-
公开(公告)号:US12010221B2
公开(公告)日:2024-06-11
申请号:US17947151
申请日:2022-09-18
发明人: Craig Steven Wright
CPC分类号: H04L9/085 , H04L9/0825 , H04L9/3013 , H04L9/3066 , H04L9/3236
摘要: A method of communicating a secret (k0, k1) on the Bitcoin blockchain is disclosed. The method comprises sending information identifying secrets selectable by the recipient and receiving a first public key (Ui) of an elliptic curve cryptography system, corresponding to a first secret (Si) selected for access by the recipient and for which a first private key (m) is accessible to the recipient. A second public key (U1-i) is received, corresponding to a second secret not selected for access by the recipient, wherein a corresponding second private key is not available to the recipient. First and second secrets encrypted by means of the respective first and second public keys (X0, X1) are sent to the recipient, wherein the first secret is accessible to the recipient by means of the first private key, the second secret is inaccessible to the recipient, and the sender is unable to distinguish between the first and second secrets.
-
公开(公告)号:US20240187262A1
公开(公告)日:2024-06-06
申请号:US18553015
申请日:2022-04-12
发明人: Marcel Armour , Charles Grover , Shahram Mossayebi
CPC分类号: H04L9/3278 , H04L9/3073 , H04L9/3247
摘要: Methods, apparatuses, devices and computer readable media are provided in relation to firmware encryption. In one example, a method is provided, the method for providing firmware to an electronic device. The electronic device comprises a security module having a physical unclonable function (PUF), the security module configured to establish a firmware key pair (FPK, FSK) based on a challenge and response to the PUF, the firmware key pair comprising a firmware public key (FPK) and a firmware secret key (FSK). The method comprises causing a hash of the firmware to be signed using a secret key of a key pair to obtain a signature over the hash, the key pair comprising a public key and the secret key, wherein the public key is embedded securely in the electronic device. The method further comprises encrypting the firmware and the signature over the hash using a server encryption key. The method further comprises encrypting a server decryption key using the FPK, the server decryption key for decrypting the encrypted firmware and the encrypted signature. The method further comprises communicating the encrypted firmware, the encrypted signature, and the encrypted server decryption key to a third party for installation on the electronic device.
-
公开(公告)号:US20240187253A1
公开(公告)日:2024-06-06
申请号:US18512406
申请日:2023-11-17
发明人: Xinying YANG , Ruide ZHANG
CPC分类号: H04L9/3247 , H04L9/30 , H04L9/3297
摘要: The present disclosure relates to a data processing method, apparatus and computer readable storage medium, and relates to the technical fields of data storage and computer. The method of the present disclosure includes: sending a digest of data to be stored to a trusted execution environment; receiving combined information and a signature thereof returned by the trusted execution environment, wherein the combined information comprises the digest of the data to be stored, a timestamp and a monotonic counter value which are generated by the trusted execution environment and correspond to the data to be stored; and storing the data to be stored, the combined information and the signature.
-
公开(公告)号:US20240187232A1
公开(公告)日:2024-06-06
申请号:US18520250
申请日:2023-11-27
发明人: Devon Howard Crouse
摘要: In some implementations, the techniques may include receiving a request to launch a first instance in a customer partition. The request can identify one or more of a cluster and an instance image. In addition, the techniques may include launching the first instance on a server in the customer partition using the instance image identified by the request. The techniques may include receiving a request to authenticate the first instance. Moreover, the techniques may include in response to a determination that the first instance is authentic: adding the first instance to the cluster identified in the request.
-
公开(公告)号:US20240187229A1
公开(公告)日:2024-06-06
申请号:US18076312
申请日:2022-12-06
申请人: VMware LLC
发明人: Igor Golikov , Aran Bergman , Lior Gal , Avishay Yanai , Israel Cidon , Alex Markuze , Eyal Zohar
IPC分类号: H04L9/30 , H04L9/00 , H04L67/568
CPC分类号: H04L9/30 , H04L9/008 , H04L67/568 , H04L12/66
摘要: Some embodiments of the invention provide a method for WAN (wide area network) optimization for a WAN that connects multiple sites, each of which has at least one router. At a gateway router deployed to a public cloud, the method receives from at least two routers at least two sites, multiple data streams destined for a particular centralized datacenter. The method performs a WAN optimization operation to aggregate the multiple streams into one outbound stream that is WAN optimized for forwarding to the particular centralized datacenter. The method then forwards the WAN-optimized data stream to the particular centralized datacenter.
-
公开(公告)号:US12003642B2
公开(公告)日:2024-06-04
申请号:US17507549
申请日:2021-10-21
申请人: Stephen Mayne
发明人: Stephen Mayne
CPC分类号: H04L9/3226 , H04L9/0643 , H04L9/0863 , H04L9/30 , H04L9/3234 , H04L9/50
摘要: In an example, a non-transitory machine-readable storage medium includes stored instructions. The store instructions, when executed by one or more processors, cause the one or more processors to: receive a unique identifier of a tagged physical good; receive a public key stored in a Non-Fungible Token (NFT) corresponding to the unique identifier; encrypt a first passphrase using the public key to obtain an encrypted passphrase; compare a second passphrase to the first passphrase; and generate an output indication in response to comparing the second passphrase to the first passphrase. The second passphrase is generated by decrypting the encrypted passphrase using a private key stored on an electronic tag device embedded in the tagged physical good.
