Plural Generators Patents (Class 380/47)
-
Patent number: 12229310Abstract: The system has a unique identifier (2) stored in client's hardware (1). Via a transfer environment (3) using a higher layer protocol (4), the unique identifier (2) is coupled to a server (5), where, in an evaluation module (6), it is connected to a substitution and calculation module (7). A w polynomial system (8) stored in the persistent memory (9) of the server (5) is also connected to the substitution and calculation module (7), the output of which is a calculated key (10). At the same time, the client's hardware (1) stores a local key (11) which is via the transfer environment (3) using the higher layer protocol (4) connected to a key comparison module (12) to which the calculated key (10) is also connected. The key comparison module (12) is through its positive output (13) and negative output (14) connected via the transfer environment (3) using the higher layer protocol (4) to a response processing module (15) which is stored in the client's hardware (1).Type: GrantFiled: September 27, 2019Date of Patent: February 18, 2025Assignees: Thomas Bata University In Zlin, Viavis A.S.Inventors: Roman Jasek, Milan Oulehla, Petr Zacek, Jan Krnavek, Vladimir Lazecky, Jacek Makowski, Tomas Malik, Jiri Malik
-
Patent number: 12136329Abstract: Disclosed herein is a method of receiving, by a terminal of a vulnerable road user (VRU), a signal in a wireless communication system. The method include receiving a message related to a safety service of the VRU from a network, and outputting a warning message based on comparing a field defining a geographic area, in which the safety service is provided, in the message and a position of the terminal, wherein the warning message is output based on determining that the terminal exists within the geographic area.Type: GrantFiled: November 22, 2019Date of Patent: November 5, 2024Assignee: LG ELECTRONICS INC.Inventors: Jaeho Hwang, Myoungseob Kim
-
Patent number: 12032677Abstract: This invention relates generally to blockchain implementations and is suited for, but not limited to, use with the Bitcoin blockchain. A method of using a blockchain to control a process executing on a computing resource, the method comprising: executing a loop on the computing resource, and using a state of the blockchain to influence the execution of the loop, wherein the process: is an automated voting process; or comprises a distribution or an allocation of one or more tokens to a voter, wherein each token is associated with an amount of cryptocurrency.Type: GrantFiled: December 3, 2021Date of Patent: July 9, 2024Assignee: nChain Licensing AGInventors: Craig Steven Wright, Stephane Savanah
-
Patent number: 11997200Abstract: A system and method for encryption key generation by receiving a plaintext message having a fixed character length and receiving, from a source, a plurality of random number. A matrix is created from the plurality random numbers and has at least one of the number of rows or columns equal to or greater than the character length. An array that can be used as an encryption key or a seed for an encryption key is generated by selecting an initial element within the matrix, selecting subsequent elements using a selection technique until a number of elements in the array is equal to the character length and rejecting any previously selected elements from the array.Type: GrantFiled: August 11, 2020Date of Patent: May 28, 2024Assignee: QRYPT, INC.Inventors: Denis Mandich, Christopher Knapp, Austin Bradley, Samuel Wolfson, Matthew Neal
-
Patent number: 11843697Abstract: The present disclosure relates to technology that performs encrypted communication via a network or a bus, and a communication method using a security key between nodes connected via a network or a bus includes setting a critical cluster among multiple nodes, selecting a primary message shared between the set critical clusters, and encrypting a message using a key generated to be valid for a preset period to enable communication between the critical clusters, wherein each of the critical clusters stores the primary message for the preset period according to a same key generation scheme to generate a block, and generates and possesses a new key based on the generated block and a currently used key, so that information about a previous message and a previous key is sequentially accumulated in the new key.Type: GrantFiled: November 17, 2017Date of Patent: December 12, 2023Assignee: SOGANG UNIVERSITY RESEARCH FOUNDATIONInventors: Jun Ha Lee, Soo Yong Park, Ji Woo Park, Jin Hwan Lee
-
