Systems and methods for analyzing stability using metal resistance variations

    公开(公告)号:US11132178B2

    公开(公告)日:2021-09-28

    申请号:US16856887

    申请日:2020-04-23

    申请人: STC.UNM

    发明人: James Plusquellic

    摘要: This disclosure describes techniques for analyzing statistical quality of bitstrings produced by a physical unclonable function (PUF). The PUF leverages resistance variations in the power grid wires of an integrated circuit. Temperature and voltage stability of the bitstrings are analyzed. The disclosure also describes converting a voltage drop into a digital code, wherein the conversion is resilient to simple and differential side-channel attacks.

    Electronic certification system
    62.
    发明授权

    公开(公告)号:US11128477B2

    公开(公告)日:2021-09-21

    申请号:US16333931

    申请日:2018-04-09

    摘要: An electronic certification system that can simplify a process for verification of reliability while improving reliability. The electronic certification system guarantees reliability of data using an audit trail registered in a blockchain, the data being provided to a second terminal such as a client by a first terminal such as a server, the first terminal includes audit trail registration for registering information and the data as the audit trail in the blockchain, the information relating at least one of the first terminal, an administrator of the first terminal, and a program configured to run on the first terminal and exchange the data with the second terminal, and an audit trail provider for transmitting the audit trail to the second terminal. The second terminal determines that the data is reliable if the audit trail provided by the audit trail provider has been registered in the blockchain.

    SECRET BATCH APPROXIMATION SYSTEM, SECURE COMPUTATION DEVICE, SECRET BATCH APPROXIMATION METHOD, AND PROGRAM

    公开(公告)号:US20210287573A1

    公开(公告)日:2021-09-16

    申请号:US17055993

    申请日:2019-05-20

    发明人: Koki HAMADA

    IPC分类号: G09C1/00 H04L9/08

    摘要: Calculation time is reduced without degrading approximation accuracy in calculation of a complicated function through secure computation. A secret batch approximation system calculates a concealed text [z] of an approximate value z for a function value y satisfying yj=f(xj) by using a concealed text [x] of a value x as input. g is defined as a polynomial for approximating each section of m sections into which the function f is divided. A parameter acquisition unit acquires a concealed text [a] of a parameter a corresponding to the value x for each integer j that is not less than 1 and not more than n, where aj is defined as a parameter pi corresponding to a section Ri including a value xj. A polynomial calculation unit calculates a polynomial g([x], [a]) by using the concealed text [x] of the value x as input based on the concealed text [a].

    ENCRYPTION AND DECRYPTION METHOD BASED ON GENE CHIP

    公开(公告)号:US20210264817A1

    公开(公告)日:2021-08-26

    申请号:US17243352

    申请日:2021-04-28

    发明人: JING GAO

    IPC分类号: G09C1/00 H04L9/06

    摘要: A method for asymmetric encryption based on a gene chip includes the steps of (a) obtaining original information in text or image or other form and converting the same into a binary code, and (b) preprocessing the binary code to obtain a binary matrix. In (c), an encryption key is obtained, the encryption key comprising a gene expression solution. In (d), the gene expression solution is placed on a gene chip according to an arrangement and correspondence of the binary matrix.

    DATA SECURITY APPARATUS AND METHOD USING CONSTANT OPTICAL SIGNAL INPUT TO ANALOG COMPONENT

    公开(公告)号:US20210256878A1

    公开(公告)日:2021-08-19

    申请号:US17221228

    申请日:2021-04-02

    申请人: OPe, LLC

    摘要: A data security apparatus includes an analog component. The analog component operates internally with a high degree of entropy. This high degree of entropy resides in the interactions between its internal components in response to an external driving signal. The interactions within the analog component have a level of entropy that is high enough to make digital simulation of the analog component impractical. Because the analog component is impractical to digitally simulate it is referred to as being digitally unclonable. The data security apparatus processes data by encrypting plaintext data into ciphertext and/or decrypting data from ciphertext into plaintext. Part of the conversion between plaintext and ciphertext uses the analog component. Since the analog component is digitally unclonable (that is, impractical to digitally simulate), the part of the conversion process that uses the analog component requires possession of the analog component itself or the possession of another analog component that has the same signature.

    Method for storing data on a storage entity

    公开(公告)号:US11048805B2

    公开(公告)日:2021-06-29

    申请号:US15999360

    申请日:2016-02-17

    摘要: A method for storing data on a storage entity (SE) includes: computing a file identifier for a file to be stored on the SE; checking if the file has already been stored using the file identifier; generating a user-specific private and public identifier; updating or computing tags of the file by the client such that the updating or computing is homomorphic in the user-specific private identifier and in parts of the file; providing the user-specific public identifier, the updated tags and a proof of possession of the secret identifier to the SE; verifying the proof-of-possession; verifying validity of the tags; upon successful checking, storing a public identifier for the file incorporating the user-specific public identifier and the updated tags by the SE; and upon a case where it is determined that the file has not already been stored, storing the file.

    Handshake authenticated coded locked container

    公开(公告)号:US11037385B2

    公开(公告)日:2021-06-15

    申请号:US16821697

    申请日:2020-03-17

    申请人: eBay Inc.

    IPC分类号: G07C9/00 G09C1/00

    摘要: A system and method enable unlocking a locking device by controlling transmission of an access key. A server receives a location signal from a locking device. The location signal provides a confirmation generated by the locking device that the locking device is at a location associated with the recipient. In response to receiving the location signal confirming that the locking device is at the location associated with the recipient, the server triggers relay of an access key for unlocking the locking device.