G09C5/00

TIME-DOMAIN PHYSICAL UNCLONABLE KEY (TPUK) AUTHENTICATED COMMUNICATION
20230089344 · 2023-03-23 · ·

A method for a PUK authenticated communication includes creating an optical challenge in a time-frequency domain, providing the optical challenge to a tPUK which includes a spatial input channel and a plurality of spatial output channels, and detecting in which of the plurality of spatial output channels a short temporally focused pulse is created. The tPUK provides a complex challenge-response behavior in the time-frequency domain. The optical challenge is created so that the tPUK creates the response having a short temporally focused pulse in only one of the plurality of spatial output channels of the tPUK.

Scrambler Apparatus And Method In Particular For Cryptographic Applications, And Descrambler Apparatus And Method Therefor

The invention is a scrambler apparatus for scrambling a character block, in particular for cryptographic applications, which apparatus comprises a scrambler module (210) adapted for transforming a first character block (220a) consisting of first character components (225a) to a scrambled second character block (220b) consisting of second character components (225b), configured with a scrambler automaton (250), and each second character component (225b) is determined based on a first character component (225a) of the first character block (220a) having the position corresponding to the position of the given second character component (225b), at least one character component (225a, 225b) from the available character components (225a, 225b) of the first character block (220a) and the second character block (220b), and a single input signal character component (225c) of the input signal character block (220c). The invention is, furthermore, a scrambling method, a descrambler apparatus and a descrambling method.

IMAGE ENCRYPTION METHOD BASED ON IMPROVED CLASS BOOSTING SCHEME

The present invention discloses an image encryption method based on an improved class boosting scheme, which comprises the following steps: acquiring parameters of a hyperchaotic system according to plaintext image information: generating weights required by class perceptron networks through the plain text image information: bringing the parameters into the hyperchaotic system to obtain chaotic sequences, and shuffling the chaotic sequences by a shuffling algorithm: pre-processing the chaotic sequences after shuffling to obtain a sequence required by encryption: and bringing a plaintext image and the sequence into an improved class boosting scheme to obtain a ciphertext image, wherein the improved class boosting scheme is realized based on the class perception networks. The method solves the problems that update and prediction functions in an original boosting network are too simple and easy to predict or the like, so as to obtain the ciphertext image with higher information entropy.

PROCESSING USING MACHINE READABLE CODES AND SECURE REMOTE INTERACTIONS

A method is disclosed. The method includes receiving, by an application on a communication device from an access device, a unique identifier associated with a resource provider in a transaction. The method also includes transmitting, by the application, a message comprising the unique identifier and an access data reference identifier associated with access data to a remote server computer associated with the application. The remote server computer searches a database for access data using the access data reference identifier, retrieves the access data, and provides the access data to a transport computer which processes the transaction using the access data.

VARIABLE PATTERN SHIELD PROTECTION SYSTEM FOR A TAMPER-EVIDENT CONTAINER
20220335861 · 2022-10-20 ·

The disclosed embodiments provide a method for tamper-evident shipment or storage of goods. An Electrical Shield pattern is embedded in or printed on a substrate with other electrical, optical, and electronic components, communication components, semiconductors, which are attached or printed on a substrate to form a shipment bag used as a shipping container. The shield pattern can be made variable between different bags by using algorithms entered into a printer control system. The shipment bag with its components can then be assigned a unique signature which differentiates each bag. Application of encryption methods serves to guarantee the shipped goods are authentic and that were not tampered with during shipment. Digital signal processing is used to generate pedigree information, which may include items such as shipping location, serial numbers, sensor information, and lot numbers for the goods. The information related to the history of tampering attempts and other sensor status can be placed in encrypted form in an RFID tags or control or monitoring electronics which can be read by a mobile phone application or sent to a remote cloud-based server.

MULTIPLEXED QUICK RESPONSE ("QR") CODE EXPERIENCE DERIVATION

An optical code scanner being operated using an algorithm is provided. The scanner may scan an optical label. The label may include machine-readable code. The scanner may derive a single set of instructions from the code or multiple sets of instructions from the code. The scanner may process the code. The processing may upload a set of instructions from the code to the scanner and store the set of instructions in an instructions library. The scanner may also derive a picture associated with the instructions and store the picture in the library. The scanner may display a plurality of pictures. Each of the pictures may correspond to a set of uploaded instructions stored on the scanner. Each of the plurality of pictures may be selectable by a user. In response to a user selection of a picture, the scanner may be configured to execute the uploaded instructions that correspond to the selected picture.

COMMUNICATION APPARATUS, METHOD FOR CONTROLLING COMMUNICATION APPARATUS, AND STORAGE MEDIUM
20230069912 · 2023-03-09 ·

A communication apparatus includes a generation unit configured to generate a new pair of a public key and a secret key paired with the public key in a case where a predetermined condition is satisfied, a provision unit configured to externally provide information including at least the public key generated by the generation unit, a first reception unit configured to receive, from an external apparatus after the information is provided by the provision unit, an authentication request including information generated using at least the public key, a transmission unit configured to transmit, to the external apparatus, an authentication response as a response to the authentication request in a case where the authentication request is received, and a second reception unit configured to receive, from the external apparatus after the authentication response is transmitted to the external apparatus, configuration information including a communication parameter.

SYSTEM AND METHOD FOR INTERNAL ETCHING SURFACES OFTRANSPARENT MATERIALS WITH INFORMATION PERTAINING TO ABLOCKCHAIN
20230128931 · 2023-04-27 · ·

In one embodiment, a system including a tangible token comprising a single integrated transparent gemstone produced by fusing together a first transparent gemstone and a second transparent gemstone, a first internal side of the first transparent gemstone is etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, the first internal side of the first transparent gemstone is aligned with a second internal side of the second transparent gemstone, and the aligning encapsulates the information within a perimeter of the second internal side such that the information does not extend beyond the perimeter. The system includes a computing device that executes instructions to: read the information, validate, via a network and the address, the public key and private key are associated with the blockchain, and present an indication of whether or not the information is validated.

SECURITY FOR USB-BASED DEVICE CONFIGURATION

A universal serial bus device, including: a main body; a connection portion attached to the main body; a processor; a storage portion storing a hash function executable by the processor, the hash function producing a hash value; a non-changing visual code on the main body, the visual code being readable by an optical scanner and corresponding to the hash function; and an electronic display configured to display the hash value.

Solid-state imaging device, method for driving solid-state imaging device, and electronic apparatus

A solid-state imaging device includes a pixel part, a reading part for reading a pixel signal from the pixel part and a response data generating part including a fuzzy extractor. The response data generating part generates response data including a unique key in association with at least one selected from among variation information of pixels and variation information of the reading part. The response data generating part generates, when regenerating a key, a unique key using helper data acquired in generation of an initial key, variation information acquired in the regeneration of the key, and reliability information determined based on the variation information acquired in the regeneration of the key.