Nonlinear Or Chaotic System Patents (Class 380/263)
  • Patent number: 10680807
    Abstract: An improved method of distributing timing information is provided. The method includes transmitting encrypted timing signals from two or more beacons at different locations. The encrypted timing signals are transmitted at regular intervals and are received by a receiver. The receiver then performs a logic operation on the encrypted timing signals and validates, based on the logic operation, the authenticity of the timing signals. The logic operation also results in a decrypted message from the beacons, which can contain additional information, for example, data to be sent back to the beacons to verify receipt.
    Type: Grant
    Filed: May 25, 2018
    Date of Patent: June 9, 2020
    Assignee: UT-Battelle LLC
    Inventor: Warren P. Grice
  • Patent number: 10664238
    Abstract: A true random number generator including a light source configured to produce randomly distributed photons, a plurality of detection channels configured to receive the randomly distributed photons produced by the light source, each detection channel including a photon sensor configured to detect a receipt of at least one photon during successive integration time-periods and generate an output signal by assigning a value for each integration time-period based on whether at least one photon was received during each integration time-period, a signal conditioning unit configured to condition the output signal of each of the plurality of detection channels and generate a conditioned output signal for each of the plurality of detection channels, and a signal processing unit configured to combine the conditioned output signals and generate a true random number based on the combination of the conditioned output signals.
    Type: Grant
    Filed: January 26, 2018
    Date of Patent: May 26, 2020
    Assignee: THE RESEARCH FOUNDATION FOR THE STATE UNIVERSITY OF NEW YORK
    Inventors: Vera Gorfinkel, Boris Gorbovitski, Dmytro Gudkov
  • Patent number: 10546147
    Abstract: A file system stores files in a location base on deterministic nonlinear functions using certain initial conditions of the files creation. The file is chunked and encrypted according to one of a set of encryption algorithms based on the initial conditions. Only the file name and associated initial conditions are stored; the initial location and encryption algorithm are not stored and therefore not retrievable. The file system periodically relocates the files based on one of a set of algorithms based on the initial conditions such that even if the initial location where know, the file would still be irretrievable without knowing the relation between the initial conditions and relocation algorithm. During retrieval, the system uses the stored initial conditions to identify the initial location, relocation algorithm, and encryption algorithm.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: January 28, 2020
    Assignee: Rockwell Collins, Inc.
    Inventors: Joseph J. Engler, Aaron M. Meis
  • Patent number: 10467425
    Abstract: A system, method and apparatus that uses a quantum event-based, binary data generation apparatus operating in combination with a single-party or two-party, symmetric and/or asymmetric key storage system to create both random numbers and encryption keys to be used for purposes of encryption and decryption of a user's or organization's file data.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: November 5, 2019
    Assignee: GoKnown LLC
    Inventor: Michael Harold
  • Patent number: 10419019
    Abstract: A data compression system can include a compression unit comprising a single chaotic system having an identified initial condition that produces a desired output sequence of data corresponding to a data set being stored. The single chaotic system can be identified using a chain of controlled nonlinear systems and a dynamical search technique to match the output, in sequence over consecutive time intervals with the chain of the controlled nonlinear systems.
    Type: Grant
    Filed: November 13, 2016
    Date of Patent: September 17, 2019
    Assignee: CHAOLOGIX, INC.
    Inventor: Abraham Miliotis
  • Patent number: 10411889
    Abstract: In an embodiment, an apparatus includes a first logic to receive from a first node a synchronization portion of a message and to generate a set of state information using the synchronization portion, to synchronize the apparatus with the first node. The apparatus may further include a second logic to decrypt a data portion of the message using the set of state information to obtain a decrypted message. Other embodiments are described and claimed.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: September 10, 2019
    Assignee: Intel Corporation
    Inventors: David Gomez Gutierrez, Rafael De La Guardia Gonzalez
  • Patent number: 10263728
    Abstract: A transmit signal can be distorted with non-linear distortion, and one or more characteristics of the non-linear distortion can be periodically changed in accordance with a change key. The transmission received at a receiver can thus comprise a severely distorted version of the transmission of the transmit signal. A receiver with the same change key can recognize and decode the transmission, but it can be extraordinarily difficult for receivers that lack the change key to detect and decode the transmission. The transmission can be a communications while jamming (CWJ) transmission. The CWJ transmission can contain a coded message that can be decoded only by friendly RF receivers, and the CWJ transmission can also jam unfriendly RF receivers that lack a change key for decoding the coded message.
