G09C5/00

Authenticating electronic content

The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the content and is not merely a copy. The method includes a user requesting content in the form of a web page and/or email from a server using a web browser or email client. The server receives the request, retrieves the content and forwards it to an authentication server. The authentication server inserts into the retrieved content a unique fractal icon and/or information only known between the owner of the content and the user.

DEVICE FOR TRANSFORMING A DATASET WITH A SECRET KEY
20230185927 · 2023-06-15 ·

A device for transforming a dataset with a secret key, wherein a query unit (1) is connected via a bidirectional communication interface (2) to a transformation unit (3), has a memory (4) for the secret key and a processor (5) for transforming the dataset. For reliable and secure execution of digital transactions, the query unit (1) has optical transmitters transmitting in parallel codewords of the dataset translated into two-dimensional codewords to optical receivers of the transformation unit (3), and the transformation unit (3) has optical transmitters transmitting in parallel codewords of the transformed dataset translated into two-dimensional codewords to a plurality of optical receivers of the query unit (1). The transmitters and receivers of a unit are arranged each in a two-dimensional grid and opposite and at a distance from the receivers and transmitters of the other unit.

Method for sequentially synthesising poly(alkoxyamine amide)s, copolymers obtained and uses thereof

Synthesizing poly(alkoxyamine amide)s, which have a monomer chain with at least one thermolabile bond between monomers from an acid monomer of a monohalogenated carboxylic acid X—C(R,R′)—Y—COOH and an amine monomer having a free terminal free-radical nitroxide group >N—O.sup.∘ and a free terminal primary amine —NH.sup.2. The synthesis involves two separate and chemically selective chemical reactions. One reacts the —COOH and —NH.sub.2 groups to obtain an amide bond —NH—CO—Y—C(R, R′)—, and the other reacts the —Y—C(R, R′).sup.∘ free-radical with the nitroxide function >N—O.sup.∘ in order to obtain an alkoxyamine bond —Y—C(R, R′)—O—N<. The chemical reactions are performed in alternating fashion with catalysts and a novel halogenated acid monomer X—C(R,R′)—Y—COOH or a novel free-radical amine monomer having a free terminal group >N—O.sup.∘ and a free terminal primary amine —NH.sub.2, until a complete copolymer chain is obtained. Also the polymers obtained and the uses thereof.

Electronic device having heat radiator and method for controlling the electronic device

An electronic device having a heat radiator and a method for controlling the electronic device are provided. The electronic device includes a frame including at least one optical assembly and a structure configured to receive a portable electronic device including a display, wherein an image is on the display can be seen through the at least one optical assembly when the portable electronic device is in the structure, a wearing member connected to the frame and configured to be worn together with the frame on the head of a user, and a heat radiator configured to remove heat from a space between the display and the optical assembly to outside the electronic device when the portable electronic device is received in the structure and is turned on.

SYSTEM AND METHOD FOR INTERNAL ETCHING SURFACES OF TRANSPARENT MATERIALS WITH INFORMATION PERTAINING TO A BLOCKCHAIN
20220376896 · 2022-11-24 · ·

In one embodiment, a system including a tangible token comprising a single integrated transparent gemstone produced by fusing together a first transparent gemstone and a second transparent gemstone, a first internal side of the first transparent gemstone is etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, the first internal side of the first transparent gemstone is aligned with a second internal side of the second transparent gemstone, and the aligning encapsulates the information within a perimeter of the second internal side such that the information does not extend beyond the perimeter. The system includes a computing device that executes instructions to: read the information, validate, via a network and the address, the public key and private key are associated with the blockchain, and present an indication of whether or not the information is validated.

SIGNATURE GENERATION DEVICE, SIGNATURE VERIFICATION DEVICE, SIGNATURE GENERATION METHOD, AND SIGNATURE VERIFICATION METHOD

A signature generation device includes a data acquirer acquiring a plurality of mutually related pieces of data including first data and a signature generator generating first signature data for the first data and correlation information based on the first data, the correlation information indicating correlation among the plurality of pieces of data, and a signature key. The signature generation device ensures relevance among the plurality of pieces of data.

Authentication of a person using a virtual identity card

A method and system for authenticating a user based on a human-recognizable visual representation of biometric data of the user is captured using the digital camera, wherein a biometric feature descriptor is generated from the captured biometric data of the user, and the feature descriptor, together with a user selected user profile, is transmitted to an inspection server adapted for validating whether the transmitted biometric feature descriptor corresponds to a centrally stored biometric feature descriptor of biometric data of the user. If this is the case, the inspection server transmits an “authentication approved” signal together with user personalization data specified in the selected user profile to the inspection terminal.

Electronic device for obfuscating and decoding data and method for controlling same

Disclosed are an electronic device for obfuscating user data and a server for decoding the same. A method for controlling an electronic device according to the present disclosure comprises the steps of: acquiring a security parameter according to data transmitted to an external server; applying an obfuscation algorithm to the data by using the security parameter; and transmitting the data, to which the obfuscation algorithm has been applied, to the external server. Furthermore, in connection with a method for controlling a system comprising an electronic device for obfuscating data and a server for decoding the same according to the present disclosure, a method for controlling the electronic device comprises the steps of: inserting a fingerprint into data; generating multiple pieces of split data having a preset first size on the basis of the data into which the fingerprint has been inserted; applying an obfuscation algorithm to one piece of split data selected from the multiple pieces of split data by using a preset security parameter; and transmitting the split data, to which the obfuscation algorithm has been applied, to the server. In addition, a method for controlling the server comprises the steps of: receiving the multiple pieces of split data, to which the obfuscation algorithm has been applied, from the electronic device; acquiring at least one piece of candidate data on the basis of the received multiple pieces of split data, to which the obfuscation algorithm has been applied; and acquiring data comprising the fingerprint among the at least one piece of candidate data.

Content encryption and in-place decryption using visually encoded ciphertext
11676515 · 2023-06-13 ·

Systems and methods are provided for encrypting and decrypting data using visually encoded ciphertext. The method includes selecting, using a graphical user interface coupled to an electronic device, one or more portions of a document to be encrypted, visually encoding the selected one or more portions of the document, generating a visual representation, wherein the visual representation corresponds to encrypted content, and replacing the selected one or more portions of the document with the visual representation. The method further includes displaying, to the user, the visual representation, capturing the visual representation using one or more cameras, decoding the visual representation, obtaining the encrypted content, and decrypting the encrypted content, generating decrypted content.

Content encryption and in-place decryption using visually encoded ciphertext
11676515 · 2023-06-13 ·

Systems and methods are provided for encrypting and decrypting data using visually encoded ciphertext. The method includes selecting, using a graphical user interface coupled to an electronic device, one or more portions of a document to be encrypted, visually encoding the selected one or more portions of the document, generating a visual representation, wherein the visual representation corresponds to encrypted content, and replacing the selected one or more portions of the document with the visual representation. The method further includes displaying, to the user, the visual representation, capturing the visual representation using one or more cameras, decoding the visual representation, obtaining the encrypted content, and decrypting the encrypted content, generating decrypted content.