MACHINE LEARNING BASED ON HOMOMORPHIC ENCRYPTION

    公开(公告)号:EP3412000A1

    公开(公告)日:2018-12-12

    申请号:EP17702412.2

    申请日:2017-02-03

    Applicant: ABB Schweiz AG

    Abstract: A method for evaluating data (28) is based on a computational model, the computational model comprising model data (26), a training function and a prediction function. The method comprises training the computational model by: receiving training data (22) and training result data (24) for training the computational model, and computing the model data (26) from the training data (22) and the training result data (24) with the training function. The method comprises predicting result data (30) by: receiving field data (28) for predicting result data (30); and computing the result data (30) from the field data (28) and the model data (26) with the prediction function. The training data (22) may be plaintext and the training result data (24) may be encrypted with a homomorphic encryption algorithm, wherein the model data (26) may be computed in encrypted form from the training data (22) and the encrypted training result data (24) with the training function. The field data (28) may be plaintext, wherein the result data (30) may be computed in encrypted form from the field data (28) and the encrypted model data (26) with the prediction function.

    METHOD FOR PREVENTING ACCESS DATA FROM BEING TAMPERED, MOBILE TERMINAL, DEVICE, AND READABLE STORAGE MEDIUM

    公开(公告)号:EP3410667A1

    公开(公告)日:2018-12-05

    申请号:EP17743718.3

    申请日:2017-01-23

    Abstract: Disclosed are a method, a mobile terminal, a device, as well as a readable storage medium for preventing accessed data from being tampered with. The mobile terminal can: receive a data server access instruction triggered by a user for an application on the mobile terminal, and acquire from the data server a corresponding configuration file of the application and a version control file carrying verification ciphertext; encrypt the acquired configuration file according to a preset encryption method to obtain a corresponding first encrypted value of the configuration file; extract the verification ciphertext from the acquired version control file and decrypt the verification ciphertext to obtain a corresponding plaintext encrypted value; and analyze the consistency between the first encrypted value and the plaintext encrypted value and finally allow the application to access the corresponding accessed data when determining the first encrypted value and the plaintext encrypted value are consistent. Thus, the security of the offline cached accessed data is improved and the risk of the accessed data being tampered with is reduced, and in addition, the security of accessing with an application is also enhanced.

    KEY SEQUENCE GENERATION FOR CRYPTOGRAPHIC OPERATIONS

    公开(公告)号:EP3371928A1

    公开(公告)日:2018-09-12

    申请号:EP16788725.6

    申请日:2016-11-02

    CPC classification number: H04L9/0618 H04L2209/24

    Abstract: Methods, system and devices are provided that generate a sequence of sub-keys for cryptographic operations from a main key. The main key is operated on only once to generate the sub-keys of the sequence, with a transformation comprising one or more one-way functions. The respective bit values of the sub-keys of the sequence are set using respective bit values of the one or more one-way functions. Advantageously, deriving sub-key bits from respective output bits of one or more one-way functions removes or at least reduces correlations between the main key and the sub-keys, as well as between sub-keys, making it harder or even impossible to recover the main key or other sub-keys from a single sub-key, for example as found using a side-channel attack. At the same time, by using the main key only once (rather than using the main key each time a sub-key is generated), the vulnerability of the main key to a side-channel attack is reduced, because the opportunities for recovering physical information that could lead to the discovery of the main key are reduced. Specific embodiments use parallel or chained execution of sub-functions to generate respective sub-keys. Other specific embodiments generate all sub-keys from a single one-way function in one go.

    METHOD FOR HEARING SYSTEM COMMUNICATION AND RELATED DEVICES

    公开(公告)号:EP3334189A1

    公开(公告)日:2018-06-13

    申请号:EP16202919.3

    申请日:2016-12-08

    Applicant: GN Hearing A/S

    Abstract: The present disclosure relates to methods and devices for a hearing system. A method for hearing system communication in a hearing system comprising a server device and a hearing device system comprising a hearing device and a user accessory device with a user application installed thereon is disclosed, the method comprising: obtaining hearing device data for the hearing device in the server device; securing the hearing device data using a first security scheme to obtain a first output; securing the first output using a second security scheme to obtain a second output, wherein the second security scheme is different from the first security scheme; transmitting the second output to the user application; validating the second output in the user application using the second security scheme to obtain the first output; transmitting the first output to the hearing device; receiving and validating the first output in the hearing device using the first security scheme to obtain the hearing device data; and operating the hearing device according to the hearing device data.

