Patent classifications
H04L9/3249
SECURE AND FLEXIBLE BOOT FIRMWARE UPDATE FOR DEVICES WITH A PRIMARY PLATFORM
A device can operate a processor, a primary platform, and a nonvolatile memory that includes a first boot firmware for the processor. The nonvolatile memory can comprise a (i) read-only memory for the processor and (ii) a read and write memory for the primary platform. Upon power up, the processor can load the first boot firmware with a first certificate and first set of cryptographic algorithms to verify a digital signature for a second boot firmware, where the second boot firmware is loaded by the processor after the first boot firmware. The primary platform can securely download a secondary platform bundle (SPB) with a boot update image and a second certificate and second set of cryptographic algorithms. The SPB can replace the first boot firmware with the updated first boot firmware. The processor verifies the second boot firmware with the second certificate and the second set of cryptographic algorithms.
Using cryptographic blinding for efficient use of Montgomery multiplication
Aspects of the present disclosure involves receiving an input message, generating a first random value that is used to blind the input message input message to prevent a side-channel analysis (SCA) attack, computing a second random value using the first random value and a factor used to compute the Montgomery form of a blinded input message without performing an explicit Montgomery conversion of the input message, and computing a signature using Montgomery multiplication, of the first random value and the second random value, wherein the signature is resistant to the SCA attack.
Secure digital communications
Disclosed in some examples are methods, systems, and machine readable mediums for secure end-to-end digital communications involving mobile wallets. The result is direct, secure, in-band messaging using mobile wallets that may be used to send messages such as payments, requests for money, financial information, or messages to authorize a debit or credit.
METHOD AND SYSTEM FOR MANAGING A WEB SECURITY PROTOCOL
Provided is a method for managing a web security protocol that includes receiving a request for a generation of a security token from a client application and further fetching user's permission information from a database based on the received request. The method further includes generating the security token and a refresh token based on the fetched user's permission information and signing them with a private key, and thereby establishing at least one web-socket connection between the client application and a first microservice based on a successful login operation using the signed security token and refresh token to access services associated with the client application. After the establishment, the method furthermore includes monitoring server-side updates associated with a second microservice enabled with server-Side Events (SSE) each time when one of a successful login operation or a log out operation is performed by a user of the client application.
AUTOMOTIVE IMAGE SENSOR, IMAGE PROCESSING SYSTEM INCLUDING THE SAME AND OPERATING METHOD THEREOF
Provided is a method of operating an automotive image sensor, the method including performing a reset operation to set an initialization register corresponding to operation information of the automotive image sensor, receiving a device authentication request from an electronic control unit after performing the reset operation, performing an authentication operation with the electronic control unit based on the device authentication request, obtaining first image data while performing the authentication operation, transmitting the first image data to the electronic control unit while performing the authentication operation, obtaining second image data after the authentication operation is completed, generating a tag for the second image data, and transmitting the second image data and the tag to the electronic control unit.
Methods and systems for PKI-based authentication
Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.
System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
METHOD OF DYNAMICALLY LOADING ENCRYPTION ENGINE
A method of dynamically loading an encryption engine generates a relationship between encryption identifiers and information parameters. The information parameters includes information security levels, information sizes, and information access speeds. The encryption identifiers include a soft encryption identifier and a hard encryption identifier. A target encryption identifier of current to-be-encrypted information is obtained, and a target encryption mode of the current to-be-encrypted information is determined. An encryption engine corresponding to the current to-be-encrypted information is loaded according to the encryption mode. The method can reduce waste of resources, and improve an efficiency of encryption and decryption of information.
Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
SYSTEMS, APPARATUS AND METHODS FOR SECURE ELECTRICAL COMMUNICATION OF BIOMETRIC PERSONAL IDENTIFICATION INFORMATION TO VALIDATE THE IDENTITY OF AN INDIVIDUAL
An apparatus for validating an identity of an individual based on biometrics includes a memory and a processor operatively coupled to a distributed database and the memory. The processor is configured to provide biometric data as an input to a predefined hash function to obtain a first biometric hash value. The processor is configured to obtain, using a first pointer to the distributed database, a signed second biometric hash value. The processor is configured to define a certification of the biometric data in response to verifying that a signature of the signed second biometric hash value is associated with the compute device and verifying that the first biometric hash value corresponds with the second biometric hash value. The processor is configured to digitally sign the certification using a private key associated with the processor to produce a signed biometric certification and store the signed biometric certification in the distributed database.