-
公开(公告)号:US20250070957A1
公开(公告)日:2025-02-27
申请号:US18453823
申请日:2023-08-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Silvia Melitta Mueller , Manoj Kumar , Niels Fricke
IPC: H04L9/06
Abstract: Provided are a method, a system, a computer program product, an Application Specific Integrated Circuit, and a cryptographic module, where a partitioning is performed of a SHA-2 state update into three blocks. A set of operations associated with the three blocks are executed in a pipelined manner, where each block feeds back for computation into itself.
-
公开(公告)号:US20250070956A1
公开(公告)日:2025-02-27
申请号:US18827627
申请日:2024-09-06
Applicant: INAIT SA
Inventor: Kathryn Hess Bellwald , Henry Markram
Abstract: Methods, systems, and devices for encrypting and decrypting data. In one implementation, an encryption method includes inputting plaintext into a recurrent artificial neural network, identifying topological structures in patterns of activity in the recurrent artificial neural network, wherein the patterns of activity are responsive to the input of the plaintext, representing the identified topological structures in a binary sequence of length L and implementing a permutation of the set of all binary codewords of length L. The implemented permutation is a function from the set of binary codewords of length L to itself that is injective and surjective.
-
公开(公告)号:US20250069734A1
公开(公告)日:2025-02-27
申请号:US18947661
申请日:2024-11-14
Applicant: Pacesetter, Inc.
Inventor: Simon Skup , Mostafa Sadeghi , Eraj D. Kaluarachchi
IPC: G16H40/40 , A61N1/372 , G06F8/65 , G06F21/34 , G16H20/30 , G16H40/67 , H04L9/06 , H04L9/08 , H04L9/30 , H04L9/32
Abstract: Computer-implemented methods and systems are provided that receive, at an implantable medical device (IMD), a programming package comprising a collection of configuration change requests, transaction credentials, and a signature indicative of a source of the programming package. The transaction credentials include a first hash of the collection of configuration change requests. The IMD validates an external device as the source by decrypting the signature using a key that is uniquely associated with the external device. The IMD verifies the transaction credentials and the configuration change requests of the programming package, and generates a second hash of the collection of configuration change requests. Responsive to both (i) the second hash matching the first hash and (ii) the transaction credentials and the configuration change requests being verified, the IMD executes the collection of configuration change requests to update an operating configuration of the IMD.
-
公开(公告)号:US12238221B2
公开(公告)日:2025-02-25
申请号:US17542842
申请日:2021-12-06
Applicant: INTEL CORPORATION
Inventor: David M. Durham , Rajat Agarwal , Siddhartha Chhabra , Sergej Deutsch , Karanvir S. Grewal , Ioannis T. Schoinas
IPC: H04L9/32 , G06F3/06 , G06F11/10 , G06F12/0886 , G06F12/14 , G06F21/78 , G06F21/79 , G11C29/52 , H04L9/06 , H04L9/08 , G11C29/44
Abstract: In one example, a system for managing encrypted memory comprises a processor to store a first MAC based on data stored in system memory in response to a write operation to the system memory. The processor can also detect a read operation corresponding to the data stored in the system memory, calculate a second MAC based on the data retrieved from the system memory, determine that the second MAC does not match the first MAC, and recalculate the second MAC with a correction operation, wherein the correction operation comprises an XOR operation based on the data retrieved from the system memory and a replacement value for a device of the system memory. Furthermore, the processor can decrypt the data stored in the system memory in response to detecting the recalculated second MAC matches the first MAC and transmit the decrypted data to cache thereby correcting memory errors.
-
公开(公告)号:US12238201B1
公开(公告)日:2025-02-25
申请号:US17865862
申请日:2022-07-15
Applicant: Gary Eaker
Inventor: Gary Eaker
Abstract: A method for encryption and decryption of files or email messages text, is disclosed that involves loading a p-text file for encryption into a computing device, determining if total bit number of said file is divisible by six and adding any necessary bits to result in bit number divisible by six, combining the bit sequence with a matching number of pad bits using an XOR additive cipher resulting in a modified file, converting said modified file to C-text, six bits a time, using a conversion table, rearranging the c text sequence using Prime Set Permutation. inserting a PSP lock character into the sequence, inserting pad pointer sequence characters into said sequence and displaying the file name saved.
