-
公开(公告)号:US20240354192A1
公开(公告)日:2024-10-24
申请号:US18760171
申请日:2024-07-01
申请人: Pure Storage, Inc.
发明人: Jason K. Resch , Wesley B. Leggette
IPC分类号: G06F11/10 , G06F3/06 , G06F11/00 , G06F11/14 , G06F11/16 , G06F15/173 , G06F21/62 , G06F21/64 , H04L9/00 , H04L9/08 , H04L9/32 , H04L9/40 , H04L67/1097
CPC分类号: G06F11/1076 , G06F3/06 , G06F3/0604 , G06F3/0619 , G06F3/064 , G06F3/067 , G06F11/00 , G06F11/1612 , G06F15/17331 , G06F21/6272 , G06F21/64 , H04L9/085 , H04L9/0863 , H04L9/0869 , H04L9/0877 , H04L9/0894 , H04L9/32 , H04L9/321 , H04L9/3263 , H04L63/123 , G06F11/1446 , G06F2211/1028 , H04L9/00 , H04L67/1097 , H04L2209/16
摘要: A storage network operates by: obtaining audit records, wherein each of the audit records indicates: a timestamp for a corresponding message, at least one event type code selected from a plurality of event type codes for a corresponding audit event of the corresponding message, and an identifier for a corresponding system entity associated with at least one event corresponding to the at least one event code; aggregating a number of audit records over a period of time; generating an audit file to include the number of audit records and integrity information; and facilitating storage of the audit file by utilizing a name of the audit file.
-
公开(公告)号:US20240348439A1
公开(公告)日:2024-10-17
申请号:US18683351
申请日:2022-08-22
IPC分类号: H04L9/08 , H04W12/0431
CPC分类号: H04L9/0891 , H04L9/085 , H04W12/0431
摘要: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may transmit a request for an on-demand secret key to a network entity, such as if a secret key for a sidelink channel has expired before a refresh timer of the secret key expires. The UE may transmit a request for an update to a secret key associated with a first physical layer channel secured for sidelink communications based on the secret key being expired. The request may include an identifier of the first physical layer channel associated with the secret key. The UE may receive the update to the secret key based transmitting the request. In some cases, the UE may transmit an indication of the update to the secret key to a second UE.
-
公开(公告)号:US12107951B2
公开(公告)日:2024-10-01
申请号:US17638226
申请日:2020-09-02
CPC分类号: H04L9/0825 , H04L9/085 , H04L9/3221 , H04L9/3247
摘要: Some embodiments are directed to a system (100) for selectively disclosing attributes of a record. An issuer device (110) generates a digital signature on a message comprising the attributes and a secret record identifier. The record, secret record identifier, and signatures are provided to a selector device. The selector device (111) selectively discloses attributes of the record to a receiver device (112), proving authenticity by means of a zero-knowledge proof of knowledge of the signature on the attributes. The receiver device (112) verifies the proof with respect to the public key of the issuer and the received attributes.
-
">
公开(公告)号:US20240323005A1
公开(公告)日:2024-09-26
申请号:US18438147
申请日:2024-02-09
发明人: John A. Nix
IPC分类号: H04L9/08 , G06F21/35 , G06F21/44 , H04J11/00 , H04L9/00 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40 , H04L12/28 , H04L67/04 , H04W4/70 , H04W8/08 , H04W12/02 , H04W12/033 , H04W12/04 , H04W12/06 , H04W12/069 , H04W12/40 , H04W40/00 , H04W52/02 , H04W76/27 , H04W80/04 , H04W84/12 , H04W88/12
CPC分类号: H04L9/0861 , G06F21/35 , G06F21/445 , H04J11/00 , H04L9/006 , H04L9/0816 , H04L9/0841 , H04L9/085 , H04L9/088 , H04L9/0894 , H04L9/14 , H04L9/30 , H04L9/3066 , H04L9/32 , H04L9/321 , H04L9/3239 , H04L9/3247 , H04L9/3249 , H04L9/3263 , H04L12/2854 , H04L63/0272 , H04L63/0435 , H04L63/0442 , H04L63/045 , H04L63/061 , H04L63/0807 , H04L63/123 , H04L63/166 , H04L67/04 , H04W4/70 , H04W8/082 , H04W12/02 , H04W12/033 , H04W12/04 , H04W12/06 , H04W12/069 , H04W12/40 , H04W40/005 , H04W52/0216 , H04W52/0235 , H04W52/0277 , H04W76/27 , H04W80/04 , G06F2221/2105 , G06F2221/2107 , G06F2221/2115 , H04L63/0464 , H04L2209/24 , H04L2209/72 , H04L2209/805 , H04W84/12 , H04W88/12 , Y02D30/70
摘要: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
-
公开(公告)号:US12101418B2
公开(公告)日:2024-09-24
申请号:US17689809
申请日:2022-03-08
发明人: Brian Edward Mastenbrook , John So
CPC分类号: H04L9/3271 , H04L9/085 , H04L9/0894 , H04L9/3073
摘要: Disclosed herein is a data storage device. A data port transmits data between a host computer system and the data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine connected between the data port and the storage medium uses a cryptographic key to decrypt the encrypted user content data. The access controller generates a challenge for a manager device. The challenge comprises a blinded public key of an ephemeral unlock key pair that is blinded by an unlock blinding key. The challenge further comprises the unlock blinding key in encrypted form. The access controller further provides the challenge to the device to be authorized for sending the challenge to the manager device; receives a response to the challenge; decrypts the unlock blinding key and calculates a shared secret; and upon determining that the response indicates approval of registering the device, registers the device to be authorized as an authorized device.
