H04L9/0872

STORAGE APPARATUS, STORAGE METHOD, AND COMPUTER-READABLE STORAGE MEDIUM
20230216672 · 2023-07-06 ·

A storage apparatus includes a biological sensor configured to detect biological information on a user, an image acquisition unit configured to acquire, from an image capturing unit, an image that is captured around the user, an image processing unit configured to separate the image around the user into a line-of-sight direction image related to an image in a line-of-sight direction of the user and a peripheral image related to an image other than the line-of-sight direction image, an encryption unit configured to generate an encryption key for encrypting the line-of-sight direction image based on the biological information on the user, and encrypts the line-of-sight direction image by using the encryption key, and a storage control unit configured to store the line-of-sight direction image that is encrypted by the encryption unit in a storage unit.

Decoupled custom event system based on ephemeral tokens for enabling secure custom services on a digital audio stream

A method comprises receiving a session identifier from a streaming system that identifies a user session with the streaming system. The method further includes receiving a first message from a streaming system that is based on a token that is generated based on a combination of the session identifier and a timestamp at which an insertable content item was presented to the user in a content stream by the streaming system. The first message is decrypted using a plurality of timestamps that are within a range of a current time. An identifier is determined for the insertable content item based on the decrypted message. A second message is transmitted to an enabling system, the message including instructions for execution by the enabling system to execute one or more operations with the identified insertable content item.

Generation of a multi-user contextual portfolio of private keys and use of such a portfolio

A method of generating a hierarchical deterministic keys portfolio, in particular to sign transactions sent to a blockchain. The generation method includes an initialization phase by an administrator and a phase of setting parameters for at least one user. Private key usage contexts are created from the administrator account, each context specifying conditions for use of the private key in said context. User accounts are also created, each user account being associated with a private key in the tree structure, the private key of said user being obtained from a master private key of the administrator, the usage context to which the user account is attached, and the user's identifier.

APPROACHES OF PERFORMING DATA PROCESSING WHILE MAINTAINING SECURITY OF ENCRYPTED DATA
20220414234 · 2022-12-29 ·

Systems and methods are provided for receiving encrypted data from a second computing system and instantiating the computing system to process the encrypted data. The instantiation includes decrypting the encrypted data using a private key, performing an operation on the decrypted data, presenting an output indicating a result of the operation on the decrypted data, and re-encrypting the decrypted data. After the data is re-encrypted, the data is transmitted to the second computing system or a third computing system.

MUTUAL AUTHENTICATION BETWEEN A HARDWARE TOKEN AND NON-NETWORKED DEVICE
20220417022 · 2022-12-29 · ·

Systems and methods for performing mutual authentication between a hardware access token and a reader device are provided. The systems and methods include reading a unique or pseudo-unique identifier of the hardware access token and computing a password for the hardware access token based on the unique or pseudo-unique identifier and a group secret of the reader device.

Time-based encryption key derivation
11539518 · 2022-12-27 ·

Techniques are disclosed securely communicating traffic over a network. In some embodiments, an apparatus includes a first circuit having a local clock configured to maintain a local time value. The first circuit is configured to determine a synchronized time value based on the local time value, the synchronized time value being an expected time value of a reference clock. The first circuit is further configured to generate a first encryption key by calculating a key derivation function based on the synchronized time value and encrypt a portion of a packet using the first encryption key, the portion of the packet being to be communicated to a second circuit. In some embodiments, the apparatus further includes a first network node coupled to the first circuit and configured to communicate the packet to a second network node coupled to the second circuit and to include the synchronized time value in the packet.

Computer-implemented system and method for highly secure, high speed encryption and transmission of data
11528127 · 2022-12-13 · ·

The present disclosure relates to highly secure, high speed encryption methodologies suitable for applications such as media streaming, streamed virtual private network (VPN) services, large file transfers and the like. For example, encryption methodologies as described herein can provide stream ciphers for streaming data from, for example, a media service provider to a plurality of users. Certain configurations provide wire speed single use encryption. The methodologies as described herein are suited for use with blockchain (e.g. Bitcoin) technologies.

Transmitting device and transmitting method, and receiving device and receiving method

The present disclosure relates to a transmitting device and a transmitting method, and a receiving device and a receiving method which are capable of improving confidentiality and communication resistance in low power wide area (LPWA) communication. The transmitting device generates a key stream on the basis of GPS time information, encrypts transmitted data on the basis of the key stream to generate encrypted data, and transmits the encrypted data to the receiving device. The receiving device generates a key stream on the basis of GPS time information and decodes the encrypted data into the transmitted data on the basis of the key stream. The present disclosure can be applied to an LPWA communication system.

SECURITY MECHANISM FOR WIRELESS AUTHENTICATION DEVICES

Location-based validation of a wireless authentication device. A request is received by a security hardware computing device for an action requiring authentication in connection with security hardware. A security hardware location is received or accessed. A wireless authentication device location of a wireless authentication device in possession of a requester is received by security hardware computing device. The security hardware computing device receives a mobile device location for a mobile device in possession of the requester. The security hardware computing device determines whether the security hardware location, the mobile device location, and the wireless authentication device location are in a proximity. The security hardware computing device performs the action requiring authentication in connection with the security hardware.

Access control system

An access control system which relies at least in part on a non-networked path for permitting an entity access to a secured location; the entity identified by the system by means of a unique entity identifier accorded the entity; entry to said secured location secured by a barrier; said barrier identified by the system by means of a unique barrier identifier accorded the barrier; said system including a local access unit located local to the barrier; said system including a barrier controller for actuation of the barrier; said local access unit issuing an open signal to the barrier controller whereby the barrier permits the entity access to the secured location if and only if data contained in a token communicated from an un-trusted communications device to the local access unit is verified by the local access unit with respect to at least a first parameter by the local access unit.