Patent classifications
G09C5/00
System and method for etching internal surfaces of transparent gemstones with information pertaining to a blockchain
In one embodiment, a system including a tangible token comprising a single integrated transparent gemstone produced by fusing together a first transparent gemstone and a second transparent gemstone, a first internal side of the first transparent gemstone is etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, the first internal side of the first transparent gemstone is aligned with a second internal side of the second transparent gemstone, and the aligning encapsulates the information within a perimeter of the second internal side such that the information does not extend beyond the perimeter. The system includes a computing device that executes instructions to: read the information, validate, via a network and the address, the public key and private key are associated with the blockchain, and present an indication of whether or not the information is validated.
SYSTEMS AND METHODS FOR PROVIDING SECURITY FOR QR CODES
Systems and methods for providing additional security for quick response (QR) codes are provided. An additional layer of security for QR codes, a mechanism to record the reputation of the payload in a QR code, and other functionality are provided. A combination of a public blockchain system, public key encryption, and a redirection mechanism can be used.
Custom Image Decoder for Visual, Machine-Readable Representation of Data
Methods and systems for decoding custom, encrypted image data are disclosed herein. An example system includes a server including a set of data corresponding to one or more objects, and a device communicatively coupled with the server. The device may be configured to capture image data featuring a customized image associated with an object of the one or more objects, and decode an encrypted payload associated with the image data. The encrypted payload may be encoded in the image data pursuant to a non-standardized format. The device may also decrypt the encrypted payload, and transmit the decrypted payload to the server to obtain data corresponding to the object.
Method for authenticating an object, particularly a security element, and a security element
A method for authenticating an object, particularly a security element for protecting value documents, ID documents and products, as well as a security element, a security document, a reader, an individualization device and a server for such a method. The method involves the steps: dividing a first code element into at least one first partial code element and one second partial code element, storing the second partial code element, arranging the first partial code element and/or a second code element on and/or in the object, jointly machine-capturing the first partial code element and the second code element by means of a reader, extracting the first partial code element and the second code element from the data captured by the reader, accessing the stored second partial code element using the second code element as a key, checking whether the code element resulting from merging the extracted first partial code element and the stored second partial code element corresponds to the first code element.
HASHING METHODS AND SYSTEMS
A hashing method comprises the steps of converting an input message into a binary input matrix with columns and rows; applying a Fourier Transform (FT) to obtain a multiplication; wherein said FT is an optical FT; and applying a summation across the rows.
Data Security Solution Using Randomized 3-Axis Data Shapes and Tokenized Data Element Placement of Encrypted and Non-Encrypted Data
A method is provided to leverage blockchain based data tokenization to randomly tokenize encrypted and nonencrypted data elements within a data set represented in a 3-dimensional form, wherein the tokens are distributed and reordered into the correct position using a key pair match and Verifiable Self Sovereign Identification (VSSI). The key pair and VSSI credentials must be presented in order to distribute the tokenized data elements into the correct 3-dimensional position within the data set upon verification of the match of the key pair and the prescribed VSSI.
Secure QR code system for distributed large payload transmissions for everyday use
A system for transferring a data file includes a first data device (124) that is configured to: partition the data file (200) into a plurality of sub-units (202); generate a plurality of sequence bits (211) for each sub-unit that indicates a place in the data file (200) that the sub-unit belongs; for each sub-unit, integrate the sequence bits into the sub-unit; and convert each sub-unit into a different sub-unit QR code (221), thereby generating a plurality of sub-unit QR codes (221, 222 . . . 229); and transmit each of the sub-unit QR codes (221, 222 . . . 229). A second data device (130) is configured to: receive each of the sub-unit QR codes (221, 222 . . . 229); convert each of the sub-unit QR codes (221, 222 . . . 229) into corresponding reconstructed sub-units; and assemble the reconstructed sub-units nto a reconstructed data file (110′) in an order indicated by the sequence bits.
VEHICLE BUS MESSAGE AUTHENTICATION USING WATERMARKING
An electronic control unit comprises circuitry to receive a combined signal via a vehicle bus of a vehicle, wherein the combined signal contains a combination of a data signal and a watermark signal, which can be a radio frequency (RF) signal or an analog baseband signal, wherein the data signal includes a message, circuitry to extract a watermark from the watermark signal, circuitry to verify the watermark based on a comparison of the watermark with a pre-defined watermark, circuitry to extract the data signal from the combined signal and obtain the message from the data signal, and circuitry to authenticate the message based on the verification of the watermark.
Information transmission system
An information transmission system includes an encoder, a display, an imaging apparatus, and a decoder. The encoder is mounted on a first aircraft and is configured to encode information to create a secret code. The display is mounted on the first aircraft and is configured to display the secret code created by the encoder at a predetermined position on a surface of a body of the first aircraft. The imaging apparatus is mounted on a second aircraft and is configured to capture an image of the first aircraft. The decoder is mounted on the second aircraft and is configured to detect an image region including the secret code from the image captured by the imaging apparatus, decode the secret code by performing image processing on the detected image region, and read the information.
Cryptographic Signature System and Related Systems and Methods
The disclosed devices, systems, and methods relate to a validation system which can be used to authenticate photos and videos. The system can have various steps including; a user taking a photo or video, sensor data being collected by a processing system, the sensor data being hashed to create a cryptographic signature, and the cryptographic signature being stored. The cryptographic signature can be later compared with the correspond photo or video for purposes of authentication.