Patent classifications
H04L63/045
Certificate mirroring
A method includes retrieving a server certificate from a server in response to a request from a client to negotiate a connection between the client and the server and generating a new server public key and a new client public key in response to the request. The method also includes generating a new server certificate using information in the server certificate. The method further includes signing the new server certificate to produce a new signed server certificate, communicating the new signed server certificate, which includes the new server public key, to the client, and generating a new client certificate using information in a client certificate received from the client. The method also includes signing the new client certificate to produce a new signed client certificate and communicating the new signed client certificate, which includes the new client public key, to the server to establish the connection.
Systems and methods for managing secure sharing of online data
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.
System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
COMMUNICATION DEVICE AND METHOD FOR CRYPTOGRAPHICALLY SECURING COMMUNICATION
A communication device for a vehicle has a communication unit set up to establish a communication link between the vehicle and an external vehicle server and to exchange data in a cryptographically secured manner between the vehicle and the external vehicle server. The communication unit is further set up to be operated in a first or second mode. The modes differ in the type of cryptographic securing of the data. The communication unit has a secure hardware memory in which a binary value corresponding to the respective mode is stored.
Sharing Access To Data
A method including determining, by a first device, a sharing encryption key based at least in part on an access private key associated with encrypted content and an assigned public key associated with a second device; encrypting the access private key associated with the encrypted content utilizing the sharing encryption key; and transmitting the encrypted access private key to enable the second device to access the encrypted content. Various other aspects are contemplated.
Sharing access to data
A method including determining, by a first device, a sharing encryption key based at least in part on an access private key associated with encrypted content and an assigned public key associated with a second device; encrypting the access private key associated with the encrypted content utilizing the sharing encryption key; and transmitting the encrypted access private key to enable the second device to access the encrypted content. Various other aspects are contemplated.
TECHNOLOGIES FOR SECURELY PROVIDING REMOTE ACCELERATORS HOSTED ON THE EDGE TO CLIENT COMPUTE DEVICES
Technologies for securely providing one or more remote accelerators hosted on edge resources to a client compute device includes a device that further includes an accelerator and one or more processors. The one or more processors are to determine whether to enable acceleration of an encrypted workload, receive, via an edge network, encrypted data from a client compute device, and transfer the encrypted data to the accelerator without exposing content of the encrypted data to the one or more processors. The accelerator is to receive, in response to a determination to enable the acceleration of the encrypted workload, an accelerator key from a secure server via a secured channel, and process, in response to a transfer of the encrypted data from the one or more processors, the encrypted data using the accelerator key.
SECURE REPROGRAMMING OF EMBEDDED PROCESSING SYSTEM
An embedded processing system includes processing circuitry, a memory system, and a reprogramming control. The reprogramming control is configured to receive a transaction indicator and user credentials from a reprogramming system, the transaction indicator identifying a type of configuration item to program in the memory system. The reprogramming control is further configured to access user authentication data to authenticate authority of a user to program the memory system based on the transaction indicator and user credentials and receive an encrypted configuration item. The reprogramming control is further configured to decrypt and authenticate the encrypted configuration item as a decrypted and authenticated configuration item responsive to authenticating the authority of the user, and store the decrypted and authenticated configuration item in the memory system.
SQL EXTENSION TO KEY TRANSFER SYSTEM WITH AUTHENTICITY, CONFIDENTIALITY, AND INTEGRITY
Disclosed herein are various embodiments an SQL extension to key transfer system with authenticity, confidentiality, and integrity. An embodiment operates by generating a key pair including both a target public key and a target private key. The target public key is provided to a source database server, wherein the source database server includes a source secret for unencrypting encrypted data accessible to the target database server. A source public key generated by the source database server and a digital signature signed with a source private key generated by is received from the source database server including an encrypted version of the source secret. The digital signature is verified as being valid. The encrypted version of the source secret is unencrypted using the target private key and the source secret is used to access the encrypted data.
EFFICIENT WIRELESS PUBLIC KEY EXCHANGE
A facility operating in a first mobile communication device (MCD) is described. The facility generates a key pair made up of a private key and a public key for use by the first MCD in communicating with other MCDs. The public key has information content. The facility constructs a first public key component and a second public key component, that each encode an incomplete portion of the information content of the public key; and that collectively encode the complete information content of the public key. The facility transmits a wireless message for receipt by other MCDs; it has (1) first contents that identify the wireless message as a notification signal, and (2) as second contents, the first public key component. The second contents are located at a position in the first wireless message that identifies the second contents as the node ID of the first MCD.