    Type: Grant
    Filed: March 24, 2014
    Date of Patent: April 16, 2019
    Assignee: L-3 COMMUNICATIONS CORP.
    Inventors: Janez Jeraj, Osama S. Haddadin
  • Patent number: 10217057
    Abstract: Apparatus and methods for removing leakage from a qubit. In one aspect, an apparatus includes one or more qubits, wherein each qubit facilitates occupation of at least one of a plurality of qubit levels, the qubit levels including two computational levels and one or more non-computational levels that are each higher than the computational levels, wherein the qubit facilitates transitions between qubit levels associated with a corresponding transition frequency; a cavity, wherein the cavity defines a cavity frequency; one or more couplers coupling each qubit to the cavity; one or more couplers coupling the cavity to an environment external to the one or more qubits and the cavity; a frequency controller that controls the frequency of each qubit such that, for each qubit, the frequency of the qubit is adjusted relative to the cavity frequency such that a population of a non-computational level is transferred to the cavity.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: February 26, 2019
    Assignee: Google LLC
    Inventor: Rami Barends
  • Patent number: 9998918
    Abstract: A method for deducing a quantity (?), in two distinct locations, from further distinct measurable quantities. The method comprises the steps of observing with a first device (CD) the quantity (?) from an intercepted signal, whereby the device is placed in a location with first coordinates (Xi, Yi, Zi); providing a second device (AS) in a location with second coordinates (Xs, Ys, Zs); causing the second device to transmit a signal to be intercepted by the first device (CD); whereby the second device (AS) needs to know the second coordinates and be informed of the first coordinates of the first device (CD) to calculate the quantity (?) that can be obtained from measurements by the first device (CD); the quantity (?) thereby being known by the second device (AS) and the first device (CD) without the need to communicate the quantity or any other value that is sufficient for a third device to deduce the quantity (?).
    Type: Grant
    Filed: January 24, 2014
    Date of Patent: June 12, 2018
    Assignee: SD Science & Development SA
    Inventor: Bo Gustafson
  • Patent number: 9990180
    Abstract: A system, method, and device for stochastically processing data. There is an architect module operating on a processor configured to manage and control stochastic processing of data, a non-deterministic data pool module configured to provide a stream of non-deterministic values that are not derived from a function, a plurality of functionally equivalent data processing modules each configured to stochastically process data as called upon by the architect module, a data feed configured to feed a data set desired to be stochastically processed, and a structure memory module including a memory storage device and configured to provide sufficient information for the architect module to duplicate a predefined processing architecture and to record a utilized processing architecture.
    Type: Grant
    Filed: August 29, 2017
    Date of Patent: June 5, 2018
    Assignee: CASSY HOLDINGS LLC
    Inventor: Patrick D. Ross
  • Patent number: 9847879
    Abstract: The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x?=x·L+c, in which x is the data to be masked, x? is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method.
    Type: Grant
    Filed: November 8, 2011
    Date of Patent: December 19, 2017
    Assignee: MORPHO
    Inventors: Hervé Chabanne, Julien Bringer, Thanh Ha Le
  • Patent number: 9780946
    Abstract: A method in an elliptic curve cryptographic system, the method being executed by an electronic device and including a multiplication operation of multiplying a point of an elliptic curve by a scalar number, the point having affine coordinates belonging to a Galois field, the multiplication operation including steps of detecting the appearance of a point at infinity during intermediate calculations of the multiplication operation, and of activating an error signal if the point at infinity is detected and if the number of bits of the scalar number processed by the multiplication operation is lower than the rank of the most significant bit of an order of a base point of the cryptographic system.
