H04L9/12

PAYMENT APPARATUS AND METHOD OF CONTROLLING THE SAME
20220351160 · 2022-11-03 ·

Disclosed are a payment apparatus and a method of controlling the same. With this, it is possible to receive payment information based on Table Pay; analyze a payment card image included in the payment information, and divide the payment card image into a first region comprising sensitive data that needs security and a second region comprising general data other than the sensitive data; differently set the plurality of encryption units corresponding to the first region and the second region so that the first region and the second region can be differentially subjected to encryption; and divide the payment card image into a plurality of encryption units, and perform the encryption with regard to the plurality of encryption units independently of each other.

PAYMENT APPARATUS AND METHOD OF CONTROLLING THE SAME
20220351160 · 2022-11-03 ·

Disclosed are a payment apparatus and a method of controlling the same. With this, it is possible to receive payment information based on Table Pay; analyze a payment card image included in the payment information, and divide the payment card image into a first region comprising sensitive data that needs security and a second region comprising general data other than the sensitive data; differently set the plurality of encryption units corresponding to the first region and the second region so that the first region and the second region can be differentially subjected to encryption; and divide the payment card image into a plurality of encryption units, and perform the encryption with regard to the plurality of encryption units independently of each other.

SYSTEM AND METHOD FOR BUILDING A TRUSTED NETWORK OF DEVICES
20230091179 · 2023-03-23 ·

Systems and methods for building a trusted network of devices with intrusion detection system (IDS) using blockchain IoT (BIoT) technology are provided. The method includes registering an IoT device on a plurality of blockchain network channels. The plurality of blockchain network channels include an authentication channel, data channel, remote channel, and security channel connected to corresponding servers to perform dedicated operations such as device authentication, data management, remote operation/access control, and intrusion detection. On successful authentication, the IoT device is allowed to access, store and retrieve data stored on the blockchain. The blockchain ledger is updated after each data transaction and a new wallet identity or encrypted keys for the IoT device are issued after each transaction. The method further includes receiving an operational instruction from a front-end device and authenticating from the blockchain record, the wallet identity, user permissions and validity of operation's parameters based on an organization's policies.

SYSTEM AND METHOD FOR BUILDING A TRUSTED NETWORK OF DEVICES
20230091179 · 2023-03-23 ·

Systems and methods for building a trusted network of devices with intrusion detection system (IDS) using blockchain IoT (BIoT) technology are provided. The method includes registering an IoT device on a plurality of blockchain network channels. The plurality of blockchain network channels include an authentication channel, data channel, remote channel, and security channel connected to corresponding servers to perform dedicated operations such as device authentication, data management, remote operation/access control, and intrusion detection. On successful authentication, the IoT device is allowed to access, store and retrieve data stored on the blockchain. The blockchain ledger is updated after each data transaction and a new wallet identity or encrypted keys for the IoT device are issued after each transaction. The method further includes receiving an operational instruction from a front-end device and authenticating from the blockchain record, the wallet identity, user permissions and validity of operation's parameters based on an organization's policies.

Time Optimized Communications
20220345304 · 2022-10-27 ·

A time optimizing communications system and method is provided because “loose lips sink ships”. Orders get “do by” parameters, “deliver by” times and may be broken into parts according to “do by” parameters, and/or by prioritization for delivery only when the recipient has the need-to-know. Time sensitive and most secret parts are communicated just in time, some data may be sent at randomized times that may bias traffic on communications infrastructure towards bandwidth optimization. Reducing risk of decryption by adversaries occurring quickly enough to frustrate the purposes of orders. Parts may be broken into data blocks and routed and/or stored randomly. An array of pointers records details of their creation and/or storage locations to provide a key for retrieving data blocks and/or reconstructing messages; timing is managed according to mission needs, and priorities. May also reduce peak demand on communications bandwidth.

Time Optimized Communications
20220345304 · 2022-10-27 ·

A time optimizing communications system and method is provided because “loose lips sink ships”. Orders get “do by” parameters, “deliver by” times and may be broken into parts according to “do by” parameters, and/or by prioritization for delivery only when the recipient has the need-to-know. Time sensitive and most secret parts are communicated just in time, some data may be sent at randomized times that may bias traffic on communications infrastructure towards bandwidth optimization. Reducing risk of decryption by adversaries occurring quickly enough to frustrate the purposes of orders. Parts may be broken into data blocks and routed and/or stored randomly. An array of pointers records details of their creation and/or storage locations to provide a key for retrieving data blocks and/or reconstructing messages; timing is managed according to mission needs, and priorities. May also reduce peak demand on communications bandwidth.

System and methods for a private eLoran service

A method for generating private eLoran signals includes receiving, by a transmitter that is configured to transmit a transmission at a fixed time, a transmission key; determining, by the transmitter, a pseudo-random transmission time for transmitting the transmission, where the pseudo-random transmission time is determined using the transmission key; and initiating transmission, by the transmitter, of the transmission at the pseudo-random transmission time. A receiving device includes a processor that is configured to obtain a pseudo-random time for receiving a transmission from a transmitter; receive the transmission at the pseudo-random time; and use the transmission to determine at least one of a time, a longitude, or a latitude at the receiving device.

Technique for protecting a cryptographic key by means of a user password

A technique for protecting a cryptographic key. A user has an identifier and an associated password. The first cryptographic key is designed to decrypt a piece of encrypted data. The user device generates a second cryptographic key by applying a key derivation algorithm to at least the password, then encrypts the first cryptographic key by applying an encryption algorithm parameterized by the second cryptographic key. The user device then provides the encryption of the first cryptographic key to a management device for storage. A response associated with a question is obtained from the user. The user device calculates a result of an application of a function to at least one response associated with a question, then provides a value dependent on the result to a management device for storage. The value then enables the user device to determine the password when it has the response to the corresponding question.

CRYPTOGRAPHIC SYSTEMS AND METHODS FOR MAINTENANCE OF POOLS OF RANDOM NUMBERS
20230082077 · 2023-03-16 ·

Systems and methods include a random number pool where one or more sets of key data elements of the random number pool are transmitted and added or replaced with another set of key data elements.

CONTROL METHOD, RECORDING MEDIUM, AND ANOMALOUS DATA SENSING SYSTEM
20230084009 · 2023-03-16 ·

This control method, etc., are a control method for an anomalous data sensing system including at least a plurality of authentication servers and include: sensing whether data obtained from a device is not anomalous; obtaining first transaction data including information indicating the data; verifying, by a first authentication server included in the plurality of authentication servers, the first transaction data obtained, when the data is sensed as not being anomalous; and recording a block including the first transaction data into a distributed ledger when an agreement about validity of the first transaction data is reached using a consensus algorithm.