Patent application number | Description | Published |
20100054466 | METHOD OF GENERATING ARBITRARY NUMBERS GIVEN A SEED - The invention provides a method of generating arbitrary numbers given a seed, characterized by providing a challenge derived from the seed to a physical token, receiving an initial response from the physical token, combining the initial response with helper data associated with the challenge to produce a stable response, and generating the arbitrary numbers using a pseudo-random number generator using the stable response as a seed for the generator. Preferably one or more of these pseudo-random permutations are used as one or more round function(s) in a Feistel block cipher. The generated arbitrary numbers may also be used to create a cryptographic key. | 03-04-2010 |
20100138669 | ENCRYPTION AND DECRYPTION OF A DATASET IN AT LEAST TWO DIMENSIONS - It is described a method for encrypting and a method for decrypting at least a portion ( | 06-03-2010 |
20100176920 | METHOD AND DEVICE FOR PROVIDING DIGITAL SECURITY - This invention relates to a method and system for providing digital security by means of a reconfigurable physical uncloneable function, RPUF. The RPUF comprises a physical system constituted by distributed components arranged to generate a first response when receiving a first challenge at a point of the physical system. The physical reconfiguring of the RPUF comprises redistributing the components such that they generate a second response, which differs from said first response, when again applying the first challenge at the point. The reconfiguration step is further utilized in providing secure storage for digital items. The digital item is data of any kind, including data that needs to be accessed and updated, i.e. which is dynamic in nature. The method is exemplified by implementations such as secure storage of a key, a secure counter and a seed generator. | 07-15-2010 |
20110153944 | Secure Cache Memory Architecture - A variety of circuits, methods and devices are implemented for secure storage of sensitive data in a computing system. A first dataset that is stored in main memory is accessed and a cache memory is configured to maintain logical consistency between the main memory and the cache. In response to determining that a second dataset is a sensitive dataset, the cache memory is directed to store the second dataset in a memory location of the cache memory without maintaining logical consistency with the dataset and main memory. | 06-23-2011 |
20110317838 | METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR - A method for securing communications between a first node (N | 12-29-2011 |
20120047361 | METHOD FOR SECURING COMMUNICATIONS IN A WIRELESS NETWORK, AND RESOURCE-RESTRICTED DEVICE THEREFOR - The present invention relates to a method for securing communications between a resource-restricted device ( | 02-23-2012 |
20120084863 | METHOD AND SYSTEM FOR IDENTIFYING COMPROMISED NODES - The invention relates to a method for identifying compromised nodes in a ZigBee network comprising a general trust center, divided in at least two security domains, each security domain corresponding to a spatial or temporal area, and being associated with a different root keying material, and each node being identified by an identifier, the method comprising: upon detection of a node (U | 04-05-2012 |
20120114123 | METHOD FOR SECURELY BROADCASTING SENSITIVE DATA IN A WIRELESS NETWORK - The invention relates to a method for securely broadcasting sensitive data in a wireless sensor networks comprising a central device, called trust center, and a plurality of sensor nodes, the trust center being initialized with a cryptographic hash chain and each node being initialized with a node key and the anchor of the trust center hash chain, the method comprising the following steps: the trust center broadcasting a first secure message to the nodes, each node, after reception of the first message, creating a first acknowledgment message, and transmitting it back to the trust center, the trust center checking whether all the nodes have transmitted respective first acknowledgment message, and in case all messages have been received, the trust center securely broadcasting sensitive data in a third message, the nodes checking, based on elements included in the first message, whether sensitive data actually originates from the trust center. | 05-10-2012 |
20120195431 | METHOD FOR OPERATING A NODE IN A WIRELESS SENSOR NETWORK - The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal. | 08-02-2012 |
20130297087 | RESOURCE METERING SYSTEM AND METHOD USING SUCH A SYSTEM FOR SMART ENERGY CONSUMPTION - The resource metering system comprises: an end-point device ( | 11-07-2013 |
20150023498 | BYZANTINE FAULT TOLERANCE AND THRESHOLD COIN TOSSING - A coin share generator ( | 01-22-2015 |