Patent classifications
H04L2209/12
RECONFIGURABLE IN-MEMORY PHYSICALLY UNCLONABLE FUNCTION
A physically unclonable function (PUF) device includes first and second inverters, each of which includes a common gate node and a common drain node. The common drain node of the first inverter is electrically connected to the common gate node of the second inverter. The PUF device also includes a common output node, a first resistive memory device (RMD) electrically connected to the common drain node of the first inverter and the common output node, and a second RMD electrically connected to the common drain node of the second inverter and the common output node.
Random number generation device, random number generation method, encryption device, and non-transitory recording medium
Provided are a random number generation device and the like capable of calculating a high precision random number using a memory capacity selected irrespective of the precision of the random number. A random number calculation device is configured to generate first random numbers based on given number and specify, for the given number of second random numbers in a target numeric extent, bin range depending on the first random numbers based on frequency information representing cumulative frequency regarding a frequency of numeric extent including respective second random numbers among given numeric extents, the numeric extent being determined in accordance with a desirable precision.
Fine-grained stack protection using cryptographic computing
A processor includes a register to store an encoded pointer to a variable in stack memory. The encoded pointer includes an encrypted portion and a fixed plaintext portion of a memory address corresponding to the variable. The processor further includes circuitry to, in response to a memory access request for associated with the variable, decrypt the encrypted portion of the encoded pointer to obtain first upper address bits of the memory address and a memory allocation size for a variable, decode the encoded pointer to obtain the memory address, verify the memory address is valid based, at least in part on the memory allocation size, and in response to determining that the memory address is valid, allow the memory access request.
Systems, devices, and methods for machine learning using a distributed framework
In another aspect, a system for machine learning using a distributed framework, includes a computing device communicatively connected to a plurality of remote devices, the computing device designed and configured to select at least a remote device of a plurality of remote devices, determine a confidence level of the at least a remote device, and assign at least a machine-learning task to the at least a remote device, wherein assigning further comprises assigning at least a secure data storage task to the at least a remote device and assigning at least a model-generation task to the at least a remote device.
DETERMINING ELECTRONIC COMPONENT AUTHENTICITY VIA ELECTRONIC SIGNAL SIGNATURE MEASUREMENT
Examples of determining electronic component authenticity via electronic signal signature measurement are discussed. Reference pin identifiers corresponding to pins of a known authentic electronic component are determined. Measurement values corresponding to characteristics of pins of an electronic component are obtained, and pin identifiers based on the measurement values are generated. Accordingly, an indication that the electronic component is authentic can be provided based at least in part on a comparison of the pin identifiers and the reference pin identifiers.
Secure analytics using homomorphic and injective format-preserving encryption
Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors; transmitting the set of homomorphic analytic vectors to a server system; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and a first injective, format-preserving encryption scheme to evaluate the set of homomorphic analytic vectors over a datasource.
Encryption method and apparatus based on homomorphic encryption using composition of functions
An encryption method and apparatus based on homomorphic encryption using a composition of functions. The encryption method includes generating a ciphertext by encrypting data, and bootstrapping the ciphertext by performing a modular reduction based on a composition of a function for a modulus corresponding to the ciphertext.
Method of Writing Data to a Memory Device and Reading Data From the Memory Device
A method of writing data to a memory device and reading data from the memory device includes issuing a challenge to a PUF device during a power-up process in order to derive a PUF response, error correcting the PUF response, providing delinearized addresses via a delinearization algorithm to the memory device using the error corrected PUF response, masking data, which is written to the memory device, via a masking module using the error corrected PUF response, de-masking data, which is read from the memory device, via the masking module (19) using the error corrected PUF response; and performing a check-sum verification of read data such that address delinearization and data masking are used together to obfuscate the memory content.
Fast unbreakable cipher
An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.