Secure digital signing
    7.
    发明授权

    公开(公告)号:US11909889B2

    公开(公告)日:2024-02-20

    申请号:US17740254

    申请日:2022-05-09

    IPC分类号: H04L9/32 H04L9/08 H04L9/30

    摘要: A public-private key cryptographic scheme is described for granting authenticating a client to a remote device or service in order to access a secure resource. The client is provided the public key, but the private key is stored in a hardware security module (HSM) that the client is not able to access. The client requests a digital signature be generated from the private key from a secure vault service. The secure vault service accesses the HSM and generates the digital certificate, which is then passed to the client. The digital certificate may be added to a security token request submitted to an identity provider. The identity provider determines whether the digital signature came from the private key. If so, the identity provider provides authenticates the client and provides an access token that is usable by the client for authentication to the remote device with the secure resource

    Device and method for protecting execution of a cryptographic operation

    公开(公告)号:US11824986B2

    公开(公告)日:2023-11-21

    申请号:US16956363

    申请日:2018-12-18

    申请人: SECURE-IC SAS

    IPC分类号: H04L9/30 H04L9/00

    摘要: There is provided a device for protecting the execution of a cryptographic operation from attacks, the cryptographic operation being implemented by a cryptographic algorithm, the cryptographic operation comprising at least one modular operation between a main base (m) representing a data block and at least one scalar (d) in at least one finite starting group. The device is configured to determine at least one intermediary group (E′) different from the at least one starting group (E), the number of intermediary groups being equal to the number of starting groups E. The device is further configured to determine at least one final group (E″) from the at least one starting group E and the at least one intermediary group E′. The base m being mapped to an auxiliary element (x) in the at least one intermediary group and to an auxiliary base (m″) in the at least one final group E″. The device performs a first elementary operation in each final group (E″i), the first elementary operation consisting in executing the modular operation between the auxiliary base (m″) and an auxiliary scalar (da) in each final group E″, which provides at least one result, the auxiliary scalar (da) being determined from the auxiliary element (x) and from the main scalar (d). The device further performs a second elementary operation in each starting group E, the second elementary operation consisting in executing the modular operation between an additional auxiliary base and an additional auxiliary scalar d′b in each starting group, at least one of the additional auxiliary base and of the additional scalar being derived from the result of the first elementary operation.

    Information processing apparatus, method and secure protocol for secure storage and transfer of data

    公开(公告)号:US11811909B2

    公开(公告)日:2023-11-07

    申请号:US17498243

    申请日:2021-10-11

    IPC分类号: H04L9/06 H04L9/30 H04L9/08

    摘要: The invention provides an information processing apparatus, method, and security protocol for secure storage and transfer of data using two-level encryption by combining RSA and AES keys. The apparatus includes circuitry (100) configured to receive encryption request, encrypt the data to generate first encryption data. The encryption of the data is based on an AES user key (103) and the received encryption request. The circuitry is further configured to encrypt the first encryption data to generate second encryption data, decrypt the second encryption data to generate first decryption data. The decryption of the second encryption data is based on a company AES key (107). The circuitry (100) is further configured to decrypt the first decryption data to generate the original data. The decryption of the first decryption data is based on an AES user key (103), and the second decryption data corresponds to the transmitted data.