-
公开(公告)号:US20240348433A1
公开(公告)日:2024-10-17
申请号:US18135246
申请日:2023-04-17
发明人: Jeffrey J. Stapleton
CPC分类号: H04L9/0869 , G06F7/588 , G06F7/72 , H04L9/3033 , G06F2207/7204
摘要: The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for generating, using a Quantum Random Number Generator (QRNG), an initial random number and a secondary random number, generating, using a Prime Number Generator (PGN), a random prime number using the initial random number and the secondary random number, and generating an encryption key using the random prime number, wherein the encryption key is used to encrypt first data or decrypt second data.
-
公开(公告)号:US12047497B2
公开(公告)日:2024-07-23
申请号:US18195160
申请日:2023-05-09
CPC分类号: H04L9/0825 , H04L9/0643 , H04L9/0822 , H04L9/0877 , H04L9/0894
摘要: Methods and systems are described for enhanced-security database encryption via cryptographic software, where key management is carried out, without exporting or exposing cleartext keys, using an independent key manager coupled to a cryptographic hardware security module (HSM).
-
公开(公告)号:US11997201B2
公开(公告)日:2024-05-28
申请号:US18136810
申请日:2023-04-19
CPC分类号: H04L9/0869 , H04L9/0643 , H04L9/085 , H04L9/32
摘要: Systems and methods for securely sharing and authenticating a last secret can include generating, by a cryptographic module on a first network node, a seed configured for deriving or recovering a last secret, the last secret providing access to a secure entity and being a last cryptographic element controlling access to the secure entity, creating, by the cryptographic module, an envelope for the seed, enveloping the seed by the envelope, and transmitting, by the cryptographic module, the seed to a computing system on a second node different than the first node, the computing system being configured to decrypt the envelope of the enveloped seed to recover the seed, and obtain the last secret based on the seed, where the cryptographic module is prevented from deriving the last secret.
-
公开(公告)号:US11936789B1
公开(公告)日:2024-03-19
申请号:US17886370
申请日:2022-08-11
CPC分类号: H04L9/3231 , G06F21/32 , H04L63/0861
摘要: A method includes receiving an update biometric reference sample and a user identifier by a computing system and retrieving a previous biometric reference template record in a storage location based on the user identifier by the computing system. The previous biometric reference template record includes a previous biometric reference template generated using a previous biometric reference sample. The method further includes comparing the update biometric reference sample to the previous biometric reference template by the computing system and, responsive to determining that a biometric data type of the update biometric reference sample is different than that of the previous biometric reference template, generating an update biometric reference template by the computing system. The method further includes generating an update biometric reference template record by the computing system. The method further includes receiving comparing the update biometric reference sample to the biometric authentication sample by the computing system.
-
公开(公告)号:US11843690B1
公开(公告)日:2023-12-12
申请号:US16892881
申请日:2020-06-04
CPC分类号: H04L9/0819 , H04L9/0838 , H04L9/0861 , H04L9/3247 , H04L63/06 , H04L9/0643
摘要: A method for a key management server to manage encryption for data stored by a cloud provider server includes receiving, by the key management server from the cloud provider server, a request for a drop key. The request includes a hash drop identifier that uniquely identifies a cipher drop, and the cipher drop comprises a unit of data stored by the cloud provider server. The method further includes generating the drop key based on at least the hash drop and the drop identifier and encrypting the drop key. A response comprising the encrypted drop key is sent to the cloud provider server.
-
公开(公告)号:US20230261861A1
公开(公告)日:2023-08-17
申请号:US18136810
申请日:2023-04-19
CPC分类号: H04L9/0869 , H04L9/0643 , H04L9/085 , H04L9/32
摘要: Systems and methods for securely sharing and authenticating a last secret can include generating, by a cryptographic module on a first network node, a seed configured for deriving or recovering a last secret, the last secret providing access to a secure entity and being a last cryptographic element controlling access to the secure entity, creating, by the cryptographic module, an envelope for the seed, enveloping the seed by the envelope, and transmitting, by the cryptographic module, the seed to a computing system on a second node different than the first node, the computing system being configured to decrypt the envelope of the enveloped seed to recover the seed, and obtain the last secret based on the seed, where the cryptographic module is prevented from deriving the last secret.
-
公开(公告)号:US20230208622A1
公开(公告)日:2023-06-29
申请号:US18117976
申请日:2023-03-06
CPC分类号: H04L9/0825 , H04L9/0822 , H04L9/0643 , H04L9/0869 , H04L9/0877 , H04L9/0894
摘要: A unique transaction key (Tk) is established amongst multiple entities using a common hardware security module (HSM) with a common HMAC key (HK) and transaction scheme name (T). The transaction key (Tk) can be used for various cryptographic functions (e.g. encryption, MAC, HMAC, key management) with one or more messages at the transaction or session level.
-
公开(公告)号:US11574305B1
公开(公告)日:2023-02-07
申请号:US16417396
申请日:2019-05-20
摘要: In one arrangement, a non-transitory computer readable media having computer-executable instructions embodied therein that, when executed by at least one processor of a computing system, cause the computing system to process an electronic transaction using a schema. The schema includes a first unique entity object identifier identifying a sender, a second unique entity object identifier identifying a receiver, and a first transaction object identifier identifying the transaction. The first transaction object identifier is located at a top level of a hierarchy of a plurality of transaction object identifiers. The schema further includes transaction information comprising the first unique entity object identifier, the second unique entity object identifier, and the unique transaction object identifier.
-
公开(公告)号:US11436597B1
公开(公告)日:2022-09-06
申请号:US15967311
申请日:2018-04-30
摘要: Various embodiments relate methods performed by a processor of a computing system. An example method includes receiving an agreement associated with a signing party. A hash of the agreement is generated. A biometric sample captured from a signing party is received. Each of a hash of the agreement and the biometric sample is signcrypted using each of a signing party public/private key pair associated with the signing party, and a recipient public key of a recipient public/private key pair to generate a biometrics-based electronic signature token. A smart contract based on the agreement is generated. The smart contract includes the terms of the agreement, and the biometric-based electronic signature token, the biometric-based electronic signature token providing biometric-based pre-authorization by the signing party of a payment to be initiated by the smart contract in response to detecting performance of at least one of the terms of the agreement.
-
公开(公告)号:US11356427B1
公开(公告)日:2022-06-07
申请号:US15669713
申请日:2017-08-04
摘要: Various embodiments relate to a method performed by a processor of a computing system. An example method includes generating a symmetric content encryption key. Content is encrypted using the content encryption key to generate cipher text. A hash of the cipher text is generated. Each of the hash and the content encryption key is signcrypted using each of a signcrypting party public key, a signcrypting party private key and a recipient public key to generate a signcrypted envelope message. The cipher text is embedded in a component of the signcrypted envelope message. The signcrypted envelope message is transmitted to a recipient. The recipient can designcrypt the signcrypted envelope message using each of the recipient public key, a recipient private key, and the signcrypting party public key to retrieve the content encryption key and hash of the cipher text. The recipient can decrypt the cipher text using the content encryption key.
-
-
-
-
-
-
-
-
-