Patent number: 11818262Abstract: One-to-many cryptographic systems and methods are disclosed, and a network employing the same, including numerous industry applications. The embodiments of the present invention can generate and regenerate the same symmetric key from a random token. The one-to-many cryptographic systems and methods include a central location and a cryptographic module being in communication with each other. The cryptographic module is configured to encrypt and/or decrypt data received a remote location and output encrypted and/or decrypted data. The cryptographic module includes a key generator configured to use two or more inputs to reproducibly generate the symmetric key and a cryptographic engine configured to use the symmetric key for encrypting and decrypting data. Corresponding methods, and network employing the same, are also provided.Type: GrantFiled: September 19, 2022Date of Patent: November 14, 2023Assignee: CORD3 INNOVATION INC.Inventors: Glen Arthur Henderson, Brent Eric Nordin, Daniel Marcel Joseph Seguin, Prateek Srivastava, Ian Hugh Curry
-
Patent number: 11803666Abstract: Described are various embodiments of a hardware security module, hardwired port interconnection matrix, and embedded communication channel resources operable on selected hardware port-specific data communicated via this matrix.Type: GrantFiled: April 21, 2022Date of Patent: October 31, 2023Assignee: Crypto4A Technologies Inc.Inventors: Bruno Couillard, Bradley Clare Ritchie, James Ross Goodman, Jean-Pierre Fiset
-
Patent number: 11606114Abstract: A communication device comprises a first communication unit that performs switching between transmission operation and reception operation in response to a value of a given bit of a clock, and a second communication unit of a same type as that of the first communication unit. In the communication device, a value of the given bit of the clock of the first communication unit and a value of the given bit of the clock of the second communication unit are synchronized with each other.Type: GrantFiled: November 8, 2019Date of Patent: March 14, 2023Assignee: Sony Interactive Entertainment Inc.Inventors: Tai Hirakawa, Yoshiyuki Imada, Masashi Kamata
-
Patent number: 11582815Abstract: An electronic device for receiving data packets in a Bluetooth environment is provided. The electronic device includes a wireless communication circuitry configured to support a Bluetooth protocol.Type: GrantFiled: July 20, 2020Date of Patent: February 14, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Gupil Cheong, Doosuk Kang, Bokun Choi
-
Patent number: 11451369Abstract: In a system having a plurality of servers, a method is executed to perform an encryption scheme. The method includes a server of the plurality of servers receiving a request token to compute a function on a data point, the data point being encrypted as a ciphertext and the request token being based on the ciphertext and the function. The server grants the request to compute the function on the datapoint by sending a function evaluation key, and participates in a distributed decryption protocol for determining a result of computing the function on the data point by sending a master secret key.Type: GrantFiled: September 25, 2019Date of Patent: September 20, 2022Assignee: NEC CorporationInventors: Claudio Soriente, Miguel Ambrona, Dario Fiore
-
Patent number: 11140139Abstract: A method and apparatus for encrypting communications between two radio frequency (RF) transceivers selects a level of encryption based on device characteristics of the two RF transceivers. Each RF transceiver generates a common sequence having an integer, M, symbols based on the selected encryption level and on signals received from the other RF transceiver. Each RF transceiver then generates a cryptographic key based upon the common sequence, encrypts a message using the cryptographic key, and sends the encrypted message to the other RF transceiver. In one embodiment, the M symbols are selected from an alphabet where the value M and the size of the alphabet are selected based on the device characteristics of the two RF transceivers.Type: GrantFiled: November 21, 2018Date of Patent: October 5, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Bradford R. Clark
-
Patent number: 11044107Abstract: This application describes systems and methods for using a physical unclonable function (PUF) to authenticate a device, which may include circuitry for generating PUF values that may uniquely identify the device. According to one aspect, the device may provide enrollment PUF values to an authentication device. The device may later be authenticated if PUF values generated by the device are within a threshold distance of the enrollment PUF values. Since the PUF values are compared using a distance, it may not necessary to apply an error correcting code to the PUF values. The enrollment values and/or the calculated distance may be adjusted to compensate for time variations in the PUF values due to circuit aging. Systems and methods are also described herein for authenticating the device without revealing new PUF values to any second party, for example using a cryptographic technique known as a garbled circuit.Type: GrantFiled: May 1, 2018Date of Patent: June 22, 2021Assignee: Analog Devices, Inc.Inventors: Robert W. Adams, John Ross Wallrabenstein, Deniz Karakoyunlu
-