-
公开(公告)号:US12003632B2
公开(公告)日:2024-06-04
申请号:US17575267
申请日:2022-01-13
发明人: Antonino Mondello , Alberto Troia
摘要: Secure communication in accessing a network is described herein. An example apparatus can include a memory and a processor coupled to the memory. The processor can be configured to receive an identity public key from the identity device. The identity public key can be received in response to providing, to the identity device, a request to modify content of the identity device. The processor can be further configured to encrypt data corresponding to subscriber information using the identity public key, provide (to the identity device) the encrypted data to store the subscriber information in the identity device, and access a network operated by a network operator via the data stored in the identity device.
-
88.
公开(公告)号:US12003629B2
公开(公告)日:2024-06-04
申请号:US17564909
申请日:2021-12-29
申请人: John A. Nix
发明人: John A. Nix
CPC分类号: H04L9/0861 , H04L9/0825 , H04L9/0852 , H04L9/3093 , H04L9/3247 , H04L9/3263
摘要: A network and a device can support a secure session with both (i) multiple post-quantum cryptography (PQC) key encapsulation mechanisms (KEM) and (ii) forward secrecy. The network can operate (i) a first server for conducting KEM with the device and (ii) a second server for generating a digital signature which can be verified by the device with a server certificate. The first server can receive a device ephemeral public key (ePK.device) and generate (i) a server ephemeral public key (ePK.server) and private key. The first server can send, to the second server, data comprising ciphertext for the ePK.device, ePK.server and the server certificate. The second server can (i) generate the digital signature over the data, and (ii) send the digital signature to the first server. The first server can conduct a KEM with ePK.device and the ciphertext in order to encrypt at least ePK.server and the digital signature.
-
公开(公告)号:US20240179131A1
公开(公告)日:2024-05-30
申请号:US18059137
申请日:2022-11-28
CPC分类号: H04L63/0272 , H04L9/0838 , H04L9/3073
摘要: Some examples relate to a pre-shared key based virtual private network. In an example, a VPN server generates a unique pre-shared key (PSK) corresponding to an identity of a VPN client. The VPN server creates a mapping between the identity and the unique PSK of the VPN client, and stores it in a database. The VPN server shares the unique PSK with the VPN client. In response to receiving an IKE packet comprising an encrypted identity of the VPN client, the VPN server decrypts the encrypted identity of the VPN client from the IKE packet to determine the identity of the VPN client associated with the IKE packet. The VPN server retrieves the unique PSK corresponding to the identity of the VPN client associated with the IKE packet from the mapping stored in the database. The VPN server establishes a VPN connection with the VPN client.
-
">90.
公开(公告)号:US20240178996A1
公开(公告)日:2024-05-30
申请号:US18433664
申请日:2024-02-06
发明人: John A. Nix
IPC分类号: H04L9/08 , G06F21/35 , G06F21/44 , H04J11/00 , H04L9/00 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40 , H04L12/28 , H04L67/04 , H04W4/70 , H04W8/08 , H04W12/02 , H04W12/033 , H04W12/04 , H04W12/06 , H04W12/069 , H04W12/40 , H04W40/00 , H04W52/02 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12
CPC分类号: H04L9/0861 , G06F21/35 , G06F21/445 , H04J11/00 , H04L9/006 , H04L9/0816 , H04L9/0841 , H04L9/085 , H04L9/088 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3066 , H04L9/32 , H04L9/321 , H04L9/3239 , H04L9/3247 , H04L9/3249 , H04L9/3263 , H04L12/2854 , H04L63/0272 , H04L63/0435 , H04L63/0442 , H04L63/045 , H04L63/061 , H04L63/0807 , H04L63/123 , H04L63/166 , H04L67/04 , H04W4/70 , H04W8/082 , H04W12/02 , H04W12/033 , H04W12/04 , H04W12/06 , H04W12/069 , H04W12/40 , H04W40/005 , H04W52/0216 , H04W52/0235 , H04W52/0277 , H04W76/27 , H04W80/04 , H05K999/99 , G06F2221/2105 , G06F2221/2107 , G06F2221/2115 , H04L63/0464 , H04L2209/24 , H04L2209/72 , H04L2209/805 , H04W84/12 , H04W88/12 , Y02D30/70
摘要: A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the Internet to communicate with a module using a module identity, (i) receive server instructions, and (iii) send module instructions. Data can be encrypted and decrypted using a set of cryptographic algorithms and a set of cryptographic parameters. The set of servers can (i) receive a module public key with a module identity, (ii) authenticate the module public key, and (iii) receive a subsequent series of module public keys derived by the module with a module identity. The application interface can use a first server private key and the module controller can use a second server private key.
-
-
-
-
-
-
-
-
-