Method and system for communicating a secret

    公开(公告)号:US12010221B2

    公开(公告)日:2024-06-11

    申请号:US17947151

    申请日:2022-09-18

    摘要: A method of communicating a secret (k0, k1) on the Bitcoin blockchain is disclosed. The method comprises sending information identifying secrets selectable by the recipient and receiving a first public key (Ui) of an elliptic curve cryptography system, corresponding to a first secret (Si) selected for access by the recipient and for which a first private key (m) is accessible to the recipient. A second public key (U1-i) is received, corresponding to a second secret not selected for access by the recipient, wherein a corresponding second private key is not available to the recipient. First and second secrets encrypted by means of the respective first and second public keys (X0, X1) are sent to the recipient, wherein the first secret is accessible to the recipient by means of the first private key, the second secret is inaccessible to the recipient, and the sender is unable to distinguish between the first and second secrets.

    ENCRYPTED AND AUTHENTICATED FIRMWARE PROVISIONING WITH ROOT-OF-TRUST BASED SECURITY

    公开(公告)号:US20240187262A1

    公开(公告)日:2024-06-06

    申请号:US18553015

    申请日:2022-04-12

    IPC分类号: H04L9/32 H04L9/30

    摘要: Methods, apparatuses, devices and computer readable media are provided in relation to firmware encryption. In one example, a method is provided, the method for providing firmware to an electronic device. The electronic device comprises a security module having a physical unclonable function (PUF), the security module configured to establish a firmware key pair (FPK, FSK) based on a challenge and response to the PUF, the firmware key pair comprising a firmware public key (FPK) and a firmware secret key (FSK). The method comprises causing a hash of the firmware to be signed using a secret key of a key pair to obtain a signature over the hash, the key pair comprising a public key and the secret key, wherein the public key is embedded securely in the electronic device. The method further comprises encrypting the firmware and the signature over the hash using a server encryption key. The method further comprises encrypting a server decryption key using the FPK, the server decryption key for decrypting the encrypted firmware and the encrypted signature. The method further comprises communicating the encrypted firmware, the encrypted signature, and the encrypted server decryption key to a third party for installation on the electronic device.

    DATA PROCESSING METHOD, APPARATUS AND COMPUTER READABLE STORAGE MEDIUM

    公开(公告)号:US20240187253A1

    公开(公告)日:2024-06-06

    申请号:US18512406

    申请日:2023-11-17

    IPC分类号: H04L9/32 H04L9/30

    摘要: The present disclosure relates to a data processing method, apparatus and computer readable storage medium, and relates to the technical fields of data storage and computer. The method of the present disclosure includes: sending a digest of data to be stored to a trusted execution environment; receiving combined information and a signature thereof returned by the trusted execution environment, wherein the combined information comprises the digest of the data to be stored, a timestamp and a monotonic counter value which are generated by the trusted execution environment and correspond to the data to be stored; and storing the data to be stored, the combined information and the signature.

    SECURED BOOTSTRAP WITH DYNAMIC AUTHORIZATION
    84.
    发明公开

    公开(公告)号:US20240187232A1

    公开(公告)日:2024-06-06

    申请号:US18520250

    申请日:2023-11-27

    IPC分类号: H04L9/32 H04L9/30

    CPC分类号: H04L9/32 H04L9/30

    摘要: In some implementations, the techniques may include receiving a request to launch a first instance in a customer partition. The request can identify one or more of a cluster and an instance image. In addition, the techniques may include launching the first instance on a server in the customer partition using the instance image identified by the request. The techniques may include receiving a request to authenticate the first instance. Moreover, the techniques may include in response to a determination that the first instance is authentic: adding the first instance to the cluster identified in the request.

    System and method for authentication using non-fungible tokens

    公开(公告)号:US12003642B2

    公开(公告)日:2024-06-04

    申请号:US17507549

    申请日:2021-10-21

    申请人: Stephen Mayne

    发明人: Stephen Mayne

    摘要: In an example, a non-transitory machine-readable storage medium includes stored instructions. The store instructions, when executed by one or more processors, cause the one or more processors to: receive a unique identifier of a tagged physical good; receive a public key stored in a Non-Fungible Token (NFT) corresponding to the unique identifier; encrypt a first passphrase using the public key to obtain an encrypted passphrase; compare a second passphrase to the first passphrase; and generate an output indication in response to comparing the second passphrase to the first passphrase. The second passphrase is generated by decrypting the encrypted passphrase using a private key stored on an electronic tag device embedded in the tagged physical good.

    Secure communication in accessing a network

    公开(公告)号:US12003632B2

    公开(公告)日:2024-06-04

    申请号:US17575267

    申请日:2022-01-13

    CPC分类号: H04L9/088 H04L9/30 H04W12/04

    摘要: Secure communication in accessing a network is described herein. An example apparatus can include a memory and a processor coupled to the memory. The processor can be configured to receive an identity public key from the identity device. The identity public key can be received in response to providing, to the identity device, a request to modify content of the identity device. The processor can be further configured to encrypt data corresponding to subscriber information using the identity public key, provide (to the identity device) the encrypted data to store the subscriber information in the identity device, and access a network operated by a network operator via the data stored in the identity device.

    Secure server digital signature generation for post-quantum cryptography key encapsulations

    公开(公告)号:US12003629B2

    公开(公告)日:2024-06-04

    申请号:US17564909

    申请日:2021-12-29

    申请人: John A. Nix

    发明人: John A. Nix

    IPC分类号: H04L9/08 H04L9/30 H04L9/32

    摘要: A network and a device can support a secure session with both (i) multiple post-quantum cryptography (PQC) key encapsulation mechanisms (KEM) and (ii) forward secrecy. The network can operate (i) a first server for conducting KEM with the device and (ii) a second server for generating a digital signature which can be verified by the device with a server certificate. The first server can receive a device ephemeral public key (ePK.device) and generate (i) a server ephemeral public key (ePK.server) and private key. The first server can send, to the second server, data comprising ciphertext for the ePK.device, ePK.server and the server certificate. The second server can (i) generate the digital signature over the data, and (ii) send the digital signature to the first server. The first server can conduct a KEM with ePK.device and the ciphertext in order to encrypt at least ePK.server and the digital signature.

    PRE-SHARED KEY BASED VIRTUAL PRIVATE NETWORK
    89.
    发明公开

    公开(公告)号:US20240179131A1

    公开(公告)日:2024-05-30

    申请号:US18059137

    申请日:2022-11-28

    IPC分类号: H04L9/40 H04L9/08 H04L9/30

    摘要: Some examples relate to a pre-shared key based virtual private network. In an example, a VPN server generates a unique pre-shared key (PSK) corresponding to an identity of a VPN client. The VPN server creates a mapping between the identity and the unique PSK of the VPN client, and stores it in a database. The VPN server shares the unique PSK with the VPN client. In response to receiving an IKE packet comprising an encrypted identity of the VPN client, the VPN server decrypts the encrypted identity of the VPN client from the IKE packet to determine the identity of the VPN client associated with the IKE packet. The VPN server retrieves the unique PSK corresponding to the identity of the VPN client associated with the IKE packet from the mapping stored in the database. The VPN server establishes a VPN connection with the VPN client.