Patent classifications
G09C5/00
Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
A method of and system for generating secure tokens and transmission based on (TRNG) generated tokens split into shares includes steps of: generating keys by a hardware based True Random number Generator (TRNG); sieving/filtering the generated keys using statistical tests suite; selecting the random numbers of required width as tokens; applying number to image transformation for the tokens; applying steganography methods of injecting into an image carrier to the selected tokens; and splitting the steganographic contents into at least two shares using Share Generation Appliance (SGA), which is based on visual cryptographic methods. The generated secure tokens are well suited for seamless secured shopping including product verification.
Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
A method of and system for generating secure tokens and transmission based on (TRNG) generated tokens split into shares includes steps of: generating keys by a hardware based True Random number Generator (TRNG); sieving/filtering the generated keys using statistical tests suite; selecting the random numbers of required width as tokens; applying number to image transformation for the tokens; applying steganography methods of injecting into an image carrier to the selected tokens; and splitting the steganographic contents into at least two shares using Share Generation Appliance (SGA), which is based on visual cryptographic methods. The generated secure tokens are well suited for seamless secured shopping including product verification.
Methods and Apparatus for Cryptography
Encryption systems for initiating, encrypting, decrypting, storing and transporting undetectable secure electronic data communications over public and private networks, including the Internet or the like.
Methods and Apparatus for Cryptography
Encryption systems for initiating, encrypting, decrypting, storing and transporting undetectable secure electronic data communications over public and private networks, including the Internet or the like.
SIGNATURE APPARATUS, SIGNATURE METHOD, VERIFICATION APPARATUS, VERIFICATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
A first signature key that is a signature key assigned to a user is used to generate, as first signature data, signature data of an input image. A second signature key that is a signature key assigned to the signature apparatus is used to generate, as second signature data, signature data of data that includes the input image and the first signature data. Coupled data that includes the first signature data, the second signature data, and the input image is outputted.
Customer-centric Workflow for Initial On-boarding of an Openflow Enabled Switch
Authenticating a networking appliance attempting to attach to a network includes receiving at least one value associated with an identity of the networking appliance; receiving a certificate signing request (CSR) from the networking appliance, wherein the CSR comprises credential data associated with the identity of the networking appliance; and generating an appliance certificate based on the credential data and a certificate authority (CA) certificate associated with the computer. The method also includes returning the appliance certificate to the networking appliance; receiving a request from the networking appliance to attach to the network; and authenticating the identity of the networking appliance based on both a) the at least one value associated with the identity of the networking appliance; and b) the appliance certificate.
Authentication via camera
Systems and methods for authentication via camera are provided. In example embodiments, an authentication server transmits, to a mobile device, an identity verification image. The authentication server receives, from a computing device, a scanned image, wherein the computing device is different from the mobile device. The authentication server determines whether the scanned image includes data from the identity verification image. The authentication server transits, to a web server accessed by the computing device, an indication that a user's identity has been verified upon determining that the scanned image includes the data from the identity verification image.
Authentication via camera
Systems and methods for authentication via camera are provided. In example embodiments, an authentication server transmits, to a mobile device, an identity verification image. The authentication server receives, from a computing device, a scanned image, wherein the computing device is different from the mobile device. The authentication server determines whether the scanned image includes data from the identity verification image. The authentication server transits, to a web server accessed by the computing device, an indication that a user's identity has been verified upon determining that the scanned image includes the data from the identity verification image.
Cryptic notes and related methods
A computer-implemented method is described. A first portion and a second portion of a message are received from a user via a user interface of a computer device. Each portion includes one or more letters. The first portion includes initials of a person. The method includes generating a virtual cryptic note. The virtual cryptic note includes the first portion arranged in a first orientation, and the second portion arranged in a second orientation that is rotated relative to the first orientation with the one or more letters of the second portion overlapping the initials of the first portion. The virtual cryptic note can be modified by changing an order of the first portion relative to the second portion or changing the orientation of at least one of the first portion and the second portion. The first portion and the second portion can be encrypted.
Cryptic notes and related methods
A computer-implemented method is described. A first portion and a second portion of a message are received from a user via a user interface of a computer device. Each portion includes one or more letters. The first portion includes initials of a person. The method includes generating a virtual cryptic note. The virtual cryptic note includes the first portion arranged in a first orientation, and the second portion arranged in a second orientation that is rotated relative to the first orientation with the one or more letters of the second portion overlapping the initials of the first portion. The virtual cryptic note can be modified by changing an order of the first portion relative to the second portion or changing the orientation of at least one of the first portion and the second portion. The first portion and the second portion can be encrypted.