DATA INTEGRITY VERIFICATION
    21.
    发明申请
    DATA INTEGRITY VERIFICATION 审中-公开
    数据完整性验证

    公开(公告)号:US20160330214A1

    公开(公告)日:2016-11-10

    申请号:US15217624

    申请日:2016-07-22

    IPC分类号: H04L29/06

    摘要: A system performs cryptographic operations utilizing information usable to verify validity of plaintext. To prevent providing information about a plaintext by providing the information usable to verify the validity of the plaintext, the system provides the information usable to verify validity of the plaintext to an entity on a condition that the entity is authorized to access the plaintext. The information usable to verify validity of the plaintext may be persisted in ciphertext along with the plaintext to enable the plaintext to be verified when decrypted.

    摘要翻译: 系统利用可用于验证明文有效性的信息来执行加密操作。 为了通过提供可用于验证明文有效性的信息来防止提供关于明文的信息,在实体被授权访问明文的条件下,系统提供可用于验证明文的有效性的信息给实体。 可用于验证明文有效性的信息可以与明文一起保持密文,以便在解密时能够验证明文。

    Secure timestamping
    22.
    发明授权
    Secure timestamping 有权
    安全时戳

    公开(公告)号:US09443108B1

    公开(公告)日:2016-09-13

    申请号:US14318314

    申请日:2014-06-27

    IPC分类号: G06F21/70 H04L9/32

    摘要: A method and system for retrieving a current and previous timestamp value, retrieving a previous accumulator value reflecting a previous state of the accumulator, retrieving information representing digests collected during an interval window, and generating a new accumulator value based on the retrieved values, and a storage medium with executable code for retrieving a first and second timestamp, a first and second accumulator value, information representing digests, and for validating data by comparing the second accumulator value with a hash of the first timestamp, the first accumulator value, and the information.

    摘要翻译: 一种用于检索当前和先前时间戳值的方法和系统,检索反映累加器的先前状态的先前累加器值,检索表示在间隔窗口期间收集的摘要的信息,以及基于检索到的值生成新的累加器值,以及 具有用于检索第一和第二时间戳的可执行代码的存储介质,第一和第二累加器值,表示摘要的信息,以及通过将第二累加器值与第一时间戳的散列值,第一累加器值和信息进行比较来验证数据 。

    Authenticating secure channel establishment messages based on shared-secret

    公开(公告)号:US11044082B2

    公开(公告)日:2021-06-22

    申请号:US16563687

    申请日:2019-09-06

    IPC分类号: H04L9/08 H04L9/32 H04L29/06

    摘要: Systems and processes are described for establishing and using a secure channel. A shared secret may be used for authentication of session initiation messages as well as for generation of a private/public key pair for the session. A number of ways of agreeing on the shared secret are described and include pre-sharing the keys, reliance on a key management system, or via a token mechanism that uses a third entity to manage authentication, for example. In some instances, the third party may also perform endpoint selection by providing a particular endpoint along with the token. The particular cipher suite applied in a particular implementation may be configurable. The process is applicable to either implicit key confirmation (e.g., handshake negotiation) or explicit key confirmation (e.g., full negotiation).

    Secure initialization vector generation

    公开(公告)号:US10972270B2

    公开(公告)日:2021-04-06

    申请号:US15898505

    申请日:2018-02-17

    摘要: A plaintext and cryptographic key are used to generate an initialization vector to be used in a cryptographic algorithm, such as an encryption algorithm. In some examples, the plaintext and cryptographic key are input into an effectively one-way function, such as a cryptographic hash function, the output of which is usable as an initialization vector. Cryptographic keys may be rotated probabilistically based at least in part on probabilities of output collisions of the effectively one-way function to ensure a low probability of two different plaintexts resulting in calculation of the same initialization vector for use with the same cryptographic key.

    Configuration updates for access-restricted hosts

    公开(公告)号:US10904011B2

    公开(公告)日:2021-01-26

    申请号:US16179548

    申请日:2018-11-02

    摘要: A host machine operated for a specific purpose can have restricted access to other components in a multi-tenant environment in order to provide for the security of the host machine. The access restriction can prevent the host machine from obtaining updates to critical system-level configurations, but such information can be obtained through a signed command received to an API for the host machine. The command can be signed by a quorum of operators, and the host machine can be configured to verify the signatures and the quorum before processing the command. The host machine can store the updates to ephemeral storage as well as persistent storage, such that upon a reboot or power cycle the host machine can operate with current configuration data.

    Authenticating nonces prior to encrypting and decrypting cryptographic keys

    公开(公告)号:US10826708B2

    公开(公告)日:2020-11-03

    申请号:US15798117

    申请日:2017-10-30

    IPC分类号: H04L9/32 H04L9/08 H04L9/06

    摘要: Data security is enhanced by receiving a request that identifies an encrypted data key, an authentication tag, and additional authenticated data that includes at least a nonce. In some cases, the authentication tag is cryptographically derivable from the encrypted data key and the additional authenticated data. A system, in some cases, determines whether the nonce is authentic and decrypts the encrypted data key by using at least a cryptographic key and the nonce, thereby resulting in a plaintext data key that is usable in various contexts.