Patent number: 10652011Abstract: A method for producing a white-box implementation of a cryptographic function using garbled circuits, including: producing, by a first party, a logic circuit implementing the cryptographic function using a plurality of logic gates and a plurality of wires; garbling the produced logic circuit, by the first party, including garbling the plurality of logic gates and assigning two garbled values for each of the plurality of wires; and providing a second party the garbled logic circuit and a first garbled circuit input value.Type: GrantFiled: June 8, 2017Date of Patent: May 12, 2020Assignee: NXP B.V.Inventors: Joppe Willem Bos, Jan Hoogerbrugge, Marc Joye, Wilhelmus Petrus Adrianus Johannus Michiels
-
Patent number: 10496839Abstract: Sensitive data is protected in a software product. A source file of the software product is compiled to generate an object file, in which the source file includes at least one piece of sensitive data marked with a specific identifier. The object file has a secure data section for saving storage information of the at least one piece of sensitive data at compile-time and run-time. The object file is linked to generate an executable file. The executable file updates the secure data section at run-time. Sensitive data is also protected when a core dump is generated.Type: GrantFiled: December 8, 2017Date of Patent: December 3, 2019Assignee: International Business Machines CorporationInventors: Rui Feng, Shuang Shuang Jia, Da Fei Shi, Lijun Wei
-
Patent number: 10291596Abstract: A system comprising a terminal and a server, wherein the terminal is installed in the system by the server being configured to: identify the terminal; generate key generation data, comprising at least one data seed; distribute the at least one seed to the terminal; generate key data and meta data based on said at least one seed and a function; store an identifier for the terminal along with the key data and the meta data for the terminal, wherein the terminal is arranged to receive the at least one seed from the server; generate key data and meta data based on said at least one seed and the same function; store the key data and the meta data, wherein the key data and the meta data stored in the terminal are the same as the key data and the meta data stored in the server.Type: GrantFiled: October 8, 2015Date of Patent: May 14, 2019Assignee: KELISEC ABInventor: Elise Revell
-
Patent number: 9660805Abstract: The present invention discloses methods and devices for securing keys when key-management processes are subverted by an adversary. Methods include the steps of: upon receiving a creation request in the computing-environment, creating a secure key in at least one location in a computing environment by repetitively computing respective secure-key contributions: in at least one location; and in a set of N computing resources in the computing environment, wherein N is a non-negative integer; and applying the respective secure-key contributions to change a secure-key value, wherein: the respective secure-key contributions cannot be omitted or modified by at least one location; and the secure key is never revealed to the computing resources; thereby enabling the computing resources in the computing environment to ensure that the secure key is truly random; wherein at least one location is a region of memory located in a computing resource operationally connected to the computing-environment.Type: GrantFiled: May 13, 2015Date of Patent: May 23, 2017Assignee: Porticor Ltd.Inventors: Gilad Parann-Nissany, Yaron Sheffer, Alon Rosen
-
Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share
Patent number: 9455968Abstract: A method includes (1) receiving, by a mobile computing device (MCD), user-specific data from a user, (2) processing (a) a user share of a cryptographic key, the user share being fixed based on the received user-specified data, and (b) a local share of the cryptographic key to recreate the cryptographic key, wherein the local share was created by applying a secret splitting algorithm to the cryptographic key and the user share to yield a set of non-fixed shares including the local share, the user share and the set of non-fixed shares making up a set of shares of the cryptographic key, the cryptographic key being recreatable from a strict subset of the set of shares, and (3) decrypting encrypted data stored on the MCD using the recreated cryptographic key, thereby providing access, using the decrypted encrypted data, to the resource.Type: GrantFiled: December 19, 2014Date of Patent: September 27, 2016Assignee: EMC CorporationInventors: Salah Machani, Nikolaos Triandopoulos, Lawrence N. Friedman -
Patent number: 9400495Abstract: For machine procedure simulation, a synchronization module stores a plurality of equipment procedures in a procedure database. Each equipment procedure corresponds to an equipment instance of a plurality of equipment instances and each equipment instance corresponds to an equipment reference code. The synchronization module further synchronizes the plurality of equipment procedures to a mobile device. A retrieval module receives a first equipment reference code at the mobile device and retrieves a first equipment procedure indexed to the first equipment reference code. The first equipment procedure includes a machine simulation for the first equipment instance. A training module receives a procedure step directed to the machine simulation. In addition, the training module displays an operator simulation interacting with the machine simulation in response to the procedure step.Type: GrantFiled: February 27, 2015Date of Patent: July 26, 2016Assignee: Rockwell Automation Technologies, Inc.Inventors: Jimi Michalscheck, Kelly Michalscheck
