H04L63/0442

Method for providing a firmware update of a device

A method provides a firmware update to an electronic device, to code signing for firmware updates of electronic devices, and a system therefor. In particular, the system and method for updates firmware that is authenticated through a public key infrastructure. The method includes an electronic device receiving a firmware update provided with a signature of a signing key, a signing certificate with a signature of a master key, and a revision number. The device verifies the signature of the master key on the signing certificate of the signing key, checks the revision number on the signing certificate of the signing key against a roll back counter, and verifies the signature of the signing key on the firmware update. The device then rejecting or accepting the received firmware update based on the outcome of the above verifying and checking.

Peripheral component interconnect (PCI) hosting device
11714775 · 2023-08-01 · ·

Methods and systems are disclosed to aggregate traffic from multiple server devices through a peripheral component interconnect (PCI) hosting device. In one embodiment, the PCI hosting device comprises a network interface to couple the PCI hosting device to a network, a plurality of PCI interfaces, a processing circuit to forward packets, and a power supply to supply power to the PCI interfaces independently from the plurality of server devices. Each of the PCI interfaces is designed to be coupled to one server device to the PCI hosting device, which is registered as a first PCI board of a first server device through a first PCI interface and as a second PCI board of a second server device through a second PCI interface, and the PCI hosting device is designed to forward packets between the network interface and the first server device, and the network interface and the second server device.

Data comprising encryption key
11716336 · 2023-08-01 · ·

Systems and methods for end to end encryption are provided. In example embodiments, a computer accesses an image including a geometric shape. The computer determines that the accessed image includes a candidate shape inside the geometric shape. The computer determines, using the candidate shape, an orientation of the geometric shape. The computer determines a public key of a communication partner device by decoding, based on the determined orientation, data encoded within the geometric shape. The computer receives a message. The computer verifies, based on the public key of the communication partner device, whether the message is from the communication partner device. The computer provides an output including the message and an indication of the communication partner device if the message is verified to be from the communication partner device. The computer provides an output indicating an error if the message is not verified to be from the communication partner device.

IDENTIFICATION OF DOCUMENT ACCESS BY A MESSAGE SCANNING SYSTEM

Information identifying a message scanning system is encoded into URLs. A document management system can decode the identifying information to verify that a document accessed via a URL was accessed by a trusted entity rather than by an unknown user. The document management system sends a message including a URL to access a document. When a message scanning system known to the document management system reviews the message for threats, it encodes its identity into a modified form of the URL in the message and uses the modified URL to access the resource. The document management system can decode the identity of the messaging system using a decoding key. Based on the identification, the document management system updates records associated with the document to include the document acce by the message scanning system.

PRIVACY INFORMATION TRANSMISSION METHOD, APPARATUS, COMPUTER DEVICE AND COMPUTER-READABLE MEDIUM
20230023665 · 2023-01-26 ·

A privacy information transmission method, an apparatus, a computer device and a computer-readable medium are disclosed. The method may include: generating authentication information in response to receiving of an identity registration request message sent by a terminal device via a base station, and encrypting the authentication information with a first private key to generate encrypted authentication information; sending a first identity identification request message carrying the encrypted authentication information to the terminal device; and receiving an identity identification response message returned by the terminal device, and acquiring privacy information from the identity identification response message.

SYSTEM FOR ELECTRONIC DATA ENCRYPTION AND DECRYPTION USING A CONSENSUS DRAFT PROCESS
20230028290 · 2023-01-26 · ·

A system is provided for electronic data encryption and decryption using a consensus draft process. In particular, the system may use a custom encryption algorithm that generates an array with a number of entries that is dependent on the number of computing devices that participate in the encryption process. The encryption algorithm may cause a first computing device to open and read the array, randomly select and remove an entry, and pass on the remaining entries to a second computing device. The second computing device may then open and read the array, randomly select and remove an entry, then pass the remaining entries to a third computing device. The process may be executed in a reiterative manner until the entire array is distributed among the participating computing devices. In this way, encryption of data may be performed without revealing shared information among the participating computing devices.

DATA EXCHANGE WITH RESOURCE CONSTRAINED TECHNOLOGY IN SURGICAL ENVIRONMENT
20230231834 · 2023-07-20 ·

A system and method for performing a secure data transfer between computing devices comprise registering a resource-constrained computing device with a cloud-based computer. A client computing device generates session state information regarding the client computing device in an electronic communication exchange with at least one remote computing device. An identifier provides a location of the session state information stored at a cloud-based computer. A machine-readable code associated with the identifier is displayed for querying the cloud for the stored session state information. The resource-constrained computing device uses the machine-readable code to retrieve the session state information. The resource-constrained computing device uses the session state information to join the electronic communication exchange. Alternatively, in lieu of a machine-readable code, a cryptography process is performed, which includes generating a public cryptographic certificate associated with an immutable identifier of a portable device to be integrated in the exchange.

Method and apparatus for controlling data access right to data stored on a blockchain

A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.

Authentication processing service

Systems, methods, and computer-readable media for facilitating an authentication processing service are provided.

Location aware cryptography

A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.