Patent classifications
H04L9/06
METHODS AND ARRANGEMENTS FOR ENCRYPTION OF GROUP ADDRESSED MANAGEMENT FRAMES
Logic for encryption and decryption of group addressed management. Logic to generate a management frame comprising a robust security network (RSN) element (RSNE), the management frame comprising a cipher suite field with a cipher suite used together with a set of one or more keys to encrypt the group addressed management frames. Logic to cause transmission of the management frame to one or more stations (STAs). Logic to receive a management frame comprising a robust security network (RSN) element (RSNE), the management frame comprising a cipher suite field with a cipher suite used together with a set of one or more keys to encrypt the group addressed management frames. And logic to decode the management frame to determine the cipher suite used together with the set of one or more keys for encryption of group addressed management frames.
METHOD FOR DETERMINING A CRYPTOGRAPHIC KEY, COMPUTER PROGRAM, AND DATA PROCESSING SYSTEM
A method for determining a cryptographic key is carried out in a data processing system, and comprises: providing a plaintext and a ciphertext determined from the plaintext using a cryptographic key and a cryptographic procedure which comprises cryptographic operations; for each cryptographic operation of the cryptographic procedure, providing at least one intermediate relation which comprises an intermediate equation and/or an intermediate inequality; determining an optimization problem comprising: the plaintext and the ciphertext; at least one optimization expression assigned to a round of the cryptographic procedure; and optimization variables comprising state variables of the cryptographic procedure and a cryptographic key variable; wherein the at least one optimization expression is determined from the at least one intermediate relation and comprises at least one preceding state variable assigned to a preceding round. The method further comprises: solving the optimization problem and determining the cryptographic key from an optimizing value of the cryptographic key variable.
DECENTRALIZED IDENTITY WITH USER BIOMETRICS
Systems, methods, and other embodiments for decentralized identity with user biometrics are presented herein. In one embodiment, a method includes, in response to a request to access resources of a cloud service provider by a computing device, transmitting a request for a biometric private key to a mobile device associated with a user; in response to receiving the biometric private key, submitting the biometric private key for validation against a blockchain associated with the user and the mobile device; adding a record of the results of the validation to the blockchain; and controlling access to the resources of the cloud service provider based on the record in the blockchain by (i) denying access where the record indicates that validation has failed (ii) granting access where the record indicates that validation has succeeded.
Generating Account Numbers Using Biometric Information Obtained Via a Generic Transaction Card
Methods and systems disclosed herein describe a generic transaction card that generates an account number based on a biometric identifier of a user. Multiple users may use the generic transaction card to transact. For example, a first user may provide a first biometric identifier to the generic transaction card, which may generate a first account number associated with the first user. The first user may then use the generic transaction card to transact. Similarly, a second user may provide a second biometric identifier to the same generic transaction card, which may generate a second account number associated with the second user. The second user may then use the same generic transaction card to make purchases charged to the second user's account.
Method, device and computer program product for information processing
According to embodiments of the present disclosure, a method, device and computer program product for information processing are proposed. The method comprises: obtaining identification information of a shard of metadata at a first node of a blockchain-based metadata management system; determining, based on similarities of the identification information of the shard and identification information of candidate nodes of the metadata management system, a second node for positioning the shard from the candidate nodes; and enabling the second node to process the identification information of the shard, to manage storage of the shard in the metadata management system. Therefore, the present solution can improve efficiency, security and robustness of the metadata management system.
Systems and methods for gated offer eligibility verification
Systems and methods for determining consumer eligibility for a gated offer using verification data from a verification source, while reducing exposure of the verification data, are herein disclosed. In one example, a method for a verification source comprises, generating a seed hash from a pre-determined data specification, aggregating verification data based on one or more data fields indicated by the data specification to produce aggregated verification data, hashing the aggregated verification data using the seed hash to produce hashed verification data, receiving hashed customer data from a verification platform, receiving a comparison request from the verification platform, comparing the hashed customer data with the hashed verification data; and returning a result to the verification platform indicating if the hashed customer data matches the verification data.
Systems and methods for facilitating generation of a carbon offset based on processing of a recyclable item
Disclosed herein is a method for facilitating generation of a carbon offset based on processing of a recyclable item. Accordingly, the method may include receiving, using a communication device, transportation data associated with transportation of at least one recyclable item from at least one first device. Further, the method may include analyzing, using a processing device, the transportation data. Further, the method may include determining, using the processing device, a carbon value associated with the transportation of the at least one recyclable item based on the analyzing. Further, the method may include generating, using the processing device, a net CO.sub.2e offset associated with the at least one recyclable item based on the carbon value. Further, the method may include storing, using a storage device, the net CO.sub.2e offset associated with the at least one recyclable item in a distributed ledger.
Integrated circuit performing fast unbreakable cipher
An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.
SYSTEM AND METHOD FOR CONDUCTING AND SECURING TRANSACTIONS WHEN BLOCKCHAIN CONNECTION IS UNRELIABLE
A system for transacting in an environment with intermittent connectivity via a network backbone to a blockchain. A merchant device transmits a set of credentials for an ad hoc network to a buyer device and establishes a private peer-to-peer ad hoc network connection with the buyer device. It then conducts a transaction with the buyer device via the private peer-to-peer ad hoc network. If no network connection is available to a transaction blockchain, the merchant device stores a record of the transaction until such network becomes available and later sends the record of the transaction to the transaction blockchain.
CONFIDENTIAL ASSET TRANSACTION SYSTEM
A system is provided for controlling privacy in an exchange of an asset. The system receives an offer query of an offeror that includes an offeror reveal condition, an asset identifier of the asset, and offeror terms of exchange. The system accesses an offeree reveal condition and offeree terms of exchange for the asset. The system determines whether the offeror reveal condition and the offeree reveal condition are satisfied and determines whether the offeror terms of exchange and the offeree terms of exchange are satisfied. When the offeror reveal condition, the offeree reveal condition, the offeror terms of exchange, and the offeree terms of exchange are satisfied, the system reveals the offeror to the offeree and the offeree to the offeror.