H04L9/0662

Signal and/or data transmission and/or encryption unit, PRN code generator, integrated integrity check, and computer-aided method for secure signal transmission
11533165 · 2022-12-20 · ·

Signal, data transmission, and/or encryption units generating a cryptographic code using a cryptographic key before writing to a pseudorandom noise buffer memory. The PRN code generator comprises a first processor generating a PRN code from initial data using a cryptographic key. A second processor generates sections of the PRN code for integrity check purposes through computation using the same cryptographic key and initial data. Within the PRN code generator and before temporary storage of the PRN code in the buffer memory, there is a comparison device for comparing at least one duplicated section of the PRN code sequence cryptographically generated by the first processor with the section computed by the second processor. A blocking, stop and/or alarm function is activated in the comparison device and triggered on the basis of a predefined degree of matching between the section obtained through duplication and the computed section.

Transmitting device and transmitting method, and receiving device and receiving method

The present disclosure relates to a transmitting device and a transmitting method, and a receiving device and a receiving method which are capable of improving confidentiality and communication resistance in low power wide area (LPWA) communication. The transmitting device generates a key stream on the basis of GPS time information, encrypts transmitted data on the basis of the key stream to generate encrypted data, and transmits the encrypted data to the receiving device. The receiving device generates a key stream on the basis of GPS time information and decodes the encrypted data into the transmitted data on the basis of the key stream. The present disclosure can be applied to an LPWA communication system.

Systems for producing and maintaining verified electronic signatures
11522719 · 2022-12-06 ·

Physically supplied user information is used to first verify the identity of a user before an app is supplied to a user device. Hardware identifiers of the user device are reviewed to determine whether to allow or deny use of the app on the user device. Once the app is approved, a user request is received by the app which is forwarded to the provider. The provider approves or disapproves of the request based, in part, on whether data in the request matches data maintained by the provider. Such approval/disapproval is provided from the provider to a party responsible for satisfying the user request. In addition, the provider generates a one-time-use electronic signature using data from a sequencer and data from the request, and the one-time-use electronic signature can be supplied to a signature repository and/or added to legal documents.

Semiconductor device, update data-providing method, update data-receiving method, and program

A semiconductor device includes a memory, a random number generation circuit, and a control circuit. The memory stores key information, and the random number generation circuit generates first and second random number signals. The control circuit generates sixth and seventh random number signals from the first random number signal and the key information, generates encrypted update data from update data using the seventh random number signal, transmits the first and second random number signals as request signals to an external terminal device, receives, from the external device, first and second response signals as response signals in response to the request signals, generates an eighth random number signal using the first response signal, the second and the sixth random number signals as input signals, and provides the encrypted update data for the external terminal device when the second response signal coincides with the eighth random number signal.

METHOD FOR GENERATING GAUSSIAN ERROR DATA USING FLASH MEMORY AND APPARATUS USING THE SAME
20220374302 · 2022-11-24 ·

Disclosed herein are a method for generating Gaussian error data using flash memory and an apparatus using the method. The method includes receiving a request to generate Gaussian error data and delivering an operation command to flash memory; generating Gaussian error noise based on a threshold voltage that is generated when the flash memory performs the operation command; and generating Gaussian error data so as to correspond to the Gaussian error noise and providing the same.

DYNAMIC PASSWORD CIPHER
20220376917 · 2022-11-24 ·

Disclosed is a method for creating one or more passwords, each in compliance with website or file requirements, from a single password containing only letters. Several parameters, including the total number of characters, any type of required character, including capital letters, digits, and special characters, and the number of each type of required character are entered in to a cipher algorithm. The cipher algorithm creates a set of possible characters from the letters of the alphabet, digits, and any special characters. According to the ruleset for the character position, the available characters from the set are made available for assignment for a predetermined period, and assigned by keystroke.

Encryption for a distributed filesystem

A computing device comprising a frontend and a backend is operably coupled to a plurality of storage devices. The backend comprises a plurality of buckets. Each bucket is operable to build a failure-protected stipe that spans two or more of the plurality of the storage devices. The frontend is operable to encrypt data as it enters the plurality of storage devices and decrypt data as it leaves the plurality of storage devices.

METHOD AND DEVICE FOR GENERATING RANDOM NUMBERS
20230059130 · 2023-02-23 ·

A computer-implemented method of generating random numbers based on blockchain transactions, wherein the method is performed by a generating party and comprises: obtaining a candidate block header, wherein the candidate block header is based on a set of blockchain transactions; applying a hash function to at least the candidate block header one or more times, wherein each application of the hash function to at least the candidate block header generates a respective hash digest; generating one or more random numbers, wherein each random number is generated based on a respective hash digest; and outputting the one or more random numbers to one or more consuming devices.

Secure memory
11586560 · 2023-02-21 · ·

Various examples are directed to systems and methods for securing a data storage device. A storage controller may receive a read request directed to the data storage device. The read request may comprise address data indicating a first address of a first storage location at the data storage device. The storage controller may request from the data storage device a first encrypted data unit stored at the first memory element and a first encrypted set of parity bits, such as Error Correction Code (ECC) bits, associated with the first storage location. An encryption system may decrypt the first encrypted set of parity bits to generate a first set of parity bits based at least in part on an a first location parity key for the first address.

METHOD AND SYSTEM FOR CONTROLLING ACCESS TO SECURE DATA USING CUSTODIAL KEY DATA
20220366060 · 2022-11-17 ·

Methods and systems for controlling access to secure data use a custodial TRNG disk. Source data is encrypted using first key data from a first TRNG disk to generate encrypted data which is stored at a first location by a first entity. A second TRNG disk has second key data which is stored at a second location by a second entity. A first TRNG disk copy and a second TRNG disk copy are made identical to the first TRNG disk and the second TRNG disk, respectively, and are stored at one or more locations by a custodial entity. The first key data and the second key data are encoded together, and then transmitted to one or more of the first or second entities. The first quantity of encrypted data is decryptable using the encoded first key data and the second key data.