Patent classifications
H04L63/0442
Authentication system and authentication method
An authentication system and an authentication method are provided. The electronic device of the authentication system includes a controller, a processor and a key module, wherein the processor performs an application program. In a binding phase, the application device generates a digest file according to key factor information and a selection strategy, and stores the digest file in a digest table of the electronic device. In a checking phase, the application program determines whether the controller corresponds to a binding device according to the digest file and the key factor information. If the controller corresponded to the binding device, in an authentication phase, the controller performs an authentication operation of a U2F service with a server device according to the digest file corresponding to the binding device in response to a pressing of the key module.
Systems and methods for implementing permissionless network consensus using blockchain
Provided herein are systems and methods for implementing a network consensus for a blockchain network that is characterized by one or more, or all, of the following attributes: (1) implementation of a Proof-of-Coverage scheme; (2) lack of permission for nodes to participate in the network; (3) decentralization, with lack of incentives to centralize; (4) byzantine fault tolerance; (5) based on useful work to the network; (6) high confirmed transaction rate; and (7) censor-resistant transactions.
Using a secure enclave to satisfy retention and expungement requirements with respect to private data
A secure enclave may be used to satisfy privacy requirements and audit requirements. Code may be loaded into the secure enclave. The code may generate a predefined report based on data and added noise. The pre-defined report may be subject to audit requirements. The data may be subject to the privacy requirements. The secure enclave may generate an encryption key and a decryption key based on the code. Only the secure enclave may have access to the decryption key. And the secure enclave may allow only a verified copy of the code to access the decryption key. With the added noise, the report may satisfy a pre-defined differential privacy guarantee. Encrypting the code and ensuring that the report satisfies the differential privacy guarantee may satisfy the privacy requirements. Retaining the report, the code, the secure enclave, and the encrypted data may satisfy the audit requirements.
Data transmission method, system and platform using blockchain, and storage medium
A data transmission platform for data transmission using a blockchain is configured to receives ciphertext data from a data provider, wherein the ciphertext data include transmitted data authenticated by the data transmission platform and encrypted by the data provider; identifies a target data requestor; creates a smart contract according to a data transmission requirement of the target data requestor; uploads the smart contract to a blockchain; sends a data transmission request to the data provider; re-encrypts the ciphertext data to obtain re-encrypted data using a re-encryption key generated by the data provider; triggers the smart contract to send the data transmission demand of the data requestor to the data provider; and notifies the data requester to extract the decrypted data and perform decryption to obtain the transmitted data.
SYSTEM AND MEDIA RECORDING DEVICE WITH SECURED ENCRYPTION
In one aspect the present invention disclose system for recording and handling media for use as evidence in legal proceeding. In one other aspect the present invention discloses a device for recording media for use as evidence in legal proceedings. In another aspect the present disclosure provides a server also referred to herein as an evidence vault or vault for handling media from a media recording device for use as evidence in legal proceedings. The all three aspects the invention benefit from a double layer symmetrical and asymmetrical encryption method to protect the media recordings of the device, the server and the system as a whole as well as the transmission of media between different components.
BLUETOOTH PERIPHERAL AND CENTRAL APPARATUSES AND VERIFICATION METHOD
A Bluetooth central apparatus encrypts a piece of verification data according to a secret-key system to generate a first encrypted verification parameter, and transmits the first encrypted verification parameter to a Bluetooth peripheral apparatus. The Bluetooth peripheral apparatus decrypts the first encrypted verification parameter according to the secret-key system to obtain a piece of decrypted verification data. The Bluetooth peripheral apparatus also encrypts the piece of decrypted verification data according to the secret-key system to generate a second encrypted verification parameter, and transmits the second encrypted verification parameter to the Bluetooth central apparatus. After that, the Bluetooth central apparatus decrypts the second encrypted verification parameter according to the secret-key system to obtain the piece of decrypted verification data, and verify whether the Bluetooth peripheral apparatus is valid according to the piece of verification data and the piece of decrypted verification data.
System and methods for dynamic geospatially-referenced cyber-physical infrastructure inventory and asset management
A system and method for dynamic geospatially-referenced cyber-physical infrastructure inventory and asset management using state models, wherein a computing device with a geolocation device and wireless networking capability is attached to each of a plurality of physical assets, and used to periodically determine a state of the physical asset to which it is attached using the geolocation device, periodically generate a status update message and send it to a remote computer, and wherein the remote computer stores the status of the physical asset as time series data in a state model and, if a status message is not received in a defined period of time, applies a machine learning algorithm to the state model to predict a current or future state of that particular physical asset.
Systems and methods for securing and controlling access to electronic data, electronic systems, and digital accounts
A system and method of securing a computing device with a remote computer security service includes: identifying a computing device that is subscribed to a remote computer security service, wherein the computing device comprises an anti-authentication application instance provided by the remote computer security service based on the subscription; identifying an occurrence of an anti-authentication action involving the computing device based on anti-authentication policy set to a subscriber anti-authentication account with the remote computer security service for the computing device; responsively to the anti-authentication action, automatically performing by the remote security service or the anti-authentication application instance one or more anti-authentication protective services by protectively altering the computing device based on the anti-authentication policy, wherein the computing device is altered to a protected state from a normal state based on the performance of the one or more anti-authentication protective services.
Subscriber identity privacy protection against fake base stations
Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key K.sub.FB or trusted asymmetric fallback public key PK.sub.FB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCI.sub.FB for communication of messages with the unauthenticated network entity.
SYSTEMS AND METHODS FOR GROUP MESSAGING USING BLOCKCHAIN-BASED SECURE KEY EXCHANGE WITH KEY ESCROW FALLBACK
A system described herein may provide for secure group messaging between multiple participant devices, in which two or more of the participant devices support blockchain-based techniques for the secure sharing of keys used to secure the group messaging, and in which one or more of the participant devices (e.g., a third device) do not support such techniques. A key escrow system may maintain keys associated with the third device, and the other devices of the group messaging system may retrieve such keys from the key escrow system. Such other devices may attempt to obtain keys associated with the third device from a blockchain and may retrieve such keys from the key escrow system when the retrieval from the blockchain is unsuccessful. The other devices may additionally share their respective keys to the blockchain and the key escrow system, or the key escrow system may “pull” such keys from the blockchain.