced secure encryption and decryption system
Methods are described for a data creator to securely send a data payload to another device in a transient symmetric key technology (TSKT) system, and for the other device to securely receive the payload data. One method includes receiving a first seed and a formula from a command and control server. A second seed is generated, and the first seed and the second seed are combined using the formula to create a data seed. A first key is generated using the first seed, and the second seed is encrypted using the first key to form an encrypted second seed. A second key is generated using the data seed, and the data payload is encrypted using the second key to form an encrypted data payload. The encrypted data payload and the encrypted second seed are combined in a secure container, and subsequently all keys and seeds and the formula are destroyed.
Blockchain system for hardening quantum computing security
A blockchain-based message transmission is provided. The system may include a plurality of silicon-based devices encapsulated in quantum cases. Each quantum case may include a quantum random number generator and a public key. The quantum random number generator may generate quantum-resilient random numbers to be used as private keys. The system may include a private network. The private network may include a subset of system's devices. A first device, included in the private network, may transmit a message to a second device included in the private network. A first quantum case that encapsulates the first device may intercept the message, generate a private key, encrypt the message using the private key, generate a data transaction block that includes message metadata, upload the data transaction block to a system blockchain and transmit the message to the recipient upon receipt of an approval from a majority of devices.
Data scramblers with enhanced physical security
Devices, systems and methods for improving reliability and security of a memory system are described. An example method includes receiving a seed value and a data stream, generating, based on the seed and using a physical unclonable function (PUF) generator, a PUF data pattern, generating, based on the seed, a pseudo-random data pattern, performing a first logic operation on the PUF data pattern and the data stream to generate a result of the first logic operation as a first data sequence, and performing a second logic operation on the pseudo-random data pattern and a second data sequence that is based on the first data sequence to generate a result of the second logic operation as a third data sequence for storage on the memory system, wherein the PUF generator is selected at least in-part based on one or more physical characteristics of the memory system.
METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING AND READING AND WRITING MESSAGES, COMPUTER DEVICE, AND STORAGE MEDIUM
A method for encrypting messages is provided. The method for encrypting messages includes: generating a seed; generating a mask based on the seed; generating a masked message by masking an original message using the mask; acquiring a target message by performing white box encryption on the masked message; and disclosing the target message and the seed.
METHOD AND APPARATUS FOR VERTICAL FEDERATED LEARNING
This disclosure relates to a method for vertical federated learning. In multiple participation nodes deployed in a multi-way tree topology, an upper-layer participation node corresponds to k lower-layer participation nodes. After the upper-layer participation node and the k lower-layer participation nodes exchange public keys with each other, the upper-layer participation node performs secure two-party joint computation with the lower-layer participation nodes with a first public key and second public keys as encryption parameters to obtain k two-party joint outputs of a federated model. Further, the upper-layer participation node aggregates the k two-party joint outputs to obtain a first joint model output corresponding to the federated model. As such, a multi-way tree topology deployment-based vertical federated learning architecture is provided, improving the equality of each participation node in a vertical federated learning process.
Voice Payment Method and Electronic Device
A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.
DETERMINISTIC CHAOS-BASED QUANTUM COMPUTER RESISTANT DATA ENCRYPTION FOR LARGE SCALE WIDE AREA NETWORK SOLUTIONS
A computer-implemented method can include: constructing and initializing Pseudo Random Generator Resources using a multiplicity of secret seed values or secret data values known to a first and second communication device; deriving a session key based, at least in part, on the secret seed, secret data values, Multi-Factor Authentication methods, or Pseudo Random Number Generator Resource generated output; receiving from the first communications device, at the second communications device, data encrypted with the session key or Deterministic Chaos obfuscation methods; and decrypting the data at the second communications device using the session key or Deterministic Chaos de-obfuscation methods.
COMPUTER-BASED SYSTEMS CONFIGURED FOR AUTHENTICATING BASED ON GENERATED VIRTUAL TOKENS AND METHODS OF USE THEREOF
A method receiving an electronic data modification instruction of a virtual record modification to cause at least one data modification to at least one attribute of a virtual record data structure; determining at least one user record associated with the virtual record; determining at least one record modification preference associated with the at least one user record on the at least one modification condition; utilizing a record-specific modification machine learning model to predict at least one record-specific modification in response to the virtual record modification based on the one modification condition and the one record modification preference; generating an authorization instruction to authorize the electronic data modification instruction to cause the modification by instructing at least one database management system to modify the user record according to the record-specific modification; and instructing a computing device to display the record-specific modification to the at least one user record.