摘要:
A method for managing unlinkable database user identifiers includes distributing to a first database a first encrypted user identifier, a first database identifier, and a first database user identifier; distributing to a second database a second encrypted user identifier, a second database identifier, and a second database user identifier; receiving from the first database a third encryption and a fourth encryption, the third encryption being formed from the first encrypted user identifier, the second database identifier, and a message comprised in the fourth encryption; decrypting the third encryption thereby obtaining a decrypted value; deriving a blinded user identifier from the decrypted value; and sending the encrypted blinded user identifier and the fourth encrypted value to the second server thereby enabling the second server to compute the second database user identifier from the encrypted blinded database user identifier and the decrypted fourth encrypted value.
摘要:
A system and method for identifying special information is provided. Endpoints are defined within a voice recording. One or more of the endpoints are identified within the voice recording and the voice recording is partitioned into segments based on the identified endpoints. Elements of text are identified by applying speech recognition to each of the segments and a list of prompt list candidates are applied to the text elements. The segments with text elements that match one or more prompt list candidates are identified. Portions of the voice recording following the prompt list candidates that include special information are identified and the special information is rendered unintelligible within the voice recording.
摘要:
Methods and devices for thwarting code and control flow based attacks on software. The source code of a subject piece of software is automatically divided into basic blocks of logic. Selected basic blocks are amended so that their outputs are extended. Similarly, other basic blocks are amended such that their inputs are correspondingly extended. The amendments increase or create dependencies between basic blocks such that tampering with one basic block's code causes other basic blocks to malfunction when executed.
摘要:
A plural number M (M≧2) of block cipher encryption units perform, in a block order, either encryption processing or decryption processing for data of a series of blocks each having a predetermined data size and included in a data unit. The plural number of block cipher encryption units perform either encryption of decryption for the data unit by repeating processing in the block order. Every time processing of a data unit starts, a block cipher encryption unit configured to process the data of the nMth (nM
摘要:
A method is disclosed. The method includes generating an obfuscated portion using a dynamic cryptogram unique to a transaction, where the dynamic cryptogram is determined using a uniquely derived key. The method also includes replacing a middle portion of the account identifier with the obfuscated portion to form an obfuscated account identifier.
摘要:
A method for secure data transformation and lookup is executed by a computer system. A data value to create an encrypted value is encrypted by the computer system. A hash value based on the encrypted value is generated by the computer system. A modulo operation is performed by the computer system on the hash value to create a modulo value. A transformed value from a lookup table is retrieved by the computer system by using the modulo value as an index for the look up table. The transformed value is provided by the computer system.
摘要:
A method for secure and anonymous electronic communication via cryptography-facilitated delivery. The method handles and delivers messages such that the intended recipients are not revealed to any third party, nor is the sender revealed to any third party other than the server (or equivalent distribution mechanism). Messages are cryptographically signed and encrypted by the sender, after which the resulting encrypted payloads are distributed to all clients. Clients then attempt to decrypt the payloads, where successful decryption indicates that a client is the intended recipient of a message. The decrypted message is then processed with all known public keys (of which the client is aware) to determine whether any of the keys successfully validate the message against the included signature provided by the sender. If the message is successfully validated, the recipient has successfully received the message and identified the sender.
摘要:
An NLFSR of length k, configured to output a sequence of masked values x′i=xi+mi according to a masked recurrence x′n+k=f(x′n, . . . , x′n+k−1), the NLFSR including a nonlinear feedback function configured to compute f(x′n, . . . , x′n+k−1) so as to obtain a feedback value, a correction function configured to compute (mn, . . . , nn+k−1)+mn+k+h(mn, mn+k−1, xn, . . . , xn+k−1) to obtain a correction value c, and a corrector configured to correct the feedback value {circumflex over (x)}′n+k using the correction value c to obtain a corrected feedback value which forms x′n+k.
摘要翻译:长度为k的NLFSR被配置为根据掩码的复现x'n + k = f(x'n,...,x'n + k-1)输出掩蔽值序列x'i = xi + mi, ,NLFSR包括被配置为计算f(x'n,...,x'n + k-1)的非线性反馈函数,以便获得反馈值,配置成计算(mn,..., nn + k-1)+ mn + k + h(mn,mn + k-1,xn,...,xn + k-1)以获得校正值c,以及校正器, 使用校正值c对(x)}'n + k进行回旋以获得形成x'n + k的校正反馈值。
摘要:
Systems and techniques for securing accessible computer-executable program code and systems are provided. One or more base functions may be generated and blended with existing program code, such that it may be difficult or impossible for a potential attacker to distinguish the base functions from the existing code. The systems and code also may be protected using a variety of other blending and protection techniques, such as fractures, variable dependent coding, dynamic data mangling, and cross-linking, which may be used individually or in combination, and/or may be blended with the base functions.
摘要:
A method begins by a processing module applying a share encoding function on data to produce a plurality of encoded shares and generating a corresponding plurality of random numbers for the plurality of encoded shares. The method continues with the processing module generating an encryption key based on a common password and a corresponding one of the corresponding plurality of random numbers and encrypting the encoded share utilizing the encryption key to produce an encrypted share for each encoded share of the plurality of encoded shares. The method continues with the processing module facilitating storage of the corresponding plurality of random numbers and each of the encrypted shares.