H04L63/0478

METHODS AND SYSTEMS FOR CONTROLLING A SMART LOCK

The present disclosure discloses methods and systems for controlling a smart lock. The method may include establishing a secure connection with a network, obtaining security control information through the secure connection, obtaining an operation input; performing a security verification based on the security control information and the operation input, and performing a corresponding operation based on the operation input when the security verification is passed.

SECURE DATA PROCESSING
20220060326 · 2022-02-24 ·

A first component determines encrypted data representing an event and encrypted threshold data corresponding to an outlier of the event. The first system may process the data using, for example, one or more composite integers, and may send the result to a second system. This second system may subtract the data to determine of the encrypted data is greater than, less than, or equal to the encrypted threshold. If so, the second system may determine that the encrypted data corresponds to an outlier of the data. The second system may send an indication of this determination to a third system.

METHOD AND APPARATUS FOR SUPPORTING SECURE DATA ROUTING
20220060328 · 2022-02-24 · ·

There is provided a method and system for supporting secure data routing for artificial intelligence services in a communication network. According to embodiments there is provided a system including a platform controller for managing artificial intelligence (AI) services and a coordinator for managing data transmission of the AI services. The platform controller is configured to obtain, from an AI controller, a first security credential used for re-encryption of uplink data for an AI service, wherein the uplink data includes encrypted data from a device and obtain, from the device, a second security credential for re-encryption of downlink data for the AI service, wherein the second downlink data includes encrypted data from an AI server. The platform controller is further configured to provide, to the coordinator, both the first security credential and the second security credential. The coordinator is configured to receive, from the platform controller, both the first security credential and the second security credential and perform re-encryption of the uplink data for the AI service and send re-encrypted uplink data to the AI server. The coordinator is further configured to perform re-encryption of the downlink data for the AI service and send re-encrypted downlink data to the device.

Method and Device for Implementing Secure Communication, and Storage Medium
20220053323 · 2022-02-17 ·

This document discloses a method and device for implementing secure communication, and a storage medium. The method for implementing secure communication includes: encrypting first information and second information of a data packet respectively to generate an encrypted message; wherein, a region in which the encrypted first information is located is a first encrypted region, and a region in which the encrypted second information is located is a second encrypted region; the first information is used for a receiving device to determine whether to acquire the second information; and sending the encrypted message.

Leveraging transport-layer cryptographic material

A client application cryptographically protects application data using an application-layer cryptographic key. The application-layer cryptographic key is derived from cryptographic material provided by a cryptographically protected network connection. The client exchanges the cryptographically protected application data with a service application via the cryptographically protected network connection. The client and service applications acquire matching application-layer cryptographic keys by leveraging shared secrets negotiated as part of establishing the cryptographically protected network connection. The shared secrets may include information that is negotiated as part of establishing a TLS session such as a pre-master secret, master secret, or session key. The application-layer cryptographic keys may be derived in part by applying a key derivation function, a one-way function or a cryptographic hash function to the shared secret information.

DATA SECURITY SYSTEM AND METHOD
20170243267 · 2017-08-24 ·

A system and method are disclosed for secure storage of customer's public and private data in a personal data store. Companies communicate with a secure data storage server using a public encryption key linked to a registered IP Address, customers communicate with a private encryption key, and encrypted data can be stored using a variety of encryption keys. The personal data store can be used for preparing customer product views, linking personal data to avoid repeated customer data entries, customer identification and loyalty card linking. Encrypted stored data ensures no other person can read it.

AUTHENTICATION SYSTEM USING PAIRED, ROLE REVERSING PERSONAL DEVICES
20220311610 · 2022-09-29 · ·

An authentication system is provided for authenticating users in accordance with an encryption/decryption algorithm using first and second separately unique encryption keys that are time variable and are uniquely associated with each user, having a first user controlled computing device under the control of the user for generating said first encryption key using an encryption key generating algorithm. The first user controlled computing device includes a key transmitter for transmitting wirelessly within the immediate vicinity of the user the first encryption key, a second user controlled computing device, operating as a coordinating device under the control of the user, for generating the second encryption key using the encryption key generating algorithm. The second user controlled computing device includes a key receiver for receiving the first encryption key.

GROUP SIGNATURES FOR A SMART WALLET ON A BLOCKCHAIN PLATFORM
20220309490 · 2022-09-29 ·

The systems and methods on a blockchain platform for one or more intermediaries for services including proxy re-encryption, independent audit, multiple-signatures based smart wallet associated with a smart contract and split-key authentication to achieve secure passwordless login. Proxy re-encryption by receiving a ciphertext from a first user with condition parameters that has been encrypted with a dynamically selected encryption algorithm. Audit service receiving an encrypted file from a user for storage on the blockchain platform; enforcing the security policy parameters for all access requests to the file on the blockchain platform; and optionally providing audit report of the encrypted file storage and access. A smart wallet with a group key using multiple signatures based on receipt of a threshold number of signatures. Split-key authentication by splitting the private key into two or more parts; and assigning the split private key part to two or more client devices.

METHODS AND SYSTEMS FOR ENCRYPTING COMMUNICATIONS USING A SECURE ELEMENT

Disclosed herein are methods and systems for encrypting communications using a secure element. An embodiment takes the form of a method including the steps of performing a key-exchange procedure with an endpoint via a voice-communication device to obtain a symmetric seed key for a secure voice session with the endpoint; generating first and second symmetric session keys for the secure voice session based on the obtained symmetric seed key; receiving outbound voice packets from the voice-communication device in connection with the secure voice session, each outbound voice packet including a header and an unencrypted payload; using a first symmetric encryption algorithm and the first symmetric session key, followed by a second symmetric encryption algorithm and the second symmetric session key to generate and output twice-encrypted outbound-voice-packet payloads to the voice-communication device for transmission to the endpoint in connection with the secure voice session.

Decentralized content fabric
11431627 · 2022-08-30 · ·

Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. Some implementations are associated with a network configured to manage content object parts representing digital content. A content object part includes raw data, metadata, and build instructions. The network includes: a data layer storing the raw data and the metadata of the content object parts, a code layer storing the build instructions of the content object parts, a contract layer storing a digital contract associated with the content object parts, and a ledger configured to record one or more transactions. Digital output can be provided by at least processing the build instructions and the digital contract in relation to the raw data and the metadata.