-
公开(公告)号:US20250061202A1
公开(公告)日:2025-02-20
申请号:US18600100
申请日:2024-03-08
Applicant: SAMSUNG ELECTRONICS CO.,LTD.
Inventor: Sewon KIM , Kyung-Woo NOH , Subin seo
Abstract: A method for updating firmware of an electronic device includes verifying a first firmware certificate using a first public key, based on at least one of the electronic device being supplied power or the electronic device being reset, verifying a first firmware code included in the first firmware image based on a first hash value included in the first firmware certificate, and operating the electronic device using the first firmware code, based on the verifying of the first firmware certificate and the verifying of the first firmware code being successful. The first firmware certificate being included in a first firmware image stored in a memory of the electronic device.
-
公开(公告)号:US12231542B2
公开(公告)日:2025-02-18
申请号:US18334035
申请日:2023-06-13
Applicant: Google LLC
Inventor: Craig Wright , Laura Grace Book , Sheng Ma , Jiayu Peng , Xichen Huang , Benjamin R. Kreuter , Evgeny Skvortsov , Arthur Asuncion , James Robert Koehler
Abstract: Systems and methods for generating min-increment counting bloom filters to determine count and frequency of device identifiers and attributes in a networking environment are disclosed. The system can maintain a set of data records including device identifiers and attributes associated with device in a network. The system can generate a vector comprising coordinates corresponding to counter registers. The system can identify hash functions to update a counting bloom filter. The system can hash the data records to extract index values pointing to a set of counter registers. The system can increment the positions in the min-increment counting bloom filter corresponding to the minimum values of the counter registers. The system can obtain an aggregated public key comprising a public key. The system can encrypt the counter registers using the aggregated shared key to generate an encrypted vector. The system can transmit the encrypted vector to a networked worker computing device.
-
公开(公告)号:US12231539B2
公开(公告)日:2025-02-18
申请号:US17630669
申请日:2020-04-01
Inventor: Zhuguang Shao , Haibo Sun , Haiquan Huang , Guangwei Zhao , Shuang Zhang
Abstract: A method and an apparatus are provided. The method may include: receiving a query request and signature information of the query request sent from a first node in a blockchain other than a current blockchain, where there is a proxy node of the first node in the current blockchain, and the query request includes a query content and a storage number of a public key of the first node in the current blockchain; acquiring the public key of the first node from the current blockchain based on the storage number of the public key of the first node in the current blockchain; acquiring query data indicated by the query content from the current blockchain, in response to the signature information of the query request passing verification by the public key of the first node; and feeding back a query result to the first node based on the query data.
-
公开(公告)号:US12230260B2
公开(公告)日:2025-02-18
申请号:US17193462
申请日:2021-03-05
Applicant: Lenovo (Singapore) Pte. Ltd.
Inventor: John Weldon Nicholson , Igor Stolbikov , David Alexander Schwarz
IPC: G10L15/22 , G06F21/62 , G06F40/279 , G10L15/26 , H04L9/06
Abstract: One embodiment provides a method, including: receiving, at an information handling device, text associated with a user command; storing, in a data store, an encrypted form of the text associated with the user command; determining, using a processor, whether the encrypted form of the text has been detected in other user commands in exceedance of a predetermined threshold; and storing, responsive to determining that the encrypted form of the text has been detected in the other user commands in exceedance of the predetermined threshold, an unencrypted transcript of the text in a data table. Other aspects are described and claimed.
-
公开(公告)号:US12229753B2
公开(公告)日:2025-02-18
申请号:US18182289
申请日:2023-03-10
Applicant: Coinbase, Inc.
Inventor: Peter Jihoon Kim
IPC: G06Q20/36 , G06F16/23 , G06K19/06 , G06Q20/06 , G06Q20/32 , G06Q20/38 , H04L9/00 , H04L9/06 , H04L9/40
Abstract: The method 10 for mobile cryptocurrency wallet connectivity can include facilitating a blockchain transaction S100 and establishing an initial connection between a mobile client and a web client S200. The system 20 for mobile cryptocurrency wallet connectivity can include a browser 110, one or more websites 120, a web client 130, a mobile application 140, and a backend server 150.
-
-
-
-
-
-
-
-
-