H04L63/062

Systems and methods for post-quantum cryptography communications channels

Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes transmitting a first portion of an electronic communication to a client device over a non-PQC communications channel. The example method further includes transmitting a second portion of the electronic communication to the client device over a PQC communications channel. In some instances, the first portion of the electronic communication may comprise overhead data, and the second portion of the electronic communication may comprise payload data.

METHODS AND APPARATUS FOR OBTAINING A SCOPED TOKEN

A method, performed by a server, for determining token scope information so that a client can obtain a scoped token for a cloud service is disclosed. The method comprises requesting and receiving data of a cloud service from another server, receiving a token scope information request for an operation of the cloud service from a client and deriving token scope information based on the data for said operation. The method further comprises sending token scope information to the client so that the client can request a scoped token with capabilities enabling them to access the operation of the cloud service.

ON-DEMAND DRIVER SYSTEMS AND METHODS

Example on-demand driver (ODD) systems and methods are described herein. An example method includes generating, with an ODD system, a softkey for a vehicle associated with an agreement between a driver-in-need (DIN) and an ODD, monitoring, with the ODD system, a location of an ODD device carried by the ODD, and transmitting, with the ODD system, the softkey to the ODD device when the ODD device is detected as being within a proximity of the vehicle. In the example method, the softkey is used to unlock the vehicle.

Hardware-trusted ledger client for distributed ledgers that serve wireless network slices

A wireless communication network serves a wireless user device with a wireless communication service from a wireless network slice that includes a Virtual Network Function (VNF). The VNF maintains hardware-trust with a distributed ledger. The distributed ledger maintains hardware-trust with the VNF. The VNF delivers the wireless communication service to the wireless user device from the wireless network slice. The VNF generates slice data that characterizes the service delivery. When the VNF maintains the hardware-trust with the distributed ledger, the VNF transfers the slice data to the distributed ledger. When the distributed ledger maintains the hardware-trust with the VNF, the distributed ledger stores the slice data.

Device and method of secure decryption by virtualization and translation of physical encryption keys

Example implementations include a system of secure decryption by virtualization and translation of physical encryption keys, the system having a key translation memory operable to store at least one physical mapping address corresponding to at least one virtual key address, a physical key memory operable to store at least one physical encryption key at a physical memory address thereof; and a key security engine operable generate at least one key address translation index, obtain, from the key translation memory, the physical mapping address based on the key address translation index and the virtual key address, and retrieve, from the physical key memory, the physical encryption key stored at the physical memory address.

DNSSEC Lightweight Database Access Protocol Gateway
20180013726 · 2018-01-11 ·

A system that converts standardized lightweight database access protocol (LDAP) requests into a series of domain name system (DNS) requests to look up requested information. DNS responses are validated using DNS security extensions (DNSSEC) to ensure their validity, then converted into standardized LDAP responses. The system is either operated as a service for public use on the Internet or private use in an enterprise; or as an application running on end user machines, e.g., laptops, mobile phones, to guarantee end-to-end security by validating responses on the end user machine. The standardized, widespread nature of the LDAP allows existing applications to immediately reap the benefits of global, ubiquitous, cross-organizational, trans-national data distribution via DNS secured by DNSSEC.

Systems and methods for encoding and sharing content between devices
11711410 · 2023-07-25 · ·

Systems and methods for sharing content between devices are disclosed. To request a shared piece of media content, a playback device generates and sends a request to content server. The playback device includes information in the request that indicates the playback capabilities of the device. The content server receives the request and determines the playback capabilities of the playback device from the information in the request. The content server then determines the assets that may be used by the playback device to obtain the media content and generates a top level index file for the playback device that includes information about the determined assets. The top level index file is then sent to the playback device that may then use the top level index file to obtain the media content using the indicated assets.

MULTI-TENANT ANONYMIZATION WITH FORENSICS CAPABILITIES (MAF)

According to some embodiments, a security management entity is provided. The security management entity includes processing circuitry configured to: generate a key having a plurality of key parts, anonymize at least a first data instance at least in part by using the key with threshold cryptography, transmit a respective key part to each one of the plurality of trusted entities, store at least one key part where the stored at least one key part is different from the transmitted respective key parts, receive a message from a first trusted entity of the plurality of trusted entities for investigating the anonymized first data instance where the message includes one of the transmitted respective key parts, and deanonymize the first data instance using the stored at least one key part and the one of the transmitted respective key parts associated with the first trusted entity.

SECURITY PROCESSOR CONFIGURED TO AUTHENTICATE USER AND AUTHORIZE USER FOR USER DATA AND COMPUTING SYSTEM INCLUDING THE SAME
20230237193 · 2023-07-27 ·

A security processor includes a key generator circuit configured to randomly generate a key, an encryption circuit configured to encrypt user data based on the key, and a security manager circuit configured to receive a first user identification (ID), which uniquely corresponds to a user of a device, and determine whether to allow access to the user data by authenticating the first user

ID.

BLOCKCHAIN JOINING FOR A LIMITED PROCESSING CAPABILITY DEVICE AND DEVICE ACCESS SECURITY
20230006975 · 2023-01-05 · ·

A computer-implement method comprises: selecting a trusted computing node via smart contract on a blockchain; completing remote attestation of the selected trusted computing node; writing secret information to an enclave of the selected node; causing a thin device to establish a private connection with the selected node without revealing the secret information; and causing the selected node to act as a proxy on the blockchain for the device. Another method comprises: receiving a signed device access request from a device owner; validating, by the verification node, the received request; executing, by a verification node, a smart contract on a blockchain based on the received request; and producing, based on the executed smart contract, an output command to access the device for the device to validate, decrypt and execute.