    Type: Grant
    Filed: August 5, 2015
    Date of Patent: October 3, 2017
    Assignee: Inside Secure
    Inventor: Vincent Dupaquis
  • Patent number: 9722784
    Abstract: A quantum cryptographic key distribution system, including: an optical source, which generates a plurality of optical pulses; an optical beam splitter, which generates, starting from each optical pulse, a first and a second optical sub-pulse; a first and a second peripheral device; and an optical path having a first and a second end connected to the optical beam splitter, the optical path extending through the first and second peripheral devices and being traversed in opposite directions by the first and second optical sub-pulses. The peripheral device randomly phase shifts the second optical sub-pulse by a first phase, and the second peripheral device randomly phase shifts the first optical sub-pulse by a second phase. Furthermore, the optical path is such as to cause interference in the first optical beam splitter between the first and second optical sub-pulses, as a function of first and second phases.
    Type: Grant
    Filed: January 24, 2014
    Date of Patent: August 1, 2017
    Assignee: SELEX ES S.p.A.
    Inventor: Fabio Antonio Bovino
  • Patent number: 9600238
    Abstract: Various embodiments are provided for fully digital chaotic differential equation-based systems and methods. In one embodiment, among others, a digital circuit includes digital state registers and one or more digital logic modules configured to obtain a first value from two or more of the digital state registers; determine a second value based upon the obtained first values and a chaotic differential equation; and provide the second value to set a state of one of the plurality of digital state registers. In another embodiment, a digital circuit includes digital state registers, digital logic modules configured to obtain outputs from a subset of the digital shift registers and to provide the input based upon a chaotic differential equation for setting a state of at least one of the subset of digital shift registers, and a digital clock configured to provide a clock signal for operating the digital shift registers.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: March 21, 2017
    Assignee: King Abdullah University of Science and Technology (KAUST)
    Inventors: Ahmed Gomaa Ahmed Radwan, Mohammed Affan Zidan, Khaled Nabil Salama
  • Patent number: 9544277
    Abstract: A software system which uses a specially designed cellular automaton network to perform symmetric-key encryptions and decryptions of user-supplied input messages. The input messages are in the form of text or images or audio data. A mathematical function based on Fibonacci sequences in the complex domain is used to define interactions among the cells of the cellular automaton network. The outputs of the system are encryptions of the user inputs; a simple key inversion procedure enables the decrypting of the encrypted output. The system permits multiple encryptions of the input and this, in turn, requires multiple decryptions to obtain the original input.
    Type: Grant
    Filed: September 9, 2015
    Date of Patent: January 10, 2017
    Inventor: Roger G Marshall
  • Patent number: 9438422
    Abstract: In an embodiment, an apparatus includes a first logic to receive from a first node a synchronization portion of a message and to generate a set of state information using the synchronization portion, to synchronize the apparatus with the first node. The apparatus may further include a second logic to decrypt a data portion of the message using the set of state information to obtain a decrypted message. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: September 6, 2016
    Assignee: Intel Corporation
    Inventors: David Gomez Gutierrez, Rafael De La Guardia Gonzalez
  • Patent number: 9372150
    Abstract: An optical system for sensing an environmental parameter, comprising: an optical pulse generator for generating an excitation pulse; a pulse splitter for splitting the excitation pulse into a sensing pulse and a reference pulse; a sensing arm for receiving the sensing pulse, the sensing arm comprising an emission sensor for sensing the environmental parameter, the optical emission sensor generating a first measurement pulse having a measurement wavelength; a reference arm for receiving the reference pulse, the reference arm comprising an emission artifact adapted to convert the reference pulse into a second measurement pulse having the measurement wavelength; a time delay line for delaying a relative propagation of the measurement pulses; a light detector for measuring an optical energy of the first and second measurement pulses; and an optical link for optically connecting the pulse generator to the pulse splitter, and the sensing and reference arms to the light detector.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: June 21, 2016
    Assignee: INSTITUT NATIONAL D'OPTIQUE
    Inventor: François Babin
  • Patent number: 9319877
    Abstract: The technology includes a method for generating a secret key. The method includes receiving initialization data, the initialization data includes an initialization packet and a transmission path channel response; generating sample data based on the transmission path channel response; and generating a secret key based on the sample data utilizing a chaotic map.