-
Patent number: 9117073Abstract: In systems and methods of network path generation, instructions are transferred from a first network node to a second network node instructing the second network node to establish a first secure communication link with the first network node. According to the instructions, instructions are transferred from the second network node to a third network node instructing the third network node to establish a second secure communication link with the second network node. Within the first secure communication link and the second communication link, a third secure communication link between the first network node and the third network node is established.Type: GrantFiled: February 8, 2013Date of Patent: August 25, 2015Assignee: MANTECH ADVANCED SYSTEMS INTERNATIONAL, INC.Inventors: Matthias P. Daue, Aaron M. Carreras, Douglas E. Albert
-
Patent number: 9077444Abstract: A wireless method and apparatus for late entry in frequency hopping systems that, during call setup, computes a random permutation sequence through a hop set of frequencies, chooses preamble frequencies to omit data thereon in lieu of preamble data, and swaps frequencies in the random permutation sequence such that synchronization frequencies lie next to the preamble frequencies with an expected delay such that late entrants can join. The wireless method and apparatus meets the FCC requirement of maintaining a pseudorandom hopping pattern and equal distribution of all frequencies in a hop set while guaranteeing late entry and having no effect on battery performance of radios.Type: GrantFiled: September 12, 2013Date of Patent: July 7, 2015Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Duminda A Dewasurendra, Mark A Boerger, Mahes M Ekanayake, John K McKinney
-
Patent number: 9037875Abstract: In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key generation module is to generate a key using the first key portion from the programmable memory and a second key portion received via a memory interface. The module is to encrypt or decrypt data using the key.Type: GrantFiled: April 15, 2013Date of Patent: May 19, 2015Assignee: Marvell International Ltd.Inventors: Tze Lei Poo, Gregory Burd, Phuc Thanh Tran, Saeed Azimi
-
Patent number: 9032208Abstract: A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not completely matched between communication terminals. A cipher key transfer device acquires a one-time pad cipher key from a key sharing system, divides the acquired one-time pad cipher key with a predetermined number of bits, and transfers the same to a mobile communication terminal after converting the same into one-time pad cipher key cartridges. Along with the partner's terminal, the mobile communication terminal negotiates which one-time pad cipher key cartridge will be used to perform cipher communication, decides the one-time pad cipher key cartridge to be used, and begins cipher communication.Type: GrantFiled: August 24, 2010Date of Patent: May 12, 2015Assignee: Mitsubishi Electric CorporationInventors: Hirosato Tsuji, Yoichi Shibata
-
Patent number: 9015487Abstract: Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and second peer devices to establish a first-type wireless connection. The nonce is forwarded from the first peer device to the second peer device over an already established second-type wireless connection between the first and second peer devices. At least one new key is generated from the nonce and a shared key for the already established second-type wireless connection. The first peer device is virtually paired with the second peer device using the at least one new key to establish the first-type wireless connection between the first and second peer devices.Type: GrantFiled: March 31, 2009Date of Patent: April 21, 2015Assignee: QUALCOMM IncorporatedInventors: Lu Xiao, Gregory Gordon Rose, David Jonathan Julian
-
Patent number: 9015826Abstract: A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third authentication key for each function called by an application program. The apparatus may store the first authentication key and an identifier for identifying the application program in a first storage unit, the second authentication key and the identifier in a secret domain of a second storage unit, and register the third authentication key and the identifier as a function parameter in the application program. Subsequently, if the function is called by the application program, the apparatus may determine values for the first authentication key, the second authentication key, and the third authentication key corresponding to the called function, and may perform authentication processing using the three authentication key values.Type: GrantFiled: September 16, 2011Date of Patent: April 21, 2015Assignee: Pantech Co., Ltd.Inventor: Jae Choon Park
