METHODS AND SYSTEMS FOR USING SMART NETWORK INTERFACE CARDS TO SECURE DATA TRANSMISSION OF DISAGGREGATED HARDWARE

    公开(公告)号:US20240364501A1

    公开(公告)日:2024-10-31

    申请号:US18308131

    申请日:2023-04-27

    申请人: VMware LLC

    IPC分类号: H04L9/08 H04L9/00

    CPC分类号: H04L9/0819 H04L9/006

    摘要: This disclosure is directed to methods and systems that establish a secure data channel between a host and a disaggregated hardware device (“DHD”) of a data center. The system comprises an initiator host that runs objects, such as virtual machines and containers. The host includes an initiator smart network interface card (“SNIC”). The initiator SNIC includes a virtual device, a trust platform module (“TPM”) and a security engine. The system also comprises a target host equipped with a DHD and a target SNIC. The target SNIC includes a TPM and a security engine. The TPM and the security engine of the initiator SNIC and the TPM and the security engine of the target SNIC establish a secure data channel between an object running on the host and the DHD.

    Blockchain network identifier claiming using registration status requests

    公开(公告)号:US12132820B1

    公开(公告)日:2024-10-29

    申请号:US17325646

    申请日:2021-05-20

    申请人: VERISIGN, INC.

    发明人: Swapneel Sheth

    摘要: Systems, methods, computer products for associating a blockchain address with a network identifier enable operations that may include: receiving, over a computer network and by a network identifier infrastructure operator, a request for a registration status of the network identifier; retrieving, by the network identifier infrastructure operator, an association of the network identifier with the blockchain address; signing, by a private key of a key pair of the network identifier infrastructure operator, the association of the network identifier with the blockchain address, which produces a signed association of the network identifier with the blockchain address; and providing, over the computer network and by the network identifier infrastructure operator, the signed association of the network identifier with the blockchain address.

    NETWORK COMMUNICATION METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM

    公开(公告)号:US20240356760A1

    公开(公告)日:2024-10-24

    申请号:US18372601

    申请日:2023-09-25

    发明人: Xueyang HAN

    IPC分类号: H04L9/32 H04L9/08

    CPC分类号: H04L9/3263 H04L9/0819

    摘要: This application provides a network communication method performed by a computer device acting as a second communication terminal. The method includes: transmitting an encrypted communication connection request to a first communication terminal; receiving a second digital certificate from the first communication terminal; receiving a compressed digital certificate returned by the first communication terminal in response to a first key negotiation request transmitted to the first communication terminal, the compressed digital certificate being obtained through compression of the first digital certificate; performing consistency verification on the second digital certificate and the compressed digital certificate; determining that the consistency verification succeeds and identity verification of the first communication terminal based on the second digital certificate succeeds; generating an encrypted communication key; and performing encrypted communication with the first communication terminal based on the encrypted communication key.

    SYSTEM AND METHOD FOR QUANTUM RESISTANT KEY DISTRIBUTION FOR SECURING GTP TRAFFIC

    公开(公告)号:US20240356731A1

    公开(公告)日:2024-10-24

    申请号:US18136651

    申请日:2023-04-19

    IPC分类号: H04L9/08 H04L9/40

    摘要: Techniques and architecture are described for securing traffic between nodes of a network against quantum computing attacks. For example, a first node of a network generates a random number input string and provides the random number input string to a second node. The first node may use the random number input string to generate at least one first key and an associated identifier. The first node may forward the associated identifier to the second node. Using the random number input string, the second node may generate at least one second key. Based at least in part on the associated identifier, the second node may select the at least one second key as a common encryption key. The at least one second key and the at least one first key are identical. Based at least in part on the common encryption key, the nodes may encrypt and decrypt traffic between them.

    Method for supporting sharing of travel history of travelers in airports

    公开(公告)号:US12126743B2

    公开(公告)日:2024-10-22

    申请号:US17793430

    申请日:2020-03-02

    IPC分类号: H04L9/00 H04L9/08 H04L9/30

    CPC分类号: H04L9/50 H04L9/0819 H04L9/30

    摘要: A method for supporting sharing of travel history of travelers in airports includes receiving, by a trusted entity of the distributed ledger system, a registration request from a traveler via a traveler application. The registration request provides personal information of the traveler to the trusted entity. The method further includes generating, by the trusted entity, a public key for the traveler using an identity-based encryption mechanism and sending, from the trusted entity to the global identity blockchain, a registration transaction with respect to the traveler. The registration transaction comprises the public key of the traveler. The method further includes recording a travel history that includes all travel tickets of the traveler, wherein a Merkle tree of all the travel tickets of the traveler is generated. The Merkle tree has a Merkle root, and the Merkle root of the Merkle tree is stored in the global identity blockchain.

    Novel Approach To Protect Hardware Managed Integrated Cryptographic Engine Keys Efficiently While Preventing Data At Rest Attacks

    公开(公告)号:US20240348437A1

    公开(公告)日:2024-10-17

    申请号:US18301305

    申请日:2023-04-17

    IPC分类号: H04L9/08

    CPC分类号: H04L9/088 H04L9/0819

    摘要: Various embodiments include methods implemented in a processor for management of cryptographic keys of an integrated cryptographic engine. Embodiments may include detecting a cryptographic key access control event, determining whether the cryptographic key access control event is for disabling cryptographic key access at a cryptographic key memory of the integrated cryptographic engine, disabling cryptographic key access at the cryptographic key memory in response to determining that the cryptographic key access control event is for disabling cryptographic key access at the cryptographic key memory, and maintaining one or more cryptographic keys at the cryptographic key memory for which cryptographic key access is disabled. Embodiments may further include enabling cryptographic key access at the cryptographic key memory in response to determining that the cryptographic key access control event is not for disabling cryptographic key access at the cryptographic key memory.

    Long-lasting refresh tokens in self-contained format

    公开(公告)号:US12113903B2

    公开(公告)日:2024-10-08

    申请号:US18148935

    申请日:2022-12-30

    申请人: SAP SE

    IPC分类号: H04L9/32 H04L9/08

    摘要: The present disclosure relates to computer-implemented methods, software, and systems for securely generating a new access token based on relatively long-lasting refresh tokens in self-contained format. A first request to generate a new access token for authorization of a client application with an application server is received and includes a first protected version of a refresh token. The first protected version of the refresh token is an encrypted version of the refresh token based on a first client identifier. The first protected version of the refresh token is decrypted to determine content of the refresh token based on a second client identifier of the client application that is externally invoked for validating the authorization. In response to successfully decrypting the first protected version, performing a validation of the refresh token. In response to successfully validating the refresh token, generating the new access token and providing it to the client application.