H04L9/302

DISTRIBUTED PRIVATE LOCATION VERIFICATION AND ENHANCEMENT
20220377561 · 2022-11-24 ·

Methods and devices for privately verifying and enhancing location data by a distributed ledger system are disclosed. A location-based services server receives a possible location of a mobile device. A location verification system determines a detected location of the mobile device. A distributed ledger system uses a private set intersection technique to determine whether the possible location corresponds to the detected location without the possible location or detected location being shared. Probabilities associated with the possible and detected locations can also be combined to enhance the accuracy of the possible location.

Detecting vulnerable encryption keys in network communication systems
11509471 · 2022-11-22 · ·

Techniques for determining whether a public encryption key is vulnerable as the result of deficiencies in pseudorandom number generation algorithms are provided. In some embodiments, a system may compile a database of cryptographic information received from a plurality of sources, including databases, and network traffic monitoring tools. RSA public keys extracted from the cryptographic information may be stored in an organized database in association with corresponding metadata. The system may construct a product tree from all unique collected RSA keys, and may then construct a remainder tree from the product tree, wherein each output remainder may be determined to be a greatest common divisor of one of the RSA keys against all other unique RSA keys in the database. The system may then use the greatest common divisors to factor one or more of the RSA keys and to determine that the factored keys are vulnerable to being compromised.

Low complexity conversion to Montgomery domain

Disclosed herein is an apparatus for calculating a cryptographic component R.sup.2 mod n for a cryptographic function, where n is a modulo number and R is a constant greater than n. The apparatus comprises a processor configured to set a start value to be equal to R mod n, perform b iterations of a shift and subtract operation on the start value to produce a base value, wherein the start value is set to be equal to the base value after each iteration, set a multiplication operand to be equal to the base value, and perform k iterations of a Montgomery modular multiplication of the multiplication operand with the multiplication operand to produce an intermediate result, wherein the multiplication operand is set to be equal to the intermediate result after each iteration, wherein the shift and subtract operation comprises determining a shifted start value which is equivalent to the start value multiplied by two, and subtracting n from the shifted start value if the shifted start value is greater than or equal to n.

TRANSMITTER FOR TRANSMITTING A SECURE ACCESS SIGNAL
20230099358 · 2023-03-30 ·

A transmitter for transmitting a secure access signal to a system for providing secure access to a controlled item is disclosed. The access is dependent on information contained in the secure access signal. The transmitter comprises a biometric sensor for receiving a biometric signal and a processor for matching the biometric signal against members of a database of biometric signatures. The transmitter comprises enabling means for enabling an inductive circuit, based on the matching of the biometric signal, to transmit the secure access signal conveying the information to the system upon the inductive circuit being placed within range of a radio frequency field emitted by the system.

System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
11574379 · 2023-02-07 · ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

Simplified Wi-Fi and/or cloud enrollment for Wi-Fi devices

A wireless enabled lighting device having the ability to retrieve credentials for a primary wireless LAN from another previously configured wireless enabled lighting device is disclosed. After installation, the lighting device may be instructed to join a secondary wireless network temporarily provided by the previously configured lighting device. Once connected to the secondary wireless network, the lighting device may be provided the credentials for the primary wireless LAN from the previously installed device. The lighting device may then join the primary wireless LAN based on the provided credentials and may automatically initiate enrollment with a remote cloud service. After enrollment, the lighting device may be instructed to operate as an access point for the secondary wireless network, thereby allowing a subsequently installed lighting device to retrieve the credentials for the primary wireless LAN from the newly enrolled lighting device.

SQL EXTENSION TO KEY TRANSFER SYSTEM WITH AUTHENTICITY, CONFIDENTIALITY, AND INTEGRITY
20230099755 · 2023-03-30 ·

Disclosed herein are various embodiments an SQL extension to key transfer system with authenticity, confidentiality, and integrity. An embodiment operates by generating a key pair including both a target public key and a target private key. The target public key is provided to a source database server, wherein the source database server includes a source secret for unencrypting encrypted data accessible to the target database server. A source public key generated by the source database server and a digital signature signed with a source private key generated by is received from the source database server including an encrypted version of the source secret. The digital signature is verified as being valid. The encrypted version of the source secret is unencrypted using the target private key and the source secret is used to access the encrypted data.

DETECTING VULNERABLE ENCRYPTION KEYS IN NETWORK COMMUNICATION SYSTEMS
20230086951 · 2023-03-23 · ·

Techniques for determining whether a public encryption key is vulnerable as the result of deficiencies in pseudorandom number generation algorithms are provided. In some embodiments, a system may compile a database of cryptographic information received from a plurality of sources, including databases, and network traffic monitoring tools. RSA public keys extracted from the cryptographic information may be stored in an organized database in association with corresponding metadata. The system may construct a product tree from all unique collected RSA keys, and may then construct a remainder tree from the product tree, wherein each output remainder may be determined to be a greatest common divisor of one of the RSA keys against all other unique RSA keys in the database. The system may then use the greatest common divisors to factor one or more of the RSA keys and to determine that the factored keys are vulnerable to being compromised.

HETEROGENEOUS PROCESSING SYSTEM FOR FEDERATED LEARNING AND PRIVACY-PRESERVING COMPUTATION
20230088897 · 2023-03-23 ·

A heterogeneous processing system for federated learning and privacy-preserving computation, including: a serial subsystem configured for distributing processing tasks and configuration information of processing tasks, the processing task indicating performing an operation corresponding to computing mode on one or more operands; and a parallel subsystem configured for, based on the configuration information, selectively obtaining at least one operand of the one or more operands from an intermediate result section on the parallel subsystem while obtaining remaining operand(s) of the one or more operands with respect to the at least one operand from the serial subsystem, and performing the operation on the operands obtained based on the configuration information.

CENTRALIZED DATABASE WITH PROVISIONS TO PREVENT PKI KEY AND SECURITY CERTIFICATE DUPLICATION

A system and method for preventing use of invalid digital certificates is disclosed. The method comprises receiving, in a validation service from a requesting entity, a cryptographic asset and a request to evaluate the cryptographic asset, the cryptographic asset uniquely assigned to one of the plurality of devices by an associated one of the commercially distinct entities, the request comprising the cryptographic asset, determining an evaluation state of the cryptographic asset at least in part from a database derived from a plurality of public keys currently assigned to the plurality of devices and previously received by the validation service, determining a disposition of the cryptographic asset according to a disposition policy associated with the determined evaluation state and the device and effecting the determined disposition of the cryptographic asset.