-
Patent number: 9008311Abstract: A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is equipped with computational resources stronger than the computational resources of an adversary computer. There is provided a method for sending a secret from the sender computer to a designated receiver computer. The sender computer defining a succession of computational tasks having respective solutions. The computational tasks are so defined such that the duration of solving each task by the receiver computer is shorter than what would have been required for the adversary computer to solve the task. Next, the sender computer sending through the link the succession of tasks encrypted by previous solutions and the receiver computer receiving the tasks and is capable of decrypting the secret faster than what would have been required for the adversary computer to decrypt the secret.Type: GrantFiled: June 23, 2005Date of Patent: April 14, 2015Assignee: Ben-Gurion University of the Negev Research and Development AuthorityInventors: Shlomi Dolev, Ephraim Korach, Galit Uzan
-
Patent number: 8995653Abstract: Embodiments of the present invention address deficiencies of the art in respect to symmetric key generation and provide a method, system and computer program product for symmetric key generation using an asymmetric private key. In one embodiment, a symmetric key generation data processing system can include a symmetric key generator configured with a programmatic interface including an input parameter for a seed, an input parameter for an asymmetric private key, and an output parameter for a symmetric key. The symmetric key generator can include program code enabled to generate the symmetric key by encrypting the seed with the asymmetric private key.Type: GrantFiled: July 12, 2005Date of Patent: March 31, 2015Assignee: International Business Machines CorporationInventors: Alan D. Eldridge, David S. Kern
-
Patent number: 8995660Abstract: A cryptographic communication technology that is based on functional encryption and that can operate flexibly is provided. A conversion rule information pair is determined in advance, which has attribute conversion rule information prescribing a conversion rule for converting attribute designation information to attribute information used in a functional encryption algorithm and logical expression conversion rule information prescribing a conversion rule for converting logical expression designation information to logic information used in the functional encryption algorithm. One kind of conversion rule information included in the conversion rule information pair is used to obtain first attribute information or first logic information from input information. The first attribute information or the first logic information is used for encryption.Type: GrantFiled: July 22, 2011Date of Patent: March 31, 2015Assignee: Nippon Telegraph and Telephone CorporationInventors: Tetsutaro Kobayashi, Kaku Takeuchi, Sakae Chikara
-
Patent number: 8989374Abstract: According to one embodiment, a memory being used to store a host identification key, a host constant (HC), and a first key, the first key being generated based on the host constant (HC); a first generator configured to decrypt a family key block read from an external device with the host identification key to generate a family key; a second generator configured to decrypt encrypted secret identification information read from the external device with the family key to generate a secret identification information; a third generator configured to generate a random number; a fourth generator configured to generate a session key by using the first key and the random number; a fifth generator configured to generate a first authentication information by processing the secret identification information with the session key in one-way function operation.Type: GrantFiled: June 15, 2012Date of Patent: March 24, 2015Assignee: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
-
Patent number: 8983068Abstract: An NLFSR of length k, configured to output a sequence of masked values x?i=xi+mi according to a masked recurrence x?n+k=f(x?n, . . . , x?n+k?1), the NLFSR including a nonlinear feedback function configured to compute f(x?n, . . . , x?n+k?1) so as to obtain a feedback value, a correction function configured to compute (mn, . . . , nn+k?1)+mn+k+h(mn, mn+k?1, xn, . . . , xn+k?1) to obtain a correction value c, and a corrector configured to correct the feedback value {circumflex over (x)}?n+k using the correction value c to obtain a corrected feedback value which forms x?n+k.Type: GrantFiled: March 6, 2013Date of Patent: March 17, 2015Assignee: Infineon Technologies AGInventors: Berndt Gammel, Stefan Mangard
-
