WEB OF TRUST MANAGEMENT IN A DISTRIBUTED SYSTEM
    64.
    发明申请
    WEB OF TRUST MANAGEMENT IN A DISTRIBUTED SYSTEM 审中-公开
    分布式系统中的信任管理网络

    公开(公告)号:US20160323110A1

    公开(公告)日:2016-11-03

    申请号:US15204927

    申请日:2016-07-07

    Abstract: A new version of a structured collection of information, different from a previous version, of a cryptographic domain is created. The new version is created to be verifiable as a valid successor to the previous version and to specify a new set of quorum rules, with the new set of quorum rules defining one or more conditions to be fulfilled by a plurality of operators as conditions precedent to update the structured collection. The new version is provided to the plurality of operators. Digital signatures corresponding to the new version are obtained, and, as a result of the digital signatures received fulfilling the one or more conditions defined by a previous set of quorum rules specified by the previous version, the new version is caused to replace the previous version.

    Abstract translation: 创建了与旧版本不同的加密域的新版本的结构化信息集合。 新版本被创建为可验证为先前版本的有效后继者,并指定一组新的仲裁规则,新的一组法定规则定义一个或多个条件由多个运营商履行,作为先决条件的先决条件 更新结构化集合。 新版本被提供给多个操作者。 获得对应于新版本的数字签名,并且由于接收的数字签名符合由先前版本规定的先前的一组法定规则所定义的一个或多个条件,导致新版本替换以前的版本 。

    Supporting a fixed transaction rate with a variably-backed logical cryptographic key
    65.
    发明授权
    Supporting a fixed transaction rate with a variably-backed logical cryptographic key 有权
    支持具有可变背景的逻辑加密密钥的固定事务速率

    公开(公告)号:US09438421B1

    公开(公告)日:2016-09-06

    申请号:US14318375

    申请日:2014-06-27

    CPC classification number: H04L9/0891 H04L9/088 H04L9/14 H04L63/065

    Abstract: A system and method for receiving requests for performing cryptographic operations with a virtual key having a plurality of actual keys associated with the virtual key, determining which actual key of the plurality of actual keys to use for the cryptographic operation, performing the cryptographic operation using the actual key, and providing the result of performing the cryptographic operation.

    Abstract translation: 一种用于接收使用具有与所述虚拟键相关联的多个实际键的虚拟键执行加密操作的请求的系统和方法,确定用于所述密码操作的所述多个实际密钥中的哪个实际密钥,使用所述密码操作 实际密钥,并提供执行密码操作的结果。

    Secure initialization vector generation
    66.
    发明授权
    Secure initialization vector generation 有权
    安全初始化向量生成

    公开(公告)号:US09407437B1

    公开(公告)日:2016-08-02

    申请号:US14225243

    申请日:2014-03-25

    Abstract: A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In some examples, the plaintext and cryptographic key are input into an effectively one-way function, such as a cryptographic hash function, the output of which is usable as an initialization vector. Cryptographic keys may be rotated probabilistically based at least in part on probabilities of output collisions of the effectively one-way function to ensure a low probability of two different plaintexts resulting in calculation of the same initialization vector for use with the same cryptographic key.

    Abstract translation: 使用明文和密码密钥来产生要用于密码算法(例如加密算法)中的初始化向量。 在一些示例中,明文和密码密钥被输入到有效的单向函数中,例如密码散列函数,其输出可用作初始化向量。 密码密钥可以至少部分地基于有效单向函数的输出冲突的概率来概率地旋转,以确保两个不同明文的低概率,导致计算与相同加密密钥一起使用的相同的初始化向量。

    Host attestation
    67.
    发明授权

    公开(公告)号:US11620387B2

    公开(公告)日:2023-04-04

    申请号:US17321356

    申请日:2021-05-14

    Abstract: A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment.

    Data sharing method
    68.
    发明授权

    公开(公告)号:US11599655B1

    公开(公告)日:2023-03-07

    申请号:US16138875

    申请日:2018-09-21

    Abstract: A first entity having a first set of tagged data and a second entity having a second set of tagged data share data that is selected based on a set of common tags present in both the first and second sets of tagged data. The set of common tags is determined using a private set intersection protocol that, in many examples, preserves the privacy of the two entities. In an embodiment, each entity identifies a set of data objects associated with the set of common tags, and another private set intersection protocol is performed to identify a set of common data objects available to both entities. Each entity provides, to the other entity, those data objects associated with the set of common tags that are not in the set of common data objects available to both entities thereby providing a matching set of data objects to both entities.

Patent Agency Ranking