    CONFIGURATION BASED CRYPTOGRAPHIC KEY GENERATION
    7.
    发明公开
    CONFIGURATION BASED CRYPTOGRAPHIC KEY GENERATION 审中-公开
    基于配置的密码密钥生成

    公开(公告)号:EP3319265A1

    公开(公告)日:2018-05-09

    申请号:EP17199285.2

    申请日:2017-10-30

    Abstract: In some examples, a programmable device may load configuration data into a configuration storage to configure programmable logic of the programmable device. The programmable device may include a key generation logic that may read at least a portion of the configuration data from the configuration storage. The key generation logic may generate a cryptographic key based at least in part on the at least a portion of the configuration data read from the configuration storage.

    Abstract translation: 在一些示例中,可编程设备可以将配置数据加载到配置存储器中以配置可编程设备的可编程逻辑。 可编程设备可以包括密钥生成逻辑,其可以从配置存储器读取至少一部分配置数据。 密钥生成逻辑可以至少部分地基于从配置存储器读取的配置数据的至少一部分来生成密码密钥。

    ENCODING DEVICE
    8.
    发明公开
    ENCODING DEVICE 审中-公开

    公开(公告)号:EP3239962A4

    公开(公告)日:2018-05-09

    申请号:EP15872521

    申请日:2015-11-11

    Inventor: OGAWA HIDEAKI

    CPC classification number: G09C1/00 H04L9/0618

    Abstract: [Problem] In the prior art, the encryption is based on conversion in the 4 byte unit, and there are "2 to the 32 nd power" types of existing information. Thus, the prior art has a problem that details of conversion in the encryption can be specified in actuality through verification using a method of inputting the "2 to 32 nd power" information which is known in advance so as to examine a conversion result. Thus, the present invention provides an encrypting device which makes decryption virtually impossible by devising an encryption unit. [Solution] An encrypting device for encrypting information into encrypted information is developed, which is composed of: an information obtaining unit for obtaining information; a unitization-for-conversion unit for unitizing the obtained information to unitized information in the 16-byte unit for conversion by a conversion unit which will be described later; and the conversion unit for converting the unitized information unitized in the unitization-for-conversion unit into converted unitized information using a function which cannot be expressed in a single linear expression.

    PROCÉDÉ DE CHIFFREMENT, PROCÉDÉ DE CHIFFREMENT, DISPOSITIFS ET PROGRAMMES CORRESPONDANTS
    9.
    发明公开
    PROCÉDÉ DE CHIFFREMENT, PROCÉDÉ DE CHIFFREMENT, DISPOSITIFS ET PROGRAMMES CORRESPONDANTS 审中-公开
    过程加密方法加密设备和相关程序

    公开(公告)号:EP3304531A1

    公开(公告)日:2018-04-11

    申请号:EP16728907.3

    申请日:2016-06-06

    Applicant: Ingenico Group

    Abstract: Encryption method, corresponding encryption method, devices and programs. The invention relates to a method of encrypting a code to be encrypted (
    Sx ) of a computer program using an encryption key (
    Kx ) selected from at least two encryption keys (
    Kx, Ky, Kz ). Such a method comprises: - a step of obtaining (11) a descriptive grammar (
    G D ) of the language of the code to be encrypted; - a step of coding (13) the code to be encrypted (
    Sx ) using the descriptive grammar (G
    D ) delivering a character string (
    Cd
    C ) in which at least one start instruction (InstrD) of the code to be encrypted (Sx) is coded by a representation (
    RInstrD ) in the character string (
    Cd C ); - a step of encoding (14) the character string (
    CdC ) using an encryption key (
    Kx ) belonging to the set of encryption keys (
    Kx, Ky, Kz ), delivering an encrypted string (
    Cx ). The decryption method comprises the reverse steps and also makes use of the descriptive grammar of the code to be encrypted.

    COMPUTING WITH ENCRYPTED VALUES
    10.
    发明公开
    COMPUTING WITH ENCRYPTED VALUES 审中-公开
    用加密值进行计算

    公开(公告)号:EP3298720A1

    公开(公告)日:2018-03-28

    申请号:EP16720841.2

    申请日:2016-05-05

    CPC classification number: H04L9/002 G09C1/00 H04L9/0618 H04L9/0631 H04L2209/16

    Abstract: A secure calculation is performed on at least one input value. The calculation includes a number of operations, with a first operation performed on the input value, and subsequent operations performed on results produced by previous operations. An initial encryption rank is set, based on the number of operations to be performed in the calculation. The input value is encoded, together with the initial encryption rank. The calculation is then performed, such that the first operation is performed on the encoded input value to produce an encoded result, and subsequent operations are performed on respective encoded results produced by previous operations to produce further encoded results. A new encryption rank is set when an operation in the calculation is performed on the encoded input value or on an encoded result produced by a previous operation, such that the encoded result of said operation in the calculation has the new encryption rank. A decoding function provides a useable output value from an encoded result only if the encoded result has an encryption rank that has reached a predefined value.

Patent Agency Ranking