Subscribe: Untitled
http://www.freepatentsonline.com/rssfeed/rssapp380.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
cryptography system  data  decryption  encrypted data  encrypted  key  location  method  operation  quantum cryptography  system 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Untitled

Untitled





 



DEVICE AND METHOD FOR DISCONTINUOUS HASHING OF DIGITAL DATA

Thu, 06 Apr 2017 08:00:00 EDT

A cryptographic hash value is computed in a hardware processing unit of an apparatus. The cryptographic hash value is computed iteratively processing blocks of data in a predetermined order by, for each block: obtaining at least one intermediate value for the block by applying a function to the block, computing a value of a weight function, and updating at least one hash variable with a corresponding intermediate value only if the value of a weight function is equal to at least one predetermined value. The processing unit then generates the cryptographic hash value from the at least one hash variable.



DECRYPTION DEVICE, METHOD, AND CIRCUIT

Thu, 06 Apr 2017 08:00:00 EDT

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted by an RSA public key; and performing at least one multiplication operation and at least one square operation according to an RSA private key and the encrypted data to acquire decrypted data. A false square operation is performed in performing one of the at least one multiplication operation, or a false multiplication operation is performed in performing one of the at least one square operation.



DECRYPTION DEVICE, METHOD, AND CIRCUIT

Thu, 06 Apr 2017 08:00:00 EDT

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted according to an RSA public key; and performing a plurality of operations in sequence according to an RSA private key and the encrypted data to acquire a decrypted data. The operations include a plurality of decryption operations and at least one false operation. The decryption operations include at least one decryption multiplication operation and at least one decryption square calculation, and the at least one false operation includes at least one of at least one first false multiplication operation and at least one first false square calculation.



Using everyday objects as cryptographic keys

Thu, 06 Apr 2017 08:00:00 EDT

This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. Without knowledge of (a) the physical object itself, (b) how the physical object characteristic is converted (to a digital representation), and (c) the uniqueness value, an attacker cannot reproduce the key generator seed (or the key(s) generated from that seed).



APPARATUS AND METHOD FOR STABLIZING QUANTUM CRYPTOGRAPHY SYSTEM

Thu, 06 Apr 2017 08:00:00 EDT

Disclosed is a method for stabilizing a quantum cryptography system, which includes: determining whether the quantum cryptography system operates in a stabilized state, on the basis of a bit error rate or a key rate of the quantum cryptography system; and readjusting an arrival time of a gate pulse or a laser operation time so that an arrival time of a single photon for a photon detector is aligned with the arrival time of the gate pulse, when the quantum cryptography system does not operate in a stabilized state. Here, the quantum cryptography system may be a two-way quantum cryptography system.



ENCRYPTED GROUP COMMUNICATIONS

Thu, 06 Apr 2017 08:00:00 EDT

Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a request for secure communications with a second node to the remote management system using a control channel. The remote management system generates and encrypts a group encryption key usable by the first and second nodes and forwards the encrypted group encryption key to the first and second nodes using one or more control channels. The first and second communication nodes decrypt the group encryption key and use it to encrypt data transmitted between the nodes using a data transport network. In some implementations the securely communicating nodes may use encryption keys and/or techniques that prevent the remote management system from eavesdropping on the nodes' communications.



METHOD AND SYSTEM FOR PRIVACY-FRIENDLY LOCATION-BASED ADVERTISING

Thu, 06 Apr 2017 08:00:00 EDT

A system and method that enables a LBS provider to provide a location-based marketplace for third-party businesses to market or advertise location- and/or need-based offers to users while keeping the users' information confidential from both the LBS provider and the third party businesses is provided. While the LBS provider is able to identify a user, it cannot learn his/her needs. The third party businesses can learn the user needs, but not the identity of the users with the need. A business can compare its target location for a marketing/advertising campaign to the user's location, such that it can learn when a user is currently at a target location. However, the business will fail to learn the identity of a user in the target location, or any information about the user's current location when outside of the target location.