-
公开(公告)号:US11683182B2
公开(公告)日:2023-06-20
申请号:US16869783
申请日:2020-05-08
发明人: Michael W. Gray , Narayana Aditya Madineni , Simon D. McMahon , Matthew Green , Stephen J. McKenzie , Michael James Thomas
CPC分类号: H04L9/3242 , H04L9/088 , H04L2209/08
摘要: A method, a computer program product, and a system for embedding a message in a random value. The method includes generating a random value and applying a hash function to the random value to produce a hash value. Starting with the hash value, the method further includes reapplying the hash function in an iterative or recursive manner, with a new hash value produced by the hash function acting as an initial value that is applied to the hash function for a next iteration, until a bit sequence representing a message is produced in a message hash value. The method further includes utilizing the message hash value as a new random value that can be used by an encryption algorithm.
-
公开(公告)号:US20230044935A1
公开(公告)日:2023-02-09
申请号:US17397261
申请日:2021-08-09
摘要: A computer system determines stack usage. An intercept function is executed to store a stack marker in a stack, wherein the intercept function is invoked when a program enters or exits each function of a plurality of functions of the program. A plurality of stack markers are identified in the stack and a memory address is determined for each stack marker during execution of the program to obtain a plurality of memory addresses. The plurality of memory addresses are analyzed to identify a particular memory address associated with a greatest stack depth. A stack usage of the program is determined based on the greatest stack depth. Embodiments of the present invention further include a method and program product for determining stack usage in substantially the same manner described above.
-
公开(公告)号:US20210288943A1
公开(公告)日:2021-09-16
申请号:US16816467
申请日:2020-03-12
摘要: Provided is a method, a computer program product, and a system for providing perfect forward secrecy in virtual machines. The method includes receiving a secure memory allocation function from an application, including a connection secret to be stored in memory. The method further includes allocating memory for the connection secret according to the memory size parameter and storing an entry relating to the connection secret in a secure database. The memory information includes a memory location and a memory size of the memory. The method also includes monitoring an operation state relating to the virtual machine. The method further includes receiving, from the application, a secure deallocation function relating to the connection secret and retrieving the memory information from the secure database. The method also includes deleting the connection from the memory and sanitizing the memory location logged by the memory information.
-
公开(公告)号:US20210281608A1
公开(公告)日:2021-09-09
申请号:US16810364
申请日:2020-03-05
发明人: Matthew Green , Narayana Aditya Madineni , Peter T. Waltenberg , Michael W. Gray , Leigh S. McLean , Alexander John Hennekam , Simon D. McMahon
摘要: A method, a computer program product, and a system for transport layer security protocol functions in separate instances. The method includes receiving, by a handshake processor instance, a TLS connection request from a client to a server. The method further includes establishing a TLS connection including connection secrets by the handshake processor instance. Once established, the method proceeds by transmitting the connection secrets to a connection processor instance. The method further includes deleting the connection secrets stored on the handshake processor instance and processing application data by the connection processor instance.
-
公开(公告)号:US20210144004A1
公开(公告)日:2021-05-13
申请号:US16679422
申请日:2019-11-11
发明人: Michael W. Gray , Narayana Aditya Madineni , Matthew Green , Simon D. McMahon , Leigh S. McLean , Stephen J. McKenzie , Luvita Burgess , Peter T. Waltenberg
摘要: Transport Layer Security (TLS) connection establishment between a client and a server for a new session is enabled using an ephemeral (temporary) key pair. In response to a request, the server generates a temporary certificate by signing an ephemeral public key using the server's private key. A certificate chain comprising at least the temporary certificate that includes the ephemeral public key, together with a server certificate, is output to the client by the server, which acts as a subordinate Certificate Authority. The client validates the certificates, generates a session key and outputs the session key wrapped by the ephemeral public key. To complete the connection establishment, the server applies the ephemeral private key to recover the session key derived at the client for the new session. The client and server thereafter use the session key to encrypt and decrypt data over the link. The ephemeral key pair is not reused.
