-
1.
公开(公告)号:US10778423B2
公开(公告)日:2020-09-15
申请号:US15980722
申请日:2018-05-15
Applicant: HRL Laboratories, LLC
Inventor: Chongwon Cho , Karim El Defrawy , Daniel C. Apon , Jonathan Katz
Abstract: Described is a system for biometric based security. The system converts biometric data into a cryptographic key using a reusable fuzzy extractor process. The reusable fuzzy extractor process comprises a generation process and a reconstruction process. The generation process takes as input a public parameter and a first biometric input and outputs a public helper string and a first random string. The reconstruction process takes as input a public helper string and a second biometric input and outputs a second random string. The reusable fuzzy extractor process is reusable such that multiple public helper strings do not reveal any information about the first biometric input and the first random string. Secured data is unlocked by applying the cryptographic key for biometric security of access to secured data.
-
公开(公告)号:US20170316214A1
公开(公告)日:2017-11-02
申请号:US15091541
申请日:2016-04-05
Applicant: HRL Laboratories, LLC
Inventor: Karim El Defrawy , Chongwon Cho , Daniel C. Apon , Jonathan Katz
IPC: G06F21/60
CPC classification number: G06F21/60 , G06F21/14 , H04L2209/16
Abstract: Described is a system for obfuscating a computer program. Sensitive data of an unprotected computer program is received as input. A random oracle is used to algebraically hide a set of polynomial-size point functions representing the sensitive data. The system outputs a set of obfuscated instructions internally hiding the sensitive data. The set of obfuscated instructions are used to transform the unprotected computer program into a protected, obfuscated computer program that is accepting of the set of polynomial-size point functions. The obfuscated computer program is written to a non-volatile computer-readable medium.
-
公开(公告)号:US10887092B2
公开(公告)日:2021-01-05
申请号:US16433928
申请日:2019-06-06
Applicant: HRL Laboratories, LLC
Inventor: Joshua W. Baron , Karim El Defrawy , Aleksey Nogin , Chongwon Cho
Abstract: Described is a system for anonymous job allocation and majority voting in a cloud computing environment. The system broadcasts a job to physical nodes, each of the physical nodes having a control operations plane (COP) node and one or more service nodes associated with the COP node. A set of redundant job assignments is distributed to individual COP nodes pursuant to a private job assignment schedule, such that each individual COP node is only aware of its own assignment and corresponding job. The service nodes execute the job assigned to the COP nodes such that the service nodes each complete a task associated with the job and forward an individual result to their associated COP node. A privacy-preserving result checking protocol is performed amongst the COP nodes such that secret shares of a majority result are obtained and the majority result is provided to a client.
-
公开(公告)号:US20200052890A1
公开(公告)日:2020-02-13
申请号:US16433928
申请日:2019-06-06
Applicant: HRL Laboratories, LLC
Inventor: Joshua W. Baron , Karim El Defrawy , Aleksey Nogin , Chongwon Cho
Abstract: Described is a system for anonymous job allocation and majority voting in a cloud computing environment. The system broadcasts a job to physical nodes, each of the physical nodes having a control operations plane (COP) node and one or more service nodes associated with the COP node. A set of redundant job assignments is distributed to individual COP nodes pursuant to a private job assignment schedule, such that each individual COP node is only aware of its own assignment and corresponding job. The service nodes execute the job assigned to the COP nodes such that the service nodes each complete a task associated with the job and forward an individual result to their associated COP node. A privacy-preserving result checking protocol is performed amongst the COP nodes such that secret shares of a majority result are obtained and the majority result is provided to a client.
