-
公开(公告)号:US20240356734A1
公开(公告)日:2024-10-24
申请号:US18407608
申请日:2024-01-09
发明人: Eric PEETERS , Jin-Meng HO
IPC分类号: H04L9/08 , B60K35/00 , B60K35/21 , B60K35/60 , B60R25/24 , G02B5/30 , G02B26/08 , G02B27/01 , G06K7/10 , G07C9/00 , H01S5/40 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40 , H04N9/31 , H04W12/04 , H04W12/50 , H05B47/11 , H05B47/14
CPC分类号: H04L9/0822 , H04L9/0861 , H04L9/14 , H04L9/3263 , H04L9/3268 , H04L63/0428 , H04L63/061 , H04W12/04 , B60K35/00 , B60K35/213 , B60K35/60 , B60K2360/27 , B60K2360/31 , B60K2360/334 , B60K2360/349 , B60K2360/77 , B60R25/24 , B60R2325/108 , G02B5/30 , G02B26/0833 , G02B27/01 , G02B27/0101 , G02B2027/0118 , G06K7/10227 , G07C9/00309 , G07C2009/00769 , H01S5/4012 , H01S5/4093 , H04L9/0838 , H04L9/0844 , H04L9/0897 , H04L9/3013 , H04L9/3066 , H04L9/3271 , H04L2209/24 , H04L2209/80 , H04L2209/805 , H04L2209/84 , H04N9/3129 , H04N9/3155 , H04N9/3167 , H04W12/50 , H05B47/11 , H05B47/14
摘要: An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.
-
2.
公开(公告)号:US20240356730A1
公开(公告)日:2024-10-24
申请号:US18660978
申请日:2024-05-10
申请人: nChain Licensing AG
发明人: Craig Steven WRIGHT
CPC分类号: H04L9/0656 , H04L9/0825 , H04L9/0869 , H04L9/0872 , H04L9/3066 , H04L9/3239 , H04L9/3252 , H04L9/50
摘要: The present disclosure relates to highly secure, high speed encryption methodologies suitable for applications such as media streaming, streamed virtual private network (VPN) services, large file transfers and the like. For example, encryption methodologies as described herein can provide stream ciphers for streaming data from, for example, a media service provider to a plurality of users. Certain configurations provide wire speed single use encryption. The methodologies as described herein are suited for use with blockchain (e.g., Bitcoin) technologies.
-
公开(公告)号:US12126738B2
公开(公告)日:2024-10-22
申请号:US17381580
申请日:2021-07-21
发明人: Thomas Poeppelmann , Wieland Fischer , Bernd Meyer
CPC分类号: H04L9/3271 , H04L9/0869 , H04L9/3066 , H04L9/3263
摘要: A method for providing challenges to a device comprising (i) compiling a first challenge based on a first random value and a parameter; (ii) compiling a second challenge based on a second random value, the parameter and based on the first challenge or any intermediate result thereof; and (iii) providing the first challenge and the second challenge to the device.
-
公开(公告)号:US20240340178A1
公开(公告)日:2024-10-10
申请号:US18297339
申请日:2023-04-07
申请人: Lemon Inc.
发明人: Haohao QIAN , Jian DU , Qiang YAN
IPC分类号: H04L9/30 , G06F16/2455 , G06F16/25
CPC分类号: H04L9/3066 , G06F16/2456 , G06F16/258 , H04L2209/46
摘要: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.
-
公开(公告)号:US20240305451A1
公开(公告)日:2024-09-12
申请号:US18668047
申请日:2024-05-17
申请人: nChain Licensing AG
发明人: Craig Steven Wright
CPC分类号: H04L9/0841 , H04L9/0825 , H04L9/085 , H04L9/3066
摘要: A method of sharing a first common secret among a plurality of nodes (A, B, C) for enabling secure communication for blockchain transactions comprises: determining, a first node (A) a plurality of second common secrets (SAPC, SAPB), wherein each second common secret is common to first node and a second node (B), determined at first node based on a first private key of first node and a first public key of second node (PC, PB) determined at the second node based on the first private key of the second node (SB, SC) and the first public key of the first node (PA). A third common secret (SBPC, SCPB) common to the second node (B) and a third node (C) is determined for the second node. The method comprises encrypting, at the first node, shares of first common secret known to the first node, and sending encrypted shares to second nodes.
