-
公开(公告)号:US11818254B2
公开(公告)日:2023-11-14
申请号:US16639000
申请日:2018-08-16
发明人: Dai Ikarashi , Ryo Kikuchi , Koji Chida
CPC分类号: H04L9/085 , G09C1/04 , H04L9/008 , H04L9/0861 , H04L2209/46
摘要: A share [x]i of plaintext x in accordance with Shamir's secret sharing scheme is expressed by N shares [x0]i, . . . , [xN−1]i, and each share generating device Ai obtains a function value ri=Pm(i(−))(si) of a seed si, obtains a first calculated value ζi=λ(i, i(−))[xi(−)]i+ri using a Lagrange coefficient λ(i, i(−)), a share [xi(−)]i, and the function value ri, and outputs the first calculated value ζi to a share generating device Ai(−). Each share generating device Ai accepts a second calculated value ζi(+), obtains a third calculated value zi=λ(i, i(+))[xi]i+ζi(+) using a Lagrange coefficient λ(i, i(+)), a share [xi]i, and the second calculated value ζi(+), and obtains information containing the seed si and the third calculated value zi as a share SSi of the plaintext x in secret sharing and outputs the share SSi.
-
公开(公告)号:US20200211423A1
公开(公告)日:2020-07-02
申请号:US16609156
申请日:2017-04-28
申请人: Lihui Wang
发明人: Lihui WANG
摘要: Disclosed are a method and apparatus for remembering passwords with the least amount of memory, overcoming the disadvantage that previously, passwords or fixed codes, such as credit card numbers, were inconvenient to record and difficult to remember. People's long-term memories regarding ethnic characters, letters, digits and patterns are used; one or two of the above are selected to intersect with blank units or information code matrices, the contents of which can be changed by characters to be set, so as to obtain coincident points and non-coincident points; according to the step of reading information thereabout as specified or according to the steps of filling in, confusing and re-finding fixed codes, passwords or the fixed codes are obtained; regarding a mechanical apparatus, a key, on which an imprint is left by means of pressing a character, can be expanded into long chains, two chains are matched to obtain more logic states, and a plurality of passwords are obtained by means of reading and segmentation as specified; regarding an electronic-type apparatus, three three-colour light-emitting diodes are connected to symmetrical switch buttons to form a matrix template; digits, capital letters and small letters and symbols to be set printed on the template are displayed; according to light colours of the light-emitting diodes and whether same are in a light-emitting state, information codes are arranged as specified; and a canonical character model ensures that the passwords or the fixed codes obtained every time are the same as those set before.
-
公开(公告)号:US10242203B2
公开(公告)日:2019-03-26
申请号:US15019743
申请日:2016-02-09
摘要: A computer implement format preservation based masking system and method is provided. The system obtains a first set of letters and a private key, and encrypts the first set of letters to obtain an encrypted letters list using the first set and private key. The encrypted letters list comprises a set of encrypted letters. A dynamic map is generated based on the encrypted letters, which includes one or more keys, each key being specific to a letter in the first set letters. A position of each of maskable letters in a second set of letters is calculated using the dynamic map, and performs masking of the maskable letters based on the position of each of the maskable letters to obtain masked data using the dynamic map.
-
公开(公告)号:US20190007389A1
公开(公告)日:2019-01-03
申请号:US16126045
申请日:2018-09-10
CPC分类号: H04L63/083 , G06F21/36 , G06F2221/2103 , G06Q20/322 , G06Q20/325 , G06Q20/382 , G06Q20/40 , G06Q20/4014 , G09C1/04 , H04L9/3271 , H04L63/0428 , H04L63/08 , H04L63/10 , H04L63/1408 , H04L2463/102
摘要: A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network based on input provided by way of a user interface displaying a plurality of images. An alphanumeric string is generated based on the received plurality of codes and based on a table that associates each one of the plurality of codes with a respective one of the plurality of images and with a respective one of a plurality of alphanumeric characters. A determination is made as to whether to grant authorization based on whether the generated alphanumeric string matches an alphanumeric user identifier stored in a memory device in association with a user.