-
公开(公告)号:US10198584B2
公开(公告)日:2019-02-05
申请号:US15091541
申请日:2016-04-05
Applicant: HRL Laboratories, LLC
Inventor: Karim El Defrawy , Chongwon Cho , Daniel C. Apon , Jonathan Katz
Abstract: Described is a system for obfuscating a computer program. Sensitive data of an unprotected computer program is received as input. A random oracle is used to algebraically hide a set of polynomial-size point functions representing the sensitive data. The system outputs a set of obfuscated instructions internally hiding the sensitive data. The set of obfuscated instructions are used to transform the unprotected computer program into a protected, obfuscated computer program that is accepting of the set of polynomial-size point functions. The obfuscated computer program is written to a non-volatile computer-readable medium.
-
6.
公开(公告)号:US20200145206A1
公开(公告)日:2020-05-07
申请号:US15980722
申请日:2018-05-15
Applicant: HRL Laboratories, LLC
Inventor: Chongwon Cho , Karim El Defrawy , Daniel C. Apon , Jonathan Katz
Abstract: Described is a system for biometric based security. The system converts biometric data into a cryptographic key using a reusable fuzzy extractor process. The reusable fuzzy extractor process comprises a generation process and a reconstruction process. The generation process takes as input a public parameter and a first biometric input and outputs a public helper string and a first random string. The reconstruction process takes as input a public helper string and a second biometric input and outputs a second random string. The reusable fuzzy extractor process is reusable such that multiple public helper strings do not reveal any information about the first biometric input and the first random string. Secured data is unlocked by applying the cryptographic key for biometric security of access to secured data.
-
公开(公告)号:US10509918B1
公开(公告)日:2019-12-17
申请号:US15269367
申请日:2016-09-19
Applicant: HRL Laboratories, LLC
Inventor: Chongwon Cho , Karim El Defrawy
Abstract: Described is a system for protecting sensitive information that is hardcoded in polynomial-size ordered binary decision diagram (POBDD) form. A software executable represented as a POBDD having sensitive information embedded therein is obfuscated into an obfuscated POBDD. An input query on the obfuscated POBDD is evaluated, and the sensitive information is revealed only if the input query is a correct input. Thus, an adversary is prevented from extracting the sensitive information embedded in the POBDD.
-
8.
公开(公告)号:US20190020472A1
公开(公告)日:2019-01-17
申请号:US15976583
申请日:2018-05-10
Applicant: HRL Laboratories, LLC
Inventor: Chongwon Cho , Karim El Defrawy , Daniel C. Apon , Jonathan Katz
Abstract: Described is a system for biometric authentication. The system converts biometric data into a cryptographic key r′ using a reusable fuzzy extractor process having an underlying hash function modeling a random oracle model. The system allows access to secured services when a comparison of r′ to a previously computed cryptographic key r shows a match.
-
9.
公开(公告)号:US11101991B2
公开(公告)日:2021-08-24
申请号:US15976583
申请日:2018-05-10
Applicant: HRL Laboratories, LLC
Inventor: Chongwon Cho , Karim El Defrawy , Daniel C. Apon , Jonathan Katz
Abstract: Described is a system for biometric authentication. The system converts biometric data into a cryptographic key r′ using a reusable fuzzy extractor process having an underlying hash function modeling a random oracle model. The system allows access to secured services when a comparison of r′ to a previously computed cryptographic key r shows a match.
-
公开(公告)号:US10826686B1
公开(公告)日:2020-11-03
申请号:US16183161
申请日:2018-11-07
Applicant: HRL Laboratories, LLC
Inventor: Chongwon Cho , Chong Ding
Abstract: Described is a system for biometric based security. The system applies a reusable fuzzy vault (RFV) process to protect secret information. The RFV process comprises a locking algorithm and an unlocking algorithm. The locking algorithm takes as input a fuzzy string m generated from readings of biometrics and secret information sk to be protected, The locking algorithm outputs a public string vault and a hash value h of sk. The unlocking algorithm takes as input a public string vault and a fuzzy string m′, and outputs a string sk′ if fuzzy string m′ is sufficiently close to fuzzy string m. The unlocking algorithm further computes a hash value h′ of sk′ and compares it with h. The system allows access to the secret information sk when h′ is equivalent to h.
-
-
-
-
-
-
-
-
-