    Type: Grant
    Filed: December 21, 2010
    Date of Patent: April 19, 2016
    Assignee: Massachusetts Institute of Technology
    Inventor: Megumi Ando
  • Patent number: 9116838
    Abstract: Systems and methods for calculating the Lyapunov exponent of a chaotic system are described. In one particular embodiment, a Lyapunov exponent calculating method includes obtaining a value indicative of a condition of a chaotic system and assigning the value to first and second precision levels, the second precision level having a higher level of precision than the first precision level. The method also includes iterating the chaotic system over time and comparing the value at the first precision level with the value at the second precision level. From the comparison of values at the first and second precision levels, the method calculates the Lyapunov exponent for the chaotic system.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: August 25, 2015
    Assignee: The United States of America as represented by the Secretary of the Army
    Inventors: Gorden Videen, Robert H Dalling
  • Patent number: 8929554
    Abstract: Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
    Type: Grant
    Filed: June 6, 2013
    Date of Patent: January 6, 2015
    Assignee: Los Alamos National Security, LLC
    Inventors: Richard John Hughes, Jane Elizabeth Nordholt, Charles Glen Peterson
  • Patent number: 8913745
    Abstract: A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time.
    Type: Grant
    Filed: August 5, 2013
    Date of Patent: December 16, 2014
    Assignee: Cisco Technology Inc.
    Inventors: Chaim Shen-Orr, Zvi Shkedy, Reuven Elbaum, Yonatan Shlomovich, Yigal Shapiro, Yaacov Belenky, Yaakov (Jordan) Levy, Reuben Sumner, Itsik Mantin
  • Patent number: 8885833
    Abstract: A key recovery request for a device is received at a key recovery service and a particular one-time recovery credential in a sequence of multiple one-time recovery credentials is identified. In the sequence of multiple one-time recovery credentials, previous one-time recovery credentials in the sequence are indeterminable given subsequent one-time recovery credentials in the sequence. A recovery key associated with the device is also identified. The particular one-time recovery credential in the sequence is generated based on the recovery key, and is returned in response to the key recovery request. The particular one-time recovery credential can then be used by the device to decrypt encrypted data stored on a storage media of the device.
    Type: Grant
    Filed: April 11, 2011
    Date of Patent: November 11, 2014
    Assignee: Microsoft Corporation
    Inventors: Benjamin E. Nick, Magnus Bo Gustaf Nyström, Cristian M. Ilac, Niels T. Ferguson, Nils Dussart
  • Patent number: 8861735
    Abstract: A system and method for securing communications between a plurality of users communicating over an optical network. The system utilizes a fixed or tunable source optical generator to generate entangled photon pairs, distribute the photons and establish a key exchange between users. The distribution of entangled photon pairs is implemented via at least one wavelength selective switch.
    Type: Grant
    Filed: October 4, 2012
    Date of Patent: October 14, 2014
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Mikhail Brodsky, Mark David Feuer
  • Patent number: 8829984
    Abstract: A system and method are disclosed for securely transmitting and receiving a signal. A nonlinear keying modulator is used in the transmitter to encrypt the signal using a nonlinear keying modulation technique. A nonlinear keying demodulator is used in the receiver to decrypt the signal.
    Type: Grant
    Filed: July 23, 2012
    Date of Patent: September 9, 2014
    Assignee: Netlogic Microsystems, Inc.
    Inventor: Roy G. Batruni
  • Patent number: 8766732
    Abstract: There is provided a multi-screw chaotic oscillator circuit with simple configuration, that can use various multi-hysteresis VCCS characteristics and generate a variety of multi-screw attractors. The multi-screw chaotic oscillator circuit comprises: a linear two-port VCCS circuit 1 consisting of a set of linear VCCS circuits G1 and G2; a multi-hysteresis two-port VCCS circuit 2 consisting of a set of multi-hysteresis VCCS circuits MH1 and MH2 having multi-hysteresis characteristic; and capacitors C1 and C2 connected to each end of a circuit configured by parallel-connecting the linear two-port VCCS circuit 1 and the multi-hysteresis two-port VCCS circuit 2.