-
公开(公告)号:US20240313953A1
公开(公告)日:2024-09-19
申请号:US18410434
申请日:2024-01-11
申请人: Google LLC
IPC分类号: H04L9/08
CPC分类号: H04L9/085
摘要: This document describes systems and techniques for using cryptography, secret sharing, secure MPC, garbled circuits, and oblivious transfer to select digital components in ways that preserve user privacy and protects the security of data of each party that is involved in the selection process. A method includes obtaining, by a first computer of a secure multi-party computation (MPC) system, at least a first share of user data related to a user of a client device. For each digital component in a set, a first secret share of a condition bit for the condition is obtained for each of one or more conditions that condition eligibility of the digital component for distribution. A garbled circuit is executed to select a given digital component for which each of the one or more conditions of the digital component is satisfied using the first secret share and the second secret share for each condition.
-
公开(公告)号:US12095928B2
公开(公告)日:2024-09-17
申请号:US17650895
申请日:2022-02-14
申请人: Robert Bosch GmbH
发明人: Jan Zibuschka , Paulius Duplys , Robert Szerwinski
CPC分类号: H04L9/3247 , G06F8/65 , H04L9/085 , H04L9/0852
摘要: A method for updating a software component. The method includes providing a first electronic device and a second electronic device that are connected in a first network, receiving update information for the second electronic device via the first electronic device, the update information being provided with a signature that is generated with the aid of a post-quantum algorithm (PQA) signature, checking the update information by validating the signature by the first electronic device, relaying the update information to the second electronic device if the update information is deemed to be valid, and updating a software component of the second electronic device using the update information.
-
公开(公告)号:US12095916B2
公开(公告)日:2024-09-17
申请号:US17648837
申请日:2022-01-25
CPC分类号: H04L9/0894 , H04L9/0825 , H04L9/085 , H04L9/0861
摘要: A computer-implemented method for managing a life-cycle of at least in parts interdependent cryptographic keys is disclosed. Each of the cryptographic keys is signed and relates to a different one of artifacts. The method comprises creating a key manifest, wherein the key manifest comprises data about determined dependencies of the cryptographic keys at a point in time when one of the artifacts is built encrypting the key manifest with a manifest key, and upon a life-cycle change happening to one out of the group comprising one of the artifacts and one of the interdependent cryptographic keys in the key manifest of the one of the artifacts, the method comprises decrypting the key manifest and invoking an action to a related one out of the group comprising the one of the artifacts and at least one of the interdependent cryptographic keys in accordance with the key manifest.
-
公开(公告)号:US12095908B2
公开(公告)日:2024-09-17
申请号:US17518905
申请日:2021-11-04
发明人: Nam-Su Jho , Ju-Young Kim , Ku-Young Chang
IPC分类号: H04L9/08 , G06F18/214 , G06N3/04 , H04L9/06
CPC分类号: H04L9/0861 , G06F18/214 , G06N3/04 , H04L9/0643 , H04L9/0825 , H04L9/085
摘要: Disclosed herein are a key generation apparatus and method based on machine learning. The key generation method includes generating, by first and second key generation apparatuses, first and second commit values, and uploading the first commit value and the second commit value to an external repository, training, by the first and second key generation apparatuses, a neural network so as to match weight values with each other, sharing, by the first and second key generation apparatuses, the first and second commit values with each other, comparing shared first and second commit values with uploaded commit values, and then verifying the commit values, and when verification of the commit values has succeeded, generating, by the first and second key generation apparatuses, hash values using the matched weight value, verifying whether the hash values are identical to each other, and generating a session secret key based on a result of verification.
-
公开(公告)号:US12095907B2
公开(公告)日:2024-09-17
申请号:US17835421
申请日:2022-06-08
申请人: Apple Inc.
发明人: Vishnu Pillai Janardhanan Pillai , Rantao Chen , Gianpaolo Fasoli , Frederic Jacobs , Rupamay Saha , Yannick L. Sierra , Dian Wen , Ka Yang
CPC分类号: H04L9/085 , G06Q20/3829 , H04L9/3247 , H04L63/0428 , H04L63/061 , H04L63/0823
摘要: Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.
-
-
-
-
-
-
-
-
-