HYBRID KEY EXCHANGES FOR DOUBLE-HULLED ENCRYPTION

    公开(公告)号:US20240340273A1

    公开(公告)日:2024-10-10

    申请号:US18745913

    申请日:2024-06-17

    CPC classification number: H04L63/045 H04L9/14 H04L63/205

    Abstract: A first computing system establishes a cryptographically protected communication session with a second computing system by proposing a hybrid cryptographic scheme. In response to the proposed hybrid cryptographic scheme, a second computing system transmits cryptographic materials to the first computing system, and the first computing system transmits cryptographic materials to the second computing system. Using the cryptographic materials, two or more cryptographic keys are derived. One cryptographic key is used to perform an inner cryptographic operation on one or more data items, and another cryptographic key is used to perform an outer cryptographic operation on the one or more data items that have been cryptographically protected by the inner cryptographic operation.

    Privacy preserving account generation

    公开(公告)号:US11936796B1

    公开(公告)日:2024-03-19

    申请号:US16714496

    申请日:2019-12-13

    Abstract: Described implementations obtain credential information including an encrypted digital identity (ID). The encrypted digital ID may include a public component of a credential and identity data. Furthermore, the credential information may include cryptographically obfuscated data based on the identity data and a private component of the credential. A proof is obtained that includes proof data. The proof data may confirm that the credential information was correctly generated. Verification of the proof data, and confirmation that the cryptographically obfuscated data is not associated in a collection of cryptographically obfuscated data, cause a computer-implemented service to issue a pseudonym. The pseudonym is usable to generate a relationship associated with a computer-implemented service.

    Code signing method and system
    3.
    发明授权

    公开(公告)号:US11729002B2

    公开(公告)日:2023-08-15

    申请号:US17018192

    申请日:2020-09-11

    CPC classification number: H04L9/3247 G06F8/65 G06F21/64 H04L9/30 H04L9/3268

    Abstract: A computer system obtains a request to apply a signed patch to a piece of signed executable code. The computer system determines whether the signed patch is allowed to be applied to the signed executable based on a set of patch policies. If the patch policies allow the patch to be applied, the patch is applied to the signed executable code. The computer system generates a new digital signature for the modified executable code thereby allowing the resulting signed patched executable code to be verified and executed by the computer system.

    Data storage optimization for non-volatile memory

    公开(公告)号:US11243879B2

    公开(公告)日:2022-02-08

    申请号:US16780107

    申请日:2020-02-03

    Abstract: Non-volatile devices may be configured such that a clear operation on a single bit clears an entire block of bits. The representation of particular data structures may be optimized to reduce the number of clear operations required to store the representation in non-volatile memory. A data schema may indicate that a data structure of an application may be optimized for storage in non-volatile memory. A translation layer may convert an application level representation of a data value associated with the data structure to an optimized storage representation of the data value before storing the optimized storage representation of the data value in non-volatile memory.

    Merkle signature scheme tree expansion

    公开(公告)号:US11240042B2

    公开(公告)日:2022-02-01

    申请号:US16826973

    申请日:2020-03-23

    Abstract: A first public key is generated based at least in part on a first plurality of signing keys and a second public key is generated based at least in part on a second plurality of signing keys. The signing keys may be used to generate digital signatures. The second public key may be made available to verify a digital signature generated using a signing key from the second plurality of signing keys. In some cases, a first Merkle tree may be formed by the first public key and the first plurality of signing keys, and a second Merkle tree may be formed by the second public key, the first public key, and the second plurality of signing keys.

    Hypervisor supported secrets compartment

    公开(公告)号:US11075761B2

    公开(公告)日:2021-07-27

    申请号:US16666245

    申请日:2019-10-28

    Abstract: A secret is securely maintained on a virtualized computer system by configuring a specialized virtual machine to manage and maintain the secret on behalf of an application. When the application requests access to the secret, a controlling domain, in combination with the specialized virtual machine, validates that the application is authorized to make the request and that the application has not been compromised prior to making the request. If the request is validated, the controlling domain and the specialized virtual machine fulfill the request by providing the application with access to the secret.

    System and method for processing encrypted search

    公开(公告)号:US11023595B1

    公开(公告)日:2021-06-01

    申请号:US16213489

    申请日:2018-12-07

    Abstract: A requester submits a request to perform an encrypted search that is received by an encrypted search provider. The encrypted search provider processes the request and produces a set of intermediate results which are loaded onto a mobile computer system that includes a mobile power source. The mobile computer system is shipped to the requester, and while in transit to the requester, the mobile computer system processes the intermediate results to produce a completed search result. After the mobile computer system arrives at the requester, the mobile computer system provides the completed search result to the requester.

    Programmatic implementations generated from an API call log

    公开(公告)号:US10733036B2

    公开(公告)日:2020-08-04

    申请号:US15701203

    申请日:2017-09-11

    Abstract: Systems and methods for generating a programmatic implementation based on a set of recorded Application Programming Interface (API) calls. One example includes determining an interval of time during which actions made on an interface associated with a session user account are made, obtaining a set of records from an API call log that indicates a set of API calls made during the interval of time, and generating a programmatic implementation that is usable to submit the set of API calls.

    MERKLE SIGNATURE SCHEME TREE EXPANSION
    9.
    发明申请

    公开(公告)号:US20200220735A1

    公开(公告)日:2020-07-09

    申请号:US16826973

    申请日:2020-03-23

    Abstract: A first public key is generated based at least in part on a first plurality of signing keys and a second public key is generated based at least in part on a second plurality of signing keys. The signing keys may be used to generate digital signatures. The second public key may be made available to verify a digital signature generated using a signing key from the second plurality of signing keys. In some cases, a first Merkle tree may be formed by the first public key and the first plurality of signing keys, and a second Merkle tree may be formed by the second public key, the first public key, and the second plurality of signing keys.

    Techniques for modeling response behavior in network computing services and applications

    公开(公告)号:US10708162B1

    公开(公告)日:2020-07-07

    申请号:US14572621

    申请日:2014-12-16

    Abstract: Techniques described and suggested herein include observing, monitoring and storing sequence data and lag data associated with write and read operations between an application and a service, such as a service provided by a computing resource service provider, so as to simulate or otherwise derive consistency behavior observed therewith. The sequence data and/or lag data may be used to configure a service, such as a mock service similar to the observed service, to respond in a fashion similar to the previously monitored service.

Patent Agency Ranking