    Type: Grant
    Filed: March 10, 2010
    Date of Patent: July 1, 2014
    Assignee: Japan Science and Technology Agency
    Inventors: Yoshihiko Horio, Takuya Hamada, Kenya Jinno, Kazuyuki Aihara
  • Patent number: 8761403
    Abstract: A method and a system of secured data storage and recovery are provided. First, a secured key and an encrypted user password of a storage device are obtained by using a controller of a storage device. Then, the secured key is encrypted by using the encrypted user password to generate a first private key, the encrypted user password is encrypted by using the secured key to generate a second private key, and data to be stored is encrypted by using the secured key. Finally, the encrypted data, the first private key, and the second private key are transmitted to a remote device for storage through a host. Thereby, the security of data storage is enhanced and data recovery mechanism is provided when the storage device is damaged or lost.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: June 24, 2014
    Assignee: EE Solutions, Inc
    Inventors: Jin-Chern Su, Pao-Hsin Chang, Yi-Feng Jang, Tien-Chun Tseng
  • Patent number: 8750707
    Abstract: In general, a system and method provides secure communications between optical transceivers in an optical communication system. Two or more optical transceivers may be provisioned with one or more passcodes assigned to the transceivers, which may be used to indicate that received data traffic is intended for the transceivers. The transceivers may be configured to format data traffic with a secure version of the passcode in the overhead of the outbound signal and may be configured to determine if an inbound signal includes a secure version of the passcode provisioned in that transceiver. A transceiver may prevent data traffic from being read when the transceiver is not provisioned to receive data traffic with the embedded secure passcode and may insert an alternative maintenance signal (AMS) into an outbound signal in an opposite direction, at least temporarily, until the inbound signal includes the appropriate passcode.
    Type: Grant
    Filed: April 13, 2011
    Date of Patent: June 10, 2014
    Assignee: Tyco Electronics Subsea Communications LLC
    Inventors: Sameh A. Sabet, Jonathan M. Liss
  • Patent number: 8712036
    Abstract: The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state. The size of the state is dependent on the number of pseudorandom permutations and the size of the LFSR. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal the size of the state. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: April 29, 2014
    Inventors: Eric Myron Smith, Daniel Jason Williams, Troy Allan Schultz, Peter Schweitzer
  • Patent number: 8712052
    Abstract: Communication apparatus and associated method for sending messages while concealing the messages among chaff data. In sending outgoing communications to and from a remote device, a stream of chaffing data is generated. A message to be communicated is inserted into the stream of chaffing data such that the beginning and ending boundaries of the first message are concealed by the chaffing data. A matching pair of deterministic number generators, one at the sending end and one at the remote device, are initialized using a common initialization value to cause generation of a common sequence of numbers with the remote device. The stream of chaffing data, or data associated with the first message, or both, are encoded with the common sequence of numbers.
