SECURITY APPLICATION FOR AN IT DEVICE, AND CORRESPONDING SECURITY ARCHITECTURE

    公开(公告)号:US20240356747A1

    公开(公告)日:2024-10-24

    申请号:US18698457

    申请日:2022-10-10

    申请人: CYFERALL

    发明人: Jean-Louis Olie

    IPC分类号: H04L9/14

    CPC分类号: H04L9/14

    摘要: The present invention relates to a security system (100) for IT devices (150), the security system being suitable for:

    allowing a security application (104) to define an enclave of the random access memory (RAM) which only the security application (104) can access, this enclave possibly being located within a larger protected area resulting from the implementation of a virtual machine capable of hosting third-party software that must co-operate with the secured services and the drivers of the information creation and retrieval peripherals; and
    running this security application (104) on the physical machine or on the virtual machine, wherein the security application controls access to the enclave and uses it to store the plaintext data to be protected.

    HYBRID KEY EXCHANGES FOR DOUBLE-HULLED ENCRYPTION

    公开(公告)号:US20240340273A1

    公开(公告)日:2024-10-10

    申请号:US18745913

    申请日:2024-06-17

    IPC分类号: H04L9/40 H04L9/14

    摘要: A first computing system establishes a cryptographically protected communication session with a second computing system by proposing a hybrid cryptographic scheme. In response to the proposed hybrid cryptographic scheme, a second computing system transmits cryptographic materials to the first computing system, and the first computing system transmits cryptographic materials to the second computing system. Using the cryptographic materials, two or more cryptographic keys are derived. One cryptographic key is used to perform an inner cryptographic operation on one or more data items, and another cryptographic key is used to perform an outer cryptographic operation on the one or more data items that have been cryptographically protected by the inner cryptographic operation.

    Tap-domain secret-key generation
    6.
    发明授权

    公开(公告)号:US12114151B2

    公开(公告)日:2024-10-08

    申请号:US17542265

    申请日:2021-12-03

    摘要: Methods, systems, and devices for wireless communications are described. A wireless device may receive reference signals from another wireless device over a channel between the devices. The wireless device may perform channel estimation based on the reference signals to determine multiple taps. The wireless device may receive a message from the other wireless device indicating one or more taps to be selected to obtain a secret key for encrypting a message. The wireless device may select the taps based on the indication and communicate one or more encrypted messages with the other wireless device. For example, the wireless device may receive encrypted messages, transmit encrypted messages, or both.

    SYSTEMS AND METHODS FOR HARDWARE SECURITY MODULE COMMUNICATION MANAGEMENT

    公开(公告)号:US20240333476A1

    公开(公告)日:2024-10-03

    申请号:US18736142

    申请日:2024-06-06

    发明人: Jeff J. Stapleton

    摘要: Systems, apparatuses, methods, and computer program products are disclosed for hardware security module communication management. An example method includes deriving, by a first HSM, a first cryptographic key based on an initial key and a first set of seed bits. The method also includes receiving a message comprising a second cryptographic key from a key exchange management device, wherein the second cryptographic key is associated with a second HSM. The method also includes deriving, a third cryptographic key based on the first cryptographic key and the second cryptographic key, wherein deriving the third cryptographic key establishes secure communication between the first HSM and the second HSM based on the second HSM having also derived the third cryptographic key. The method also includes performing, a first cryptographic data protection action using the third cryptographic key.