Patent number: 8964982Abstract: A cryptographic communication technology that is based on predicate encryption and that can operate flexibly is provided. A conversion rule information pair is determined in advance, which has attribute conversion rule information prescribing a conversion rule for converting attribute designation information to attribute information used in a predicate encryption algorithm and predicate conversion rule information prescribing a conversion rule for converting predicate designation information to predicate information used in the predicate encryption algorithm. One kind of conversion rule information included in the conversion rule information pair is used to obtain first attribute information or first predicate information from input information. The first attribute information or the first predicate information is used for encryption.Type: GrantFiled: April 23, 2010Date of Patent: February 24, 2015Assignee: Nippon Telegraph and Telephone CorporationInventors: Kaku Takeuchi, Tetsutaro Kobayashi, Sakae Chikara
-
Patent number: 8958555Abstract: In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including: receiving the first polynomial v(x) modulo the second polynomial fn(x), where the second polynomial is of a form fn(x)=xn±1, where n=2k and k is an integer greater than 0; computing lowest two coefficients of a third polynomial g(z) that is a function of the first polynomial and the second polynomial, where g(z)?i=0n?1(v(?i)?z), where ?0, ?1, . . . , ?n?1 are roots of the second polynomial fn(x) over a field; outputting the lowest coefficient of g(z) as the resultant; and outputting the second lowest coefficient of g(z) divided by n as the free term of the scaled inverse of the first polynomial v(x) modulo the second polynomial fn(x).Type: GrantFiled: June 19, 2013Date of Patent: February 17, 2015Assignee: International Business Machines CorporationInventors: Craig B. Gentry, Shai Halevi
-
Patent number: 8954745Abstract: A method and apparatus are provided to allow a user of a communications device to utilize one-time password generators for two-way authentication of users and servers, i.e., proving to users that servers are genuine and proving to servers that users are genuine. The present invention removes the need for a user to have a separate physical device, e.g., token, per company or service, reduces the cost burden on the companies and allows for two-way authentication via multiple access methods, e.g., telephone, web interfaces, automatic teller machines (ATMs), etc. Also, the present invention may be utilized in consumer and enterprise applications.Type: GrantFiled: April 3, 2007Date of Patent: February 10, 2015Assignee: Alcatel LucentInventors: Debra L. Cook, Vijay K. Gurbani, Maarten Wegdam
-
Patent number: 8954740Abstract: A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure content. The server determines whether the user is a member of the group using the identifying information of the user. If the user is a member of the group, the server decrypts the encrypted session key using a private key of the group, and causes the client device to obtain a session key to access the secure content.Type: GrantFiled: October 4, 2010Date of Patent: February 10, 2015Assignee: Symantec CorporationInventors: Vincent E. Moscaritolo, Damon Cokenias, David Finkelstein
-
Patent number: 8935762Abstract: An authentication server and user device are provided. The authentication server includes: a memory for storing a user identification code associated with a user; a function generator for generating a plurality of functions, the functions adapted to produce a pass code based on the user identification code; a memory for storing a function associated with the user; an application generator for generating an application adapted to implement the function on a user device; an application distributor for distributing the application to the user device; a transaction code generator for generating a transaction code for a transaction; a transaction code distributor for supplying the transaction code to the application; and a controller for receiving a pass code for the transaction from the user device and for authenticating the transaction based on the received pass code, the function, the user identification code and the transaction code.Type: GrantFiled: June 26, 2007Date of Patent: January 13, 2015Assignee: G3-Vision LimitedInventors: Guy Moas, Ram Gabay
-
Patent number: 8929554Abstract: Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.Type: GrantFiled: June 6, 2013Date of Patent: January 6, 2015Assignee: Los Alamos National Security, LLCInventors: Richard John Hughes, Jane Elizabeth Nordholt, Charles Glen Peterson
-
Publication number: 20140369499Abstract: According to an embodiment, a cryptographic device includes a first operation unit that receives a shared key and generates plural expanded keys; and a second operation unit that receives plaintext or ciphertext and performs at least one of encryption and decryption using the expanded keys. First data pieces are obtained by dividing the plaintext into predetermined units of words or obtained by dividing the ciphertext into predetermined units of words. The second operation unit includes a data array determination unit that determines, at a time of encryption, an array order of the first data pieces included in the plaintext as a first order, and determines, at a time of decryption, an array order of the first data pieces included in the ciphertext as a second order; and a main data computation unit that performs, on the first data pieces, computation of at least one of encryption and decryption in the determined order.Type: ApplicationFiled: March 12, 2014Publication date: December 18, 2014Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Takeshi KAWABATA