    Type: Grant
    Filed: July 23, 2012
    Date of Patent: April 29, 2014
    Assignee: Cooper Technologies Company
    Inventor: Ronald Landheer
  • Patent number: 8699701
    Abstract: The method of performing XZ-elliptic curve cryptography for use with network security protocols provides a computerized method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of either a symmetric secret key or a public key in the message bit string. The method of performing XZ-elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: April 15, 2014
    Assignee: King Fahd University
    Inventors: Lahouari Ghouti, Abdulaziz M. Al-Khoraidly, Mohammad K. Ibrahim
  • Patent number: 8687810
    Abstract: The present invention provides a method for a data encryption device to perform network communications, the method comprising obtaining an indexed array of encryption keys, wherein the indexed array of encryption keys is shared with a data decryption device; obtaining a message to be encrypted; using a first random or pseudorandom number to determine an index; obtaining a first key from the array of encryption keys, wherein the first key corresponds to the index; selecting a second key from the plurality of encryption keys; encrypting the message using the first key and a second random or pseudorandom number; encrypting the index using the second key and a third random or pseudorandom number; transmitting the encrypted message and the encrypted index to the data decryption device.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: April 1, 2014
    Assignee: Physical Optics Corporation
    Inventors: Leonid Bukshpun, Thomas Forrester, Tomasz Jannson, Andrew Kostrzewski, Alexander Milovanov, Ranjit Pradhan
  • Patent number: 8681972
    Abstract: A cryptographic calculation is executed in an electronic component, according to a cryptographic algorithm including at least one application of a one-way function which is disabled upon an intrusion into the electronic component. The one-way function is based on a first affine operation corresponding to a first secret key. The one-way function is applied, by obtaining (11) first and second random values (r, r?), then, by obtaining a first result (13) by applying a second affine operation (?K1), which corresponds to a second secret key, to a first combination (12) of the first and second random values, and, by obtaining (14) thereafter a second result by applying a third affine operation (?K2) which corresponds to a third secret key to said first result.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: March 25, 2014
    Assignee: MORPHO
    Inventors: Herve Chabanne, Julien Bringer, Thomas Icart
  • Patent number: 8660268
    Abstract: A method and apparatus for client authentication using a pseudo-random number generation system. The pseudo-random number generation utilizes a secret key as well as state information as input into the hash function to generate a pseudo-random number. The state information that is part of the input can be any number of prior generated pseudo-random numbers. The authentication allows for synchronization of the client and server by exchanging state information. The authentication is not dependent on any absolute time and consequently the client and servers are not required to maintain a reliable shared time base.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: February 25, 2014
    Assignee: Red Hat, Inc.
    Inventor: James Paul Schneider
  • Patent number: 8660269
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: February 25, 2014
    Assignee: BlackBerry Limited
    Inventor: Jerrold R. Randell
  • Patent number: 8639949
    Abstract: A secure computing device includes a secure cryptographic module with a key generation unit for generating a cryptographic key in dependence on received input. A storage is used for storing a virtual machine that is executable on a processor and at least one program that is executable on the virtual machine. A virtual machine manager including a unit 132 for determining an identifier associated 5 with the virtual machine, a unit 134 for supplying a representation of the identifier to the secure cryptographic module and retrieving a cryptographic keyfrom the secure cryptographic module; and a unit 136 for, under control of the cryptographic key, decrypting at least a part of data input to the processor and encrypting at least part of data output from the processor when the processor executes the virtual machine.
    Type: Grant
    Filed: July 16, 2008
    Date of Patent: January 28, 2014
    Assignee: NXP B.V.
    Inventor: Sander M. Van Rijnswou
  • Patent number: 8619985
    Abstract: For a defined cryptographic process including an original substitution table, split masked substitution tables are provided to resist cryptographic attacks. The split masked substitution tables are defined with reference to a set of random value data words and a mask value. An entry in the split masked substitution tables is defined by selecting bits from the corresponding entry in the original masked substitution table, as masked by the corresponding one of the set of random value data words and by selecting bits from the corresponding one of the set of random value data words as masked by the mask value. The split masked substitution tables are usable in a modified cryptographic process based on the defined cryptographic process to permit a masked output to be generated. The split masked substitution tables are refreshed by each entry in the tables being refreshed upon access during execution of the modified cryptographic process.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: December 31, 2013
    Assignee: Research In Motion Limited
    Inventor: Catherine Helen Gebotys
  • Patent number: 8611533
    Abstract: The present invention introduces the Orange family of stream ciphers. The cipher may involve several elements including splitting with jumping, iterated transformations and padding. The construction of the cipher also involves constantly updated bit strings that may be used as multiple keystreams in transformations of various degrees. The cipher permits parameterizing speed, security and consumed memory. A customization of the cipher allows generating practically unlimited number of stream ciphers with different inner structures and IV parameters. The present invention also presents a transformation of the ERINDALE-PLUS hashing function. The transformed ERINDALE-PLUS hashing is capable simultaneously generate a ciphertext and a secure hash value of a message.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: December 17, 2013
    Inventor: Nikolajs Volkovs
  • Patent number: 8588410
    Abstract: Nodes of a network are each provided with a seed value and a seed identifier. Each seed value has a corresponding unique seed identifier which is maintained within the system. Within each authorized node, the seed value is combined with a local node identifier, such as a serial number or other unique identifier, to form a cryptographic key that is then used by the node to encrypt and/or decrypt data transmitted and received by that node. The cryptographic key is never transmitted over the network, and each node is able to create a different cryptographic key for use in communicating with other nodes.
