H04L9/10

INFORMATION INTEGRITY IN BLOCKCHAIN AND RELATED TECHNOLOGIES
20200106605 · 2020-04-02 ·

Described are techniques for securing a most recent block in a data structure such as a blockchain. Techniques include configuring a data processing node that is deployable to a physical location, with a module that generates a verification signing key (VSK) pair, the VSK pair including a private VSK key that is known only to the data processing node, and a public VSK key, receiving by the data processing node, an indication of the deployment to the physical location, generating in response to the indication, by the data processing node the verification signing key (VSK) pair, and transmitting from the data processing node the public VSK key to one or more electronic devices. These techniques assure to a high degree that the generated private key remains unknown and thus can be used to secure the most recent block that is added to a data structure such as a blockchain.

Workforce sentiment monitoring and detection systems and methods
11880797 · 2024-01-23 · ·

Exemplary implementations may provide a workforce sentiment and structure descriptions. A survey management tool can solicit and retrieve ratings data from employees via a survey. The received ratings can be aggregated and scaled according to employee ratings to identify and adjust for the impact of influential employees. An organizational chart may be updated based on the survey results and users may navigate the updated organizational chart to review employee ratings.

Analysis system, analysis method, and storage medium

Provided is an analysis system including a memory acquisition unit that is configured to acquire at least part of data stored in a memory unit in an information communication apparatus including a computing unit and the memory unit; a communication processing unit that is configured to instruct the memory acquisition unit to acquire data stored in the memory unit when determining that key data including an encryption key for cryptographic communication protocol are stored in the memory unit; and a cryptanalysis unit that is configured to extract one or more key data candidates that are candidates of the key data, from the stored in the memory unit, and extract, from one or more of the key data candidates, correct key data that enables to decrypt correctly the encrypted communication data. The communication processing unit is further configured to execute specific processing according to the decrypted communication data.

INFORMATION CONTROL PROGRAM, INFORMATION CONTROL SYSTEM, AND INFORMATION CONTROL METHOD
20190392167 · 2019-12-26 · ·

Provided are an information control program, an information control system, and an information control method which are capable of using an application program previously used without modification and improving a security counter-measure when a data file is browsed and edited in a terminal of a user without installing a new security counter-measure program. An information control program 2 has a function of adding a predetermined modification to transmitted/received information 50, which is transmitted and received between an OS 4 and an application 3 which is capable of generating a data file 51 and saving the data file 51 to an arbitrary information storage area as a storage destination. A save restriction function of restricting saving of the file 51 not encrypted using a predetermined encryption key 8, a storage destination restriction function of restricting an area other than a predetermined area 20 from being designated as the storage destination of the file 51, and a decrypting function of decrypting the file 51 stored in the predetermined area 20 using the predetermined encryption key 8 are provided.

CONTROL DEVICE
20190370455 · 2019-12-05 ·

A control device in a vehicle: determines whether the control device is detached from the vehicle; communicates with other control devices mounted in the vehicle; stores an encryption key; performs a calculation process necessary for communication; and prohibits execution of the calculation process using the encryption key when determining that the control device is detached from the vehicle.

REMOTE ISSUANCE SYSTEM AND DATA GENERATION SERVER

According to an embodiment, a remote issuance system includes a portable electronic apparatus and a data generation server. The portable electronic apparatus includes a biometric sensor, a memory, a communication interface, and a first processor. The first processor generates authentication data for performing an issuance process in the portable electronic apparatus in a case where biometric authentication succeeds, outputs the authentication data to the reader/writer, and executes the issuance process based on issuance data supplied from the reader/writer. The data generation server includes a communication unit and a second processor. The second processor generates issuance data for causing the portable electronic apparatus to execute an issuance process based on application data corresponding to the contract ID and the authentication data to transmit the generated issuance data to the user terminal.

Electrically Self-Powered Surgical Instrument with Cryptographic Identification of Interchangeable Part

A method for operating a surgical instrument, which comprises providing a surgical instrument handle, electrically connecting a controller disposed within the surgical instrument handle to a communication connection of a receiving portion of the surgical instrument, removably securing an interchangeable part at the receiving portion, the interchangeable part having an encryption device electrically connected to the communication connection when the interchangeable part is at the receiving portion, authenticating the interchangeable part upon an exchange between the controller and the encryption device, and after at least a partial use of the interchangeable part, storing within the encryption device a used status of the interchangeable part.

Electrically Self-Powered Surgical Instrument with Cryptographic Identification of Interchangeable Part

A method for operating a surgical instrument, which comprises providing a surgical instrument handle, electrically connecting a controller disposed within the surgical instrument handle to a communication connection of a receiving portion of the surgical instrument, removably securing an interchangeable part at the receiving portion, the interchangeable part having an encryption device electrically connected to the communication connection when the interchangeable part is at the receiving portion, authenticating the interchangeable part upon an exchange between the controller and the encryption device, and after at least a partial use of the interchangeable part, storing within the encryption device a used status of the interchangeable part.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20190303915 · 2019-10-03 ·

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20190303915 · 2019-10-03 ·

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.