H04L9/0894

GRAPHICAL WATERMARK, METHOD AND APPARATUS FOR GENERATING SAME, AND METHOD AND APPARATUS FOR AUTHENTICATING SAME

The present disclosure provides a graphical watermark, a method and an apparatus for generating a graphical watermark, and a method and an apparatus for authenticating a graphical watermark. The graphical watermark includes: a plurality of graphical markers carrying position and pose information, and identity information of the graphical watermark; and a watermark pattern provided between a pair of graphical markers.

KEY ROTATION SERVICE

A system for security key rotation in a cloud computing environment is disclosed. The system performs steps to at least initiate, at a predetermined interval, a call to determine whether to initiate generation of a public-private key pair for a client application. The system determines whether to initiate generation of the public-private key pair for the client application and based on determining to initiate generation of the public-private key pair for the client application, transmits a control signal requesting generation of the public-private key pair The system generates the public-private key pair and transmits a private key associated with the public-private key pair to a secure storage location for later retrieval by the client application and transmits a public key associated with the public-private key pair to a public key service for later retrieval by a client associated with the client application.

METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKS
20230047830 · 2023-02-16 ·

The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.

COMMUNICATIONS DEVICE, METHOD AND COMMUNICATIONS SYSTEM FOR MANAGING AN AUTHENTICATION EVENT

A communications device for managing an authentication event is provided, which is configured to generate location data indicative of a geolocation associated with the communications device, retrieve, from a key that is obfuscated and stored in the communications device, the key, sign the location data with the retrieved key, and transmit request data to a communications server apparatus for requesting the authentication event, the request data comprising the signed location data. A method and a communications system for managing an authentication event are also provided.

METHOD FOR TRANSMITTING AND RECEIVING A MESSAGE INCLUDING AN ENCRYPTED IDENTIFIER OF THE TRANSMITTER DEVICE
20230052597 · 2023-02-16 ·

In a digital communication system, using a symmetric key encryption protocol, the identifier of a transmitter included in a message transmitted to a receiver is encrypted. The identifier is divided into P parts, P being an integer number at least equal to two. The parts are ordered and associated, respectively, with ranks varying between one and P. For at least one part of rank greater than or equal to two, an encryption key is determined on the basis of the values of the parts of preceding rank and is encrypted with the encryption key thus determined. An encrypted identifier is then determined from the one or more encrypted parts thus obtained. The message to be transmitted is then formed from the encrypted identifier thus determined, and then transmitted to the receiver.

SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR GENERATING PSEUDO RANDOM NUMBERS
20230047518 · 2023-02-16 ·

A methods comprises: receiving, by a pseudo random number generator module, an instruction to generate pseudo random numbers from a security application; determining, by the pseudo random number generator module, at least one algebraic input parameter value for a transcendental equation from a randomness library in memory of the device, wherein the transcendental equation comprises a transcendental function that is capable of generating transcendental number outputs from algebraic number inputs; calculating, by the pseudo random number generator module, a solution to the transcendental equation based on the at least one algebraic input parameter value; determining, by the pseudo random number generator module, pseudo random number(s) based on the solution; and storing, by the pseudo random number generator module, the pseudo random number(s) in a randomness library for use as seeds for keys by the security application and as subsequent input parameter values for the pseudo random number generator module.

In-Vehicle Speech Interaction Method and Device
20230048330 · 2023-02-16 ·

An in-vehicle speech interaction method and a device are provided. The method includes: obtaining user speech information; determining a user instruction based on the user speech information; determining, based on the user instruction, whether response content to the user instruction is privacy-related; and determining, based on whether the response content is privacy-related, whether to output the response content in a privacy protection mode, to protect privacy from being leaked.

AUTHENTICATION PROCESSING SERVICES FOR GENERATING HIGH-ENTROPY CRYPTOGRAPHIC KEYS
20230048912 · 2023-02-16 ·

Systems, methods, and computer-readable media for facilitating an authentication processing service are provided.

DISTRIBUTED PRIVATE KEY RECOVERY

A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.

Public Key Storage with Secure Remote Update Capability
20230049387 · 2023-02-16 ·

The disclosed embodiments relate to a memory device. In one embodiment, a memory device is disclosed comprising a storage array, the storage array including a first region, the first region storing a server public key associated with a server, and a key table; and a controller configured to: receive a message from the server, the message including a command modifying the key table, validate the message using the server public key, and modify the key table based on the message.