Verifiable, Leak-Resistant Encryption and Decryption
    2.
    发明申请
    Verifiable, Leak-Resistant Encryption and Decryption 有权
    可验证的,防泄漏的加密和解密

    公开(公告)号:US20110138192A1

    公开(公告)日:2011-06-09

    申请号:US12958570

    申请日:2010-12-02

    IPC分类号: G06F21/24 G06F21/00

    摘要: This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. Derived keys and validators are produced using methods designed to preserve security even if cipher and hashing operations leak information. Embodiments for systems including SoCs, firmware loading, FPGAs and network communications are described.

    摘要翻译: 本专利描述了可以通过设备加密和解密敏感数据的技术,以提供来自外部监视攻击的安全性的方式。 加密设备可以访问解密设备也是已知的基本密钥加密值(密钥)。 敏感数据被分解为段,并且每个段用来自基本密钥的单独的加密密钥和消息标识符加密,以创建一组加密的段。 加密设备使用基本秘密加密值来创建验证器,证明该消息标识符的加密段由具有访问基本密钥的设备创建。 解密装置在接收到加密的段和验证器时,使用验证器来验证消息标识符,并且加密段未被修改,然后使用从基本密钥和消息标识符导出的加密密钥来解密段。 派生密钥和验证器使用旨在保护安全性的方法生成,即使加密和散列操作泄漏信息。 描述了包括SoC,固件加载,FPGA和网络通信的系统的实施例。

    Verifiable, leak-resistant encryption and decryption
    3.
    发明授权
    Verifiable, leak-resistant encryption and decryption 有权
    可验证,防漏加密和解密

    公开(公告)号:US08386800B2

    公开(公告)日:2013-02-26

    申请号:US12958570

    申请日:2010-12-02

    IPC分类号: H04L9/32 H04L9/00

    摘要: This patent describes techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments. Derived keys and validators are produced using methods designed to preserve security even if cipher and hashing operations leak information. Embodiments for systems including SoCs, firmware loading, FPGAs and network communications are described.

    摘要翻译: 本专利描述了可以通过设备加密和解密敏感数据的技术,以提供来自外部监视攻击的安全性的方式。 加密设备可以访问解密设备也是已知的基本密钥加密值(密钥)。 敏感数据被分解为段,并且每个段用来自基本密钥的单独的加密密钥和消息标识符加密,以创建一组加密的段。 加密设备使用基本秘密加密值来创建验证器,证明该消息标识符的加密段由具有访问基本密钥的设备创建。 解密装置在接收到加密的段和验证器时,使用验证器来验证消息标识符,并且加密段未被修改,然后使用从基本密钥和消息标识符导出的加密密钥来解密段。 派生密钥和验证器使用旨在保护安全性的方法生成,即使加密和散列操作泄漏信息。 描述了包括SoC,固件加载,FPGA和网络通信的系统的实施例。

    Policy evolution with machine learning
    4.
    发明授权
    Policy evolution with machine learning 失效
    机器学习的政策演进

    公开(公告)号:US08606724B2

    公开(公告)日:2013-12-10

    申请号:US12266198

    申请日:2008-11-06

    CPC分类号: G06N99/005

    摘要: A method for constructing a classifier which maps an input vector to one of a plurality of pre-defined classes, the method steps includes receiving a set of training examples as input, wherein each training example is an exemplary input vector belonging to one of the pre-defined classes, learning a plurality of functions, wherein each function maps the exemplary input vectors to a numerical value, and determining a class for the input vector by combining numerical outputs of the functions determined for the input vector.

    摘要翻译: 一种用于构建将输入向量映射到多个预定义类之一的分类器的方法,所述方法步骤包括接收一组训练样本作为输入,其中每个训练样本是属于所述预定义类别之一的示例性输入向量 学习多个功能,其中每个功能将示例性输入向量映射到数值,并且通过组合为输入向量确定的函数的数字输出来确定输入向量的类。

    Space-efficient, side-channel attack resistant table lookups

    公开(公告)号:US07142670B2

    公开(公告)日:2006-11-28

    申请号:US09943720

    申请日:2001-08-31

    IPC分类号: H04K1/00 H04L9/00

    摘要: Methods, apparatus and computer software and hardware products providing method, apparatus and system solutions for implementing table lookups in a side-channel attack resistant manner. Embodiments are provided for devices and situations where there is limited amount of RAM memory available or restrictions on memory addressing. The solutions solve problems associated with look up tables with large indices, as well as problems associated with looking up large sized tables or a collection of tables of large cumulative size, in limited devices, in an efficient side-channel attack resistant manner. These solutions provide defenses against both first-order side channel attacks as well as higher-order side channel attacks. One aspect of the present invention is the creation of one or more random tables which are used possibly in conjunction with other tables to perform a table lookup. This denies an adversary information about the table lookup from the side channel and thereby imparting side-channel resistance to the table lookup operation. Another aspect of the present invention is the use of a combination of some operations such as Table Split, Table Mask and Table Aggregate, to achieve this side-channel resistance within the limited amounts of available RAM and limited memory addressing capabilities of the device performing table lookups.

    Intrusion detection system
    9.
    发明申请
    Intrusion detection system 审中-公开
    入侵检测系统

    公开(公告)号:US20060161982A1

    公开(公告)日:2006-07-20

    申请号:US11037695

    申请日:2005-01-18

    IPC分类号: G06F12/14

    CPC分类号: G06F21/554 G06F21/53

    摘要: An intrusion detection system (IDS), method of protecting computers against intrusions and program product therefor. The IDS determines which applications are to run in native environment (NE) and places the remaining applications in a sandbox. Some of the applications in sandboxes may be placed in a personalized virtual environment (PVE) in the sandbox. Upon detecting an attempted attack, a dynamic honeypot may be started for an application in a sandbox and not in a PVE. A virtualized copy of system resources may be created for each application in a sandbox and provided to the corresponding application in the respective sandbox.

    摘要翻译: 入侵检测系统(IDS),防止计算机入侵的方法和程序产品。 IDS确定在本地环境(NE)中运行哪些应用程序,并将剩余的应用程序放在沙箱中。 砂箱中的一些应用程序可能会放置在沙箱中的个性化虚拟环境(PVE)中。 在检测到尝试的攻击时,可以为沙箱而不是PVE中的应用启动动态蜜罐。 可以为沙箱中的每个应用程序创建系统资源的虚拟副本,并提供给相应沙箱中的相应应用程序。