Abstract:
A system for providing cost effective, secure key exchange from at least one first device to at least one second device through at least one proxy server is provided. The system includes a first key exchange message from the at least one first device to the at least one second device via the at least one proxy server. A second key exchange message from the at least one second device to the at least one first device via a media stream of the Internet is required to complete the computation of the session key. A method of securing a communication system is also set forth. The method includes the steps of providing a routing device for identifying a subscriber, and providing a master key exchange session, the master key exchange session including a key k to find a subscriber and a nonce r to answer a query to the subscriber, wherein the master key exchange session includes both the key k and the nonce r.
Abstract:
A non-transitory computer-readable storage medium comprising instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a computing system to at least receive a message, the message including a header, an encrypted symmetric key, and an encrypted body, decrypt the encrypted symmetric key using a private key to generate a decrypted symmetric key, decrypt the encrypted body using the decrypted symmetric key to generate a decrypted body, and store the header, the decrypted symmetric key, and the decrypted body in long-term storage.
Abstract:
An approach is provided for providing separation of authentication protocols and/or authentication contexts for client-server and server-server communication in network communication. A proxy server receives a request to initiate a service session. The request includes a first authentication context. The proxy server request verification of the first authentication context from an authentication server and validates the first authentication context based, at least in part, on the verification. The proxy server implements a second authentication context based, at least in part, on the verification of the first authentication context to initiate the service session.
Abstract:
To enable multiple key replacements for information sharing between users and control of the key replacement directions, a key replacement direction control system 100 at least has a key replacement server 200 including: a storage part 220 that stores key replacement information defining a relation indicating permission and direction of information sharing between users, a replacement key for use to re-encrypt encrypted data of a first user to enable a second user to decrypt the encrypted data with a decryption key retained by the second user, and encrypted data of users; and an arithmetic device 210 that receives a transmission request from a user terminal, and if the key replacement information defines that information sharing in a direction from a certain user to a different user is permitted, re-encrypts encrypted data of the certain user using the replacement key for the users thus defined and transmits the re-encrypted encrypted data to the user terminal of the different user.
Abstract:
The subject matter discloses a computerized system for securing information, comprising a client application installed on a computerized device, said client application stores a first share of the information, a server communicating with the client application, said server stores a second share of the information, an MPC module installed on the client application and on the server, wherein a request to use the information activates the MPC module, such that computation performed by the MPC module enables use of the information while only a share of the information resides on the server or on the computerized device, wherein the server verifies the identity of the computerized device in response to a request to use the information
Abstract:
Systems and techniques for a System-on-a-Chip (SoC) security plugin are described herein. A component message may be received at an interconnect endpoint from an SoC component. The interconnect endpoint may pass the component message to a security component via a security interlink. The security component may secure the component message, using a cryptographic engine, to create a secured message. The secured message is delivered back to the interconnect endpoint via the security interlink and transmitted across the interconnect by the interconnect endpoint.
Abstract:
The present disclosure relates to communication sessions between a first node and a plurality of other nodes. Two cryptographic keys are generated. A first cryptographic key is generated (113A) in a first node (10), e.g. Node A. A second cryptographic key is generated (113B) by a second node (22), which is a virtual and temporary node which is executed on a server (20). The second cryptographic key is transmitted to several other nodes (30). The first and second cryptographic keys, which are the same, may then be applied in communication sessions between the first node (10) and the several other nodes (30). Hereby it is made possible to allow for node-to-multinode communication sessions that offer the same, or substantially the same, security as conventional node-to-node communication sessions.
Abstract:
Described herein are systems, devices, and methods for content delivery on the Internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. In one approach, an origin server can annotate its responses to content requests with tokens, e.g., placing them in an appended HTTP header or otherwise. The tokens can drive the process of caching, and can be used as handles for later invalidating the responses within caching proxy servers delivering the content. Tokens may be used to represent a variety of kinds of dependencies expressed in the response, including without limitation data, data ranges, or logic that was a basis for the construction of the response.
Abstract:
La présente invention concerne un procédé d'identification biométrique d'une entité comprenant un calcul d'une valeur de correspondance entre des donnée biométrique d'une entité u et de référence u', par application d'une fonction F auxdites données biométriques en mettant en oeuvre un procédé non-interactif de calcul publiquement vérifiable comprenant: une représentation de ladite fonction sous forme d'un circuit arithmétique converti en une représentation polynomiale, et une génération de clés, une détermination de valeur de correspondance en évaluant le circuit arithmétique ayant pour entrées les données biométriques de l'entité et de référence, une génération de preuve de la correction de l'exécution du calcul des valeurs de correspondance, une vérification de ladite preuve reçue, la représentation de ladite fonction comprenant l'encodage d'un nombre entier k>1 d'entiers binaires d'un vecteur d'une donnée biométrique sur au moins un fil d'entrée du circuit, et la fonction F comprenant au moins m produits scalaires, si le diviseur m est égal à 2 ou 3, l'évaluation du circuit comprend itérativement un calcul de chacun des m produits scalaires à l'aide de N/km opérateurs de multiplication, un stockage et une sommation des m résultats des calculs desdits produits scalaires et si le diviseur m est supérieur ou égal à 4, l'évaluation du circuit comprend itérativement un calcul de chacun des m produits scalaires en utilisant alternativement un premier ou un second sous-circuit pour calculer la somme du produit scalaire des valeurs des fils d'entrée de ce sous-circuit et d'une valeur stockée dans une mémoire de stockage de l'autre sous-circuit.