CALCULATION SYSTEM, CALCULATION METHOD, AND INFORMATION STORAGE MEDIUM

    公开(公告)号:US20240364511A1

    公开(公告)日:2024-10-31

    申请号:US18140628

    申请日:2023-04-28

    CPC classification number: H04L9/0894 H04L9/006 H04L9/0869

    Abstract: Provided is a computing system including: a first device configured to securely manage first secret information and first permutation information; and a second device configured to securely manage second secret information and second permutation information and wherein first managed information that is managed by the first device from among first permutation results obtained as a result of permutating the first secret information, second managed information that is managed by the first device from among second permutation results obtained as a result of permutating the second secret information, third managed information that is managed by the second device from among the first permutation results, and fourth managed information that is managed by the second device from among the second permutation results are used to compute a secret product being a product of the first secret information and the second secret information.

    Data Protection with Two Password Asymmetric Encryption

    公开(公告)号:US20240364503A1

    公开(公告)日:2024-10-31

    申请号:US18769927

    申请日:2024-07-11

    Inventor: Hao Cheng

    Abstract: Techniques for protecting data using two password asymmetric encryption based on time-constrained password-based partner tokens. To encrypt data, a first partner computing device receives a first partner token from a second computing device. The first partner computing device decrypts the first partner token to recover first public key data generated by the second partner computing device. The first partner computing device derives a cryptographic encryption key to encrypt the data based on the first public key data, and based on first private key data generated by the first partner computing device. The second computing device may decrypt the encrypted data based on a second partner token generated by the first partner computing device, using a cryptographic decryption key derived using second private key data generated by the second computing device and second public key data generated by the first computing device and embedded and encrypted in the second partner token.

    System and method for a token gateway environment

    公开(公告)号:US12132837B2

    公开(公告)日:2024-10-29

    申请号:US18153587

    申请日:2023-01-12

    Abstract: Embodiments include a method for providing tokens which includes: receiving from a user system an encrypted data packet including user credentials and a request for an authentication token to access protected resources; extracting the user's security information; transmitting a data packet to a security and access management system, where the data packet includes the user's security information and a request for user validation; receiving, from the security and access management system, user validation and additional data; generating a thin token and a fat token; storing the thin token in association with the fat token; transmitting the thin token to the user system; receiving, from the user system, a request to access protected resources from a protected resource system, the request including the thin token; validating the received thin token; accessing the fat token associated with the thin token; and transmitting the fat token to the protected resource system.

    KEY MANAGEMENT METHOD, KEY MANAGEMENT APPARATUS, KEY MANAGEMENT DEVICE AND STORAGE MEDIUM

    公开(公告)号:US20240333499A1

    公开(公告)日:2024-10-03

    申请号:US18714541

    申请日:2022-09-30

    Inventor: Xishuang XING

    CPC classification number: H04L9/0894 H04L9/0819

    Abstract: The present application is applicable to the technical field of security management, and discloses a secret-key managing method, a secret-key managing apparatus, a secret-key managing device and a non-transitory readable storage medium. By constructing a multi-node secret-key storing system, in response to secret-key data required by an encryption-decryption service program being not in an operating state, storing the secret-key data into a random node in the multi-node secret-key storing system, and controlling the secret-key data to migrate among nodes in the multi-node secret-key storing system according to a predetermined migration rule, rather than directly storing in the internal memory corresponding to the encryption-decryption service program, the attacker cannot know the storage position of the secret-key data, and thus has difficulty in stealing the secret-key data with conventional attacking means. Moreover, when a secret-key invoking request based on the encryption-decryption service program is received, the storage position of the secret-key data at the current moment can be determined based on the predetermined migration rule, to feed back the secret-key invoking request.

Patent Agency Ranking