    Type: Grant
    Filed: April 6, 2009
    Date of Patent: November 19, 2013
    Assignee: Elster Electricity, LLC
    Inventors: Jeffrey D. McCullough, Edward J. Beroset
  • Patent number: 8553877
    Abstract: A computing device-implemented method and system is provided for obtaining an interim masked substitution table value for a given input component in a cryptographic round, such as an AES cryptographic round, using a substitution table and a self-cancelling mask. A mask with a length equal to an entry in the substitution table is provided, wherein the mask comprises a plurality of mask components of equal length such that a bitwise logical inequality operation such as XOR on the mask components equals zero, and the substitution table is masked with this mask. For each of input component, an interim masked substitution table value is obtained from the substitution table thus masked.
    Type: Grant
    Filed: May 22, 2008
    Date of Patent: October 8, 2013
    Assignee: Blackberry Limited
    Inventor: Anthony Fabian Scian
  • Patent number: 8548171
    Abstract: In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an attacker who compromises one of the devices in a VPN cannot use the keys gained by that compromise to decrypt the packets from the other gateways in the VPN, or spoof one of the communicating gateways. The method is resistant to collusion when co-operating attackers overtake several VPN gateways and observe the keys stored in those gateways. In an embodiment, a VPN gateway comprises a cryptographic data processor configured to encrypt and to decrypt data packets; group key management logic; and Key Generation System logic. In one approach a gateway performs, in relation to adding a group member, receiving in a security association (SA) message secret data for use in the KGS; and derives keys for secure communication with one or more peer VPN gateways using the secret data.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: October 1, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Brian E. Weis
  • Patent number: 8515057
    Abstract: The invention concerns a method for executing cryptographic calculation in an electronic component, based on a specific cryptographic algorithm including at least one secret key operation (102) to be performed with a secret encryption key (103) comprising m secret encryption key blocks of n bits on a data block (101), wherein m and n are positive integers, and a non-linear operation (107).
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: August 20, 2013
    Assignee: Morpho
    Inventor: Hervé Pelletier
  • Patent number: 8509427
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.
    Type: Grant
    Filed: May 5, 2011
    Date of Patent: August 13, 2013
    Inventors: Eric Myron Smith, Daniel W. Engels, Peter Schweitzer, Troy A. Schultz
  • Patent number: 8509440
    Abstract: A network component comprising at least one processor configured to implement a method comprising deriving a Master Session Key (MSK) using a secret key and at least one parameter obtained from an Extensible Authentication Protocol (EAP) sequence, deriving a first Pairwise Master Key (PMK) and a second PMK from the MSK, authenticating with a home gateway (HG) using the first PMK, and authenticating with an end point using the second PMK. Included is an apparatus comprising a node comprising an access controller (AC) and a protocol for carrying authentication for network access (PANA) Authentication Agent (PAA), wherein the AC is configured to manage authentication for a UE, and wherein the PAA is configured to implement a PANA to forward authentication information related to the UE.
    Type: Grant
    Filed: August 15, 2008
    Date of Patent: August 13, 2013
    Assignee: Futurwei Technologies, Inc.
    Inventor: John Kaippallimalil
  • Patent number: 8488231
    Abstract: A wavelength-multiplexed polarization entangled photon pair generator (1) includes: a pump light source (2); a polarization entangled photon pair generating body (4) on which pump light (3) outputted from the pump light source (2) falls; and a spectrometer (7) on which a wavelength-multiplexed parametric photon pair (5) outputted from the polarization entangled photon pair generating body 4 falls. The polarization entangled photon pair generating body (4) made of a nonlinear optical crystal (11) generates wavelength-multiplexed photon pairs by subjecting the pump light 3 to type II phase matching. As a nonlinear optical crystal 11, lithium tantalate of periodically poled structure (11A) can be used, and as a spectrometer (7), an arrayed-waveguide grating can be used. Wavelength-multiplexed polarization entangled photon pairs (5) can thus be generated with simple equipment.