-
Patent number: 8898463Abstract: According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.Type: GrantFiled: June 15, 2012Date of Patent: November 25, 2014Assignee: Kabushiki Kaisha ToshibaInventors: Yuji Nagai, Taku Kato, Tatsuyuki Matsushita
-
Patent number: 8886935Abstract: According to some embodiments, a key management apparatus for deploying in a smart grid system adapted to receive metering data from smart meters connected to at least one relay via a network, includes: a key control mechanism that derives a key array of individual purpose specific keys from one master key such that the purpose specific key in the key array are each independent cryptographic keys for each specific usage in an application or for each application if there is only one specific usage in an application.Type: GrantFiled: March 23, 2011Date of Patent: November 11, 2014Assignees: Kabushiki Kaisha Toshiba, Telcordia Technologies Inc.Inventors: Yoshihiro Ohba, Mitsuru Kanda, Subir Das, David Famolari
-
Patent number: 8861722Abstract: A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be determined by the first and second communication partners, includes a first module operable to calculate the session key using a concatenation of at least a part of a random number and a part of the secret information. The device also includes a second module operable to use the session key for communication with the second communication partner.Type: GrantFiled: June 10, 2010Date of Patent: October 14, 2014Assignee: Infineon Technologies AGInventors: Berndt Gammel, Wieland Fischer, Stefan Mangard
-
Patent number: 8862867Abstract: The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an authentication server; after the authentication is passed, obtaining a shared key material by both the terminal and the authentication server; generating, by the terminal and the authentication server, a mobility data security key according to the shared key material; transmitting, by the authentication server, the generated mobility data security key to a mobility data transmission module; protecting security of the layer-3 mobility user plane data, by the terminal and the mobility data transmission module, by using the mobility data security key. The disclosure also discloses a system for protecting security of layer-3 mobility user plane data in NGN.Type: GrantFiled: March 22, 2010Date of Patent: October 14, 2014Assignee: ZTE CorporationInventors: Hongyan Wang, Yinxing Wei
-
Patent number: 8861721Abstract: The system and method for securing scalar multiplication against simple power attacks (SPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is used to store the points that will be added later until the buffer is full or the last bit of a multiplier k is inspected, Then, the stored points in the buffer are added to the accumulation point. The same procedure is repeated whenever the buffer is full again. This makes the power trace appears as a repeated sequence of consecutive point doubling followed by consecutive point additions. This makes it very difficult for an attacker to know the exact value of the inspected bit during the scalar multiplication process.Type: GrantFiled: December 26, 2012Date of Patent: October 14, 2014Assignee: Umm Al-Qura UniversityInventor: Turki Faisal Al-Somani
-
Patent number: 8842826Abstract: A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.Type: GrantFiled: May 12, 2009Date of Patent: September 23, 2014Assignee: InterDigital Patent Holdings, Inc.Inventors: Chunxuan Ye, Alexander Reznik
-
Patent number: 8811615Abstract: Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of outputs from pseudo-random source(s). In some examples, the numerical ordering of re-generated device-specific quantities is used to re-generate the hidden value, without necessarily requiring additional error correction mechanisms. Information leak may be reduced by constructing system whose “syndrome” helper bits are random, as measured, for example, by NIST's Statistical Tests for Randomness In some examples, index based coding provides coding gain that exponentially reduces total error correction code complexity, resulting in efficiently realizable PRS-based key generation systems. In some examples, index based coding allows noisy PRS to be robust across conditions where conventional error correction code cannot error correct.Type: GrantFiled: August 5, 2010Date of Patent: August 19, 2014Assignee: Verayo, Inc.Inventors: Meng-Day Yu, Srinivas Devadas
-