-
公开(公告)号:US20200005296A1
公开(公告)日:2020-01-02
申请号:US16021162
申请日:2018-06-28
发明人: Matthew Green
摘要: An example operation may include one or more of creating a proposed transaction including one or more assets, transmitting the proposed transaction to a user device for authorization, receiving authorization from the user device via an asynchronous one-time password to authorize the proposed transaction, and creating a blockchain transaction including the asynchronous one-time password and content of the proposed transaction responsive to receiving the authorization.
-
公开(公告)号:US11892938B2
公开(公告)日:2024-02-06
申请号:US16819881
申请日:2020-03-16
CPC分类号: G06F11/3636 , G06F11/3664 , G06N3/045 , G06N3/088
摘要: An analyzer system inputs parameter values from trace files of a software application into an autoencoder. The analyzer system adjusts weights of the edges between nodes in the autoencoder until reconstruction errors in outputs are minimized. The analyzer system receives a selection of a parameter represented in an autoencoder. In response, the analyzer system identifies hidden layer nodes connected to an output node corresponding to the selected parameter and identifies other output nodes connected to the hidden layer nodes. The analyzer system retrieves weights assigned to edges between the hidden layer nodes and the other output nodes. The analyzer system calculates correlation values between the output node corresponding to the selected parameter and each of the other output nodes and outputs the correlation values. A user can use the correlation values to better direct the root cause analysis.
-
公开(公告)号:US11757659B2
公开(公告)日:2023-09-12
申请号:US17108236
申请日:2020-12-01
发明人: Michael W. Gray , Narayana Aditya Madineni , Simon D. McMahon , Matthew Green , Peter T. Waltenberg
CPC分类号: H04L9/3265 , H04L9/0825 , H04L9/0852 , H04L9/3247
摘要: A method, a computer program product, and a system for binding post-quantum certificates to traditional certificates. The method includes selecting a traditional certificate in a certificate chain owned by an owner. The method also includes calculating a fingerprint of the traditional certificate. The method further includes generating a post-quantum certificate with identical information fields as the traditional certificate, and populating a serial number of the post-quantum certificate using the fingerprint. The post-quantum certificate acts as an extension of the first traditional certificate providing authentication and validation between a client and a server using post-quantum capable signing algorithms.
-
公开(公告)号:US20220209950A1
公开(公告)日:2022-06-30
申请号:US17137656
申请日:2020-12-30
发明人: Michael W. Gray , Simon D. McMahon , Narayana Aditya Madineni , Matthew Green , Peter T. Waltenberg
摘要: In an approach for securing data, a processor publishes a traditional public key in a traditional certificate and a PQC public key in a PQC certificate. A processor encrypts data with a hybrid shared secret, the hybrid shared secret generated with a key derivation function by using a traditional shared secret based on the traditional public key and a PQC shared secret based on the PQC public key. A processor decrypts the data with the hybrid shared secret based on a traditional private key and a PQC private key. A processor signs the data with a traditional signature followed by a PQC signature.
-
公开(公告)号:US11374975B2
公开(公告)日:2022-06-28
申请号:US16919254
申请日:2020-07-02
发明人: Michael W. Gray , Narayana Aditya Madineni , Simon D. McMahon , Matthew Green , Leigh S. McLean , Peter T. Waltenberg
摘要: A method and a system for integrating post quantum cryptographic algorithms into TLS. The method includes transmitting a client hello message to a server including a request for post quantum cryptographic (PQC) mode of operation and a PQC public client key, receiving a server hello message from the server in response to the client hello message including a PQC server key exchange generated from the PQC public client key. The method includes determining the server hello message includes an authorization to operate the PQC mode of operation. The method also includes transmitting a second client hello message to the server including a PQC encrypted client key share. The PQC encrypted client key share is encrypted using a client encryption key. The method includes receiving a second server hello message that includes a PQC encrypted server key share and decrypting the PQC encrypted server key share using a server encryption key.
-
-
-
-
-
-
-
-
-