-
公开(公告)号:US20240281214A1
公开(公告)日:2024-08-22
申请号:US18439297
申请日:2024-02-12
发明人: Thierry SIMON
CPC分类号: G06F7/764 , H04L9/3066 , H04L2209/046
摘要: A method includes performing a cryptographic operation using a processing device. The performing the cryptographic operation includes protecting the performing of the cryptographic operation against side channel attacks by selecting a value amongst two values based on a selection bit. Selecting the value includes concatenating the two values in a register, generating a concatenated word including the two values in two distinct portions of the concatenated word in the register. The concatenated word is rotated according to the value of the selection bit to position the selected value in a determined portion of the concatenated word in the register amongst said two portions. The unselected value in the concatenated word is suppressed. One or more processing operations is performed based on a result of the cryptographic operation.
-
公开(公告)号:US20240257107A1
公开(公告)日:2024-08-01
申请号:US18407419
申请日:2024-01-08
申请人: nChain Licensing AG
IPC分类号: G06Q20/36 , G06F9/22 , G06F9/30 , G06F21/60 , G06F21/62 , G06Q20/38 , H04L9/00 , H04L9/06 , H04L9/30 , H04L9/32
CPC分类号: G06Q20/3678 , G06F9/22 , G06F9/30021 , G06F9/30029 , G06F21/602 , G06F21/6218 , G06Q20/3827 , G06Q20/3829 , H04L9/0637 , H04L9/0643 , H04L9/3066 , H04L9/321 , H04L9/3239 , H04L9/3242 , H04L9/3252 , G06F21/6236 , H04L9/50 , H04L2209/56
摘要: Techniques are provided to implement the functionality of a logic gate by blockchain transaction. A method includes providing a locking script in a first transaction, comprising an instruction to process Boolean input; providing a further transaction having an unlocking script; processing an input signal to provide a Boolean input; and using the Boolean input to execute the locking and unlocking scripts of the first and further transactions, wherein the computing resource or agent influence the behaviour of a device or process based upon the validity of the further transaction; transmitting the further transaction and/or first transaction to a blockchain network for validation; interpreting the detecting of the further transaction within the blockchain or blockchain network as the TRUE output of a logic gate; and interpreting the failure to detect the further transaction within the blockchain or blockchain network as the FALSE output of the logic gate.
-
公开(公告)号:US12047514B2
公开(公告)日:2024-07-23
申请号:US17732852
申请日:2022-04-29
申请人: Intel Corporation
发明人: Santosh Ghosh , Manoj Sastry , Prakash Iyer , Ting Lu
CPC分类号: H04L9/3247 , G06F7/725 , H04L9/0643 , H04L9/3066 , H04L9/3234 , H04L9/3236 , H04L9/3252
摘要: Embodiments are directed to a digital signature verification engine for reconfigurable circuit devices. An embodiment of an apparatus includes one or more processors; and a reconfigurable circuit device, the reconfigurable circuit device including digital signal processing (DSP) blocks and logic elements (LEs), wherein the one or more processors are to configure the reconfigurable circuit device to operate as a signature verification engine for a bit stream, the signature verification engine including a hybrid multiplication unit, the hybrid multiplication unit combining a set of LEs and a set of the DSPs to multiply operands for signature verification.
-
公开(公告)号:US12034840B2
公开(公告)日:2024-07-09
申请号:US18106302
申请日:2023-02-06
申请人: nChain Licensing AG
发明人: Craig Steven Wright
CPC分类号: H04L9/0841 , H04L9/0825 , H04L9/085 , H04L9/3066
摘要: A method of sharing a first common secret among a plurality of nodes for enabling secure communication for blockchain transactions. The method comprises determining, for at least one first node a plurality of second common secrets, wherein each second common secret is common to the first node and a respective second node, is determined at the first node based on a first private key of the first node and a first public key of the second node and is determined at the second node based on the first private key of the second node and the first public key of the first node. The method further comprises exchanging encrypted shares of the first common secret among the plurality of nodes to enable each of the plurality of nodes to reach a threshold number of shares of the first common secret to access the first common secret.
-
公开(公告)号:US20240223368A1
公开(公告)日:2024-07-04
申请号:US18563000
申请日:2022-05-19
IPC分类号: H04L9/30
CPC分类号: H04L9/3066
摘要: There is provided a computer implemented method of performing an operation, the method comprising: for a first value corresponding to a first point on a first elliptic curve of a first type defined on a finite field, obtaining a second value corresponding to a second point on a second elliptic curve of a second type defined on the finite field; performing a first operation using the second value to determine a third value corresponding to a third point on the second elliptic curve, wherein the first operation is performed on a first processor module which supports the first operation on an elliptic curve of the second type; and transforming the third value to a fourth value corresponding to a fourth point on the first elliptic curve.
-
-
-
-
-
-
-
-
-