    Type: Grant
    Filed: June 3, 2010
    Date of Patent: July 16, 2013
    Assignee: Japan Science and Technology Agency
    Inventors: Ryosuke Shimizu, Keiichi Edamatsu
  • Patent number: 8483394
    Abstract: Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: July 9, 2013
    Assignee: Los Alamos National Security, LLC
    Inventors: Jane Elizabeth Nordholt, Richard John Hughes, Charles Glen Peterson
  • Patent number: 8477947
    Abstract: Provided is an optical phase modulating method and apparatus for a quantum key distribution. When an optical phase modulator is arranged outside an optical interferometer, a configuration of the optical interferometer may be simplified, and an extension of an optical path caused by the optical phase modulator, instability and an insertion loss increased in the optical interferometer, and the like, may be overcome. An output feature may be improved by adjusting an applied voltage of the optical phase modulator arranged outside the optical interferometer.
    Type: Grant
    Filed: October 6, 2010
    Date of Patent: July 2, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventor: Jeong-sik Cho
  • Patent number: 8477939
    Abstract: Provided are an apparatus for receiving a quantum cryptographic key and an apparatus for transmitting and receiving a quantum cryptographic key at high speed without polarization drift of an optical pulse signal and phase drift of an interferometer. The apparatus for receiving a quantum key includes: a polarization-insensitive optical phase modulator parts for receiving an optical pulse signal, and modulating and outputting a phase of the optical pulse signal without being affected by the polarization state of the optical pulse signal; an asymmetric Mach-Zehnder interferometer for causing interference in and outputting the optical pulse signal received from the polarization-insensitive optical phase modulator parts; and a photon detectors for detecting the optical pulse signal received from the asymmetric Mach-Zehnder interferometer.
    Type: Grant
    Filed: November 28, 2007
    Date of Patent: July 2, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Chun Ju Youn, Tae Gon Noh
  • Patent number: 8472623
    Abstract: A transmitting apparatus 100 includes an initialization vector generating unit 110 for generating initialization vector IV1-IV5 for encrypting stream data with a stream encryption method, wherein the initialization vector is changed at every initialization intervals defined by a stream encryption module; an initialization packet generating unit 140 for generating an initialization packet IP containing an initialization vector used when stream data following the initialization packet are encrypted and another initialization vector used when another stream data different from the stream data following the initialization packet are encrypted; an encryption unit 120 for initializing the stream encryption module using a generated initialization vector, and performing stream encryption on stream data following the initialization vector; an encryption packet generating unit 130 for generating an encryption packet EP containing stream-encrypted data; and a transmission unit 150 for transmitting the initialization pac
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: June 25, 2013
    Assignee: Kyocera Corporation
    Inventors: Masaru Fukushima, Masaomi Satake
  • Patent number: 8446250
    Abstract: This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator.
    Type: Grant
    Filed: June 10, 2008
    Date of Patent: May 21, 2013
    Assignee: Intrinsic ID B.V.
    Inventors: Klaus Kursawe, Pim T. Tuyls
  • Patent number: 8401180
    Abstract: According to an aspect of the present invention, there is provided a non-linear data converter including: first to fourth converters that each performs a respective converting process on an input bit string to output respective output bit string; a generator that generates a random number bit string; and a selector that selects any one of the output bit strings from the first to fourth converters based on the random number bit string. Each of the converting processes is equivalent to performing a first mask process, a non-linear conversion predetermined for an encoding or a decoding and a second mask process.
    Type: Grant
    Filed: March 21, 2008
    Date of Patent: March 19, 2013
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Yuichi Komano, Hideo Shimizu, Koichi Fujisaki, Hideyuki Miyake, Atsushi Shimbo