Abstract:
A system (100) and method for verifying and executing remote software applications (210) having a service provider server (200), a trusted third party server (300) having a network (500) connection to the service provider server (200), and a client system (400) having a network (500) connection to the trusted server (300). The service provider server (200) stores software applications (210), which are duplicated and transmitted to the trusted server (300) upon receiving of a user access request from the same. The trusted server (300) having means (350) for verifying the security level of the software application (210) and means (330) for executing the same. The client system (400) having means for transmitting user access request to the trusted server (300), means (410) for transmitting input data (440) to the trusted server (300), and means (410) for receiving output data from the same.
Abstract:
A method of constructing at least one 3 dimensional image from a plurality of data is provided, the method includes the steps of extracting data centerline using a center of gravity formula for at least one image, partitioning the at least one image into a plurality of portions, determining a plurality of gray scale points in each portion, comparing the plurality of gray scale points with a threshold value, determining the center of gravity for each portion and connecting a plurality of center of gravity. A 3 dimensional image constructible from a plurality of data is also provided, the image includes a plurality of 3 dimensional points linearly connectable to form at least one cloud of 3 dimensional points.
Abstract:
A method of constructing at least one 3 dimensional image from a plurality of data is provided, the method includes the steps of extracting data centerline using a center of gravity formula for at least one image, partitioning the at least one image into a plurality of portions, determining a plurality of gray scale points in each portion, comparing the plurality of gray scale points with a threshold value, determining the center of gravity for each portion and connecting a plurality of center of gravity. A 3 dimensional image constructible from a plurality of data is also provided, the image includes a plurality of 3 dimensional points linearly connectable to form at least one cloud of 3 dimensional points.
Abstract:
A system (100) for providing access control through data sealing and unsealing using Trusted Platform Module (TPM). The system comprises at least one Trusted Platform Module (18) and at least one Access Control Manager (10) comprising at least one user information table (12), at least one sealing table (14) and at least one sealing 10 service (16). The method (200) for providing access control through data sealing/unsealing using TPM comprises steps of receiving sealing/unsealing command to seal/unseal data (202), validating requesters information using information table (204), determining validity of requester information (206), verifying integrity of sealing table/sealing service, providing data to be sealed and binding token of requester to be used for sealing to TPM (216), performing data sealing (218), 20 receiving sealed data from TPM (220), returning sealed data to requester (222) and updating, measuring integrity of sealing table and storing integrity measurement in TPM (224).
Abstract:
One embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l . The method comprising deriving multiplicative scalar from binary input; multiplying given matrix with multiplicative scalar, producing first intermediate matrix; deriving first permutation of n objects from binary input; permuting rows of first intermediate matrix according to first permutation, producing second intermediate matrix; deriving second permutation of n objects from binary input; and permuting columns of second intermediate matrix according to second permutation to produce final MDS matrix. Another embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l . The method comprising deriving multiplicative scalar from the key (202); multiplying given matrix with multiplicative scalar to produce first intermediate matrix (204); deriving first permutation of n objects from the key (206); permuting rows of first intermediate matrix according to first permutation to produce second intermediate matrix (208); deriving second permutation of n objects from the key (304); and permuting columns of second intermediate matrix according to second permutation (212) to produce final MDS matrix (214).
Abstract:
Trusted platform module is a processor that stores cryptographic keys according to a specification. This invention proposes a method for software application to access trusted platform module function. Trusted application service and software application is configured (306) to be measured to check the integrity of the trusted application service and software application. Measured trusted application service and system configuration is stored in trusted storage (310). The measured information is compared whenever a user login or application is used. Hence, a user and application is authenticated with trusted platform module.
Abstract:
One embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l. The method comprising deriving multiplicative scalar from binary input; multiplying given matrix with multiplicative scalar, producing first intermediate matrix; deriving first permutation of n objects from binary input; permuting rows of first intermediate matrix according to first permutation, producing second intermediate matrix; deriving second permutation of n objects from binary input; and permuting columns of second intermediate matrix according to second permutation to produce final MDS matrix. Another embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l. The method comprising deriving multiplicative scalar from the key (202); multiplying given matrix with multiplicative scalar to produce first intermediate matrix (204); deriving first permutation of n objects from the key (206); permuting rows of first intermediate matrix according to first permutation to produce second intermediate matrix (208); deriving second permutation of n objects from the key (304); and permuting columns of second intermediate matrix according to second permutation (212) to produce final MDS matrix (214).
Abstract:
Method (200) for securing data storage that assures availability of sealed data utilizing machine readable instructions to perform property based sealing comprising steps of: issuing sealing command to Sealing Manager (SM) (10) to seal data D against at least one predetermined property of machine readable instructions A (202); requesting Sealing Manager to use secret key SK to encrypt binding token BT; verifying integrity of configuration table (CT) (14) (204); determining integrity of configuration table (206); verifying integrity of verification agent (VA) (12) when integrity of configuration table is valid (208); determining integrity of verification agent (210); verifying machine readable instructions for the at least one predetermined property (212); transmitting verification result to Sealing Manager (214); constructing and encrypting binding token using secret key (216); verifying integrity of sealing service (SS) (16) (218); determining integrity of sealing service (220); sealing data D with binding token BT (222), and transmitting sealed data Ds to Administrator A. A method for unsealing and a system are disclosed.