-
公开(公告)号:US10009169B2
公开(公告)日:2018-06-26
申请号:US15200635
申请日:2016-07-01
申请人: Zettaset, Inc.
发明人: Eric A. Murray
CPC分类号: H04L9/0618 , G06F7/74 , G09C1/00 , H04L9/065 , H04L9/14 , H04L2209/24 , H04L2209/34
摘要: A format-preserving cipher including encryption and decryption schemes supporting non-linear access to input data by allowing the selection of portions of data from a potentially larger dataset to be encrypted. The cipher first defines a forward mapping from the allowable ciphertext values to an integer set of the number of such allowable ciphertext values, and a corresponding reverse mapping. It also supports exclusion of a certain set of characters from the ciphering process. An encryption algorithm is provided that encrypts the input plaintext data while preserving its original format and length, and a corresponding decryption algorithm is provided. The cipher advantageously embodies the encryption and decryption of multi-byte values, composite datasets, credit card numbers and discontinuous datasets, thus fitting a variety of industrial needs.
-
公开(公告)号:US07382878B2
公开(公告)日:2008-06-03
申请号:US09888316
申请日:2001-06-22
CPC分类号: H04L9/065 , Y10S707/99942
摘要: A system and method for encrypting and/or compressing an input data string is disclosed. The input data string is divided into a plurality of blocks of data that each contains a plurality of bits of data. A block code is used to identify the size of each of the blocks of data. The blocks of data are analyzed to determine how frequently different groups of bits of data are present within each block of data. The blocks of data are also analyzed to determine whether certain relationships among the groups of bits of data exist within the blocks of data. After the blocks of data are analyzed, and in response to the analyses, a control code is generated for each block of data through the use of a control code index. After the control code for each block of data is generated, a position code is also generated for each block of data in response to the control code for the corresponding block of data. The control code, block code, and position code for each of the blocks of data can then be combined to produce an encrypted data string.
摘要翻译: 公开了一种用于加密和/或压缩输入数据串的系统和方法。 输入数据串被分成多个数据块,每个数据块包含多个数据位。 块代码用于标识每个数据块的大小。 分析数据块以确定在每个数据块内存在不同数据位组的频率。 还分析数据块以确定在数据块内存在数据位组之间的某些关系是否存在。 在分析数据块之后,并且响应于分析,通过使用控制代码索引为每个数据块生成控制代码。 在产生每个数据块的控制代码之后,响应于相应的数据块的控制代码也为每个数据块生成位置代码。 然后可以组合每个数据块的控制码,块码和位置码,以产生加密的数据串。
-
公开(公告)号:US2403736A
公开(公告)日:1946-07-09
申请号:US64472332
申请日:1932-11-28
申请人: MCCLARAN JOHN W
发明人: MCCLARAN JOHN W
IPC分类号: G09C1/04
CPC分类号: G09C1/04
-
-
公开(公告)号:US1441109A
公开(公告)日:1923-01-02
申请号:US49962321
申请日:1921-09-10
申请人: ALLEN NEWELL
发明人: ALLEN NEWELL
IPC分类号: G09C1/04
CPC分类号: G09C1/04
-
公开(公告)号:US11282414B2
公开(公告)日:2022-03-22
申请号:US15770380
申请日:2016-10-24
申请人: Drexel University , Ioannis Savidis , Kyle Juretus
发明人: Ioannis Savidis , Kyle Juretus
摘要: There are several approaches to encrypting circuits: combination logic encryption, encrypted gate topologies, transmission gate topologies, and key expansion of gate topologies. One of the approaches provides a circuit having a gate topology comprising a logic gate with integrated key transistors, where the key transistors comprise at least a PMOS stack and an NMOS stack. The PMOS stack comprises a first PMOS switch and a second PMOS switch, where the first and the second PMOS switches have sources to a voltage source and drains that serve as a source to a third PMOS switch. The NMOS stack comprises a first NMOS switch and a second NMOS switch, where the first and the second NMOS switches have sources to ground and drains that serve as a source to a third NMOS switch. Each of the above approaches may encrypt a circuit with certain advantages in delay and power consumption.
-
-
-
-
-
-
-
-
-