Binding of multiple heterogeneous root certificate authorities

    公开(公告)号:US11930125B2

    公开(公告)日:2024-03-12

    申请号:US17404572

    申请日:2021-08-17

    申请人: Entrust, Inc.

    IPC分类号: H04L9/32 H04L9/08

    摘要: Root certificates generated by root certificate authorities may be bound at the time of generation. In an example, a first root certificate can include an identity of a first root certificate authority, a first key identifier associated with a first key of the first root certificate authority and an identity of a first digital signature algorithm used by the first root certificate authority. The first root certificate can also include at least one extension including a second key identifier of a second key associated with the second root certificate authority and an identity of a second digital signature algorithm used by the second root certificate authority, the second digital signature algorithm being different from the first digital signature algorithm.

    Detection of video tampering
    5.
    发明授权

    公开(公告)号:US11902559B2

    公开(公告)日:2024-02-13

    申请号:US16865708

    申请日:2020-05-04

    申请人: Intel Corporation

    摘要: Techniques are provided for generation of secure video and tamper detection of the secure video. A methodology implementing the techniques according to an embodiment includes selecting a subset of macroblocks from a video frame to be transmitted and calculating a low frequency metric on each of the selected macroblocks. The method also includes performing a hash calculation on the low frequency metrics to generate a frame signature; encrypting the frame signature (using a private key) to generate an encrypted watermark; and modifying pixels of each of the selected macroblocks to generate the secured video frame, the modifications based on bits of the encrypted watermark that are associated with the selected macroblock. The method further includes authenticating a received video frame by comparing a calculated frame signature to an authenticated frame signature, the authenticated frame signature decrypted (using a public key) from an extracted watermark of the received video frame.

    Virtual key binding method and system

    公开(公告)号:US11882509B2

    公开(公告)日:2024-01-23

    申请号:US17133230

    申请日:2020-12-23

    发明人: Ziyao Cheng

    IPC分类号: H04W4/80 H04W4/48 H04L9/32

    摘要: The present disclosure relates to the technical field of vehicle, and discloses a virtual key binding method and system, including: when an input binding instruction is detected, a terminal device extracts a device fingerprint of the terminal device and generates a service key; and generates device feature information including the device fingerprint and the service key, and sends the device feature information to a service server, so as to enable the service server to store the device feature information in an on-board electronic device of a vehicle to be bound; and when it is detected that a binding result sent by the service server is a successful binding, the terminal device stores Bluetooth information in the binding result, the Bluetooth information matching with the vehicle to be bound.

    Double wrapping for verification
    9.
    发明授权

    公开(公告)号:US11698970B2

    公开(公告)日:2023-07-11

    申请号:US17563409

    申请日:2021-12-28

    摘要: Methods, systems, and devices for double wrapping for verification are described. In some cases, a memory subsystem can receive a firmware image for the memory subsystem where the firmware image is signed with a first signature according to a first signing procedure. The memory subsystem can then verify an integrity of the firmware image based on the first signing procedure. After verifying the integrity of the firmware image, the memory subsystem can then generate a second signature for the firmware image based on a second signing procedure different from the first signing procedure. The memory subsystem can then write the second signature to the firmware image. The memory subsystem can then perform a verification process to verify the integrity of the firmware image based on one or both of the first signing procedure or the second signing procedure. In this case, a first verification time is associated with the first signing procedure and is greater than a second verification time associated with the second signing procedure.