Patent number: 8804952Abstract: The system and method for securing scalar multiplication against differential power attacks (DPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is used to store the points that will be added later in a random manner. Then, a randomly selected one of the stored points in the buffer is added to the accumulation point, or several randomly selected points are added consecutively. This makes the power trace appear as a repeated sequence of consecutive point doubling followed by consecutive point additions, which makes it very difficult for an attacker to know the exact value of the inspected bit during the scalar multiplication process.Type: GrantFiled: December 26, 2012Date of Patent: August 12, 2014Assignee: Umm Al-Qura UniversityInventor: Turki Faisal Al-Somani
-
Patent number: 8804963Abstract: A computer readable medium stores a program causing a computer to execute a key generating processing. The computer generates a signatory private key which is used in an electronic signature, a signatory public key, a signatory public key certificate, a certification public key which is used when recording the signatory private key in a PKI card and a certification private key, transmits the certification private key to the PKI card via a secure communication path, and transmits an encoded signatory key obtained by encoding the signatory public key certificate and the signatory private key using the certification public key to the PKI card via the secure communication path or a non-secure communication path.Type: GrantFiled: September 14, 2009Date of Patent: August 12, 2014Assignee: Fuji Xerox Co., Ltd.Inventor: Masamichi Koike
-
Patent number: 8788810Abstract: In a method of temporarily registering a second device with a first device, in which the first device includes a temporary registration mode, the temporary registration mode in the first device is activated, a temporary registration operation in the first device is initiated from the second device, a determination as to whether the second device is authorized to register with the first device is made, and the second device is temporarily registered with the first device in response to a determination that the second device is authorized to register with the first device, in which the temporary registration requires that at least one of the second device and the first device delete information required for the temporary registration following at least one of a determination of a network connection between the first device and the second device and a powering off of at least one of the first device and the second device.Type: GrantFiled: December 29, 2009Date of Patent: July 22, 2014Assignee: Motorola Mobility LLCInventors: Jiang Zhang, Alexander Medvinsky, Paul Moroney, Petr Peterka
-
Patent number: 8787564Abstract: Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A typicality can be determined for each of the sample values. A grading is determined for preselected distributions based on the typicalities of the sample values. A subset of the preselected distributions are selected based on the gradings. An entropy of the entropy source system is calculated based on the subset of the plurality of distributions.Type: GrantFiled: November 30, 2011Date of Patent: July 22, 2014Assignee: Certicom Corp.Inventor: Daniel Richard L. Brown
-
Publication number: 20140198914Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.Type: ApplicationFiled: January 30, 2014Publication date: July 17, 2014Applicant: SecureRF CorporationInventors: IRIS ANSHEL, Michael Anshel, Dorian Goldfeld
-
Patent number: 8738924Abstract: An electronic system is provided, in which a smart chip, a smart chip controller, a processor, a system memory, and an access management module is provided. The smart chip controller communicates with the smart chip. The processor performs a mutual authentication with the smart chip. The system memory is accessible to the smart chip and the processor. The access management module is coupled between the processor and the smart chip controller. The access management module prevents the processor accessing a certain range of the system memory according to a block command from the smart chip controller, in response of that the mutual authentication between the processor and the smart chip is failed.Type: GrantFiled: April 22, 2008Date of Patent: May 27, 2014Assignee: Via Technologies, Inc.Inventors: Zhun Huang, Jiin Lai
-
Patent number: 8724803Abstract: A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a memory module residing in user equipment (UE) only when the source of the information used to generate the short-term key can be validated. A short-term key can be generated by a Broadcast Access Key (BAK) or a derivative of BAK and a changing value with a Message Authentication Code (MAC) appended to the changing value. A short-term key (SK) can also be generated by using a private key and a short-term key (SK) manager with a corresponding public key distributed to the memory module residing in the user equipment (UE), using a digital signature.Type: GrantFiled: September 1, 2004Date of Patent: May 13, 2014Assignee: QUALCOMM IncorporatedInventors: James Semple, Gregory Gordon Rose