Patent classifications
H04L9/12
Secure communication between a contact lens and an accessory device
Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.
Secure communication between a contact lens and an accessory device
Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.
SYSTEM AND METHOD FOR SECURED FREE SPACE OPTICAL TRANSMISSION IN THE MID-INFRARED DOMAIN
A free-space optical communication system includes a transmitter and a receiver, the transmitter being configured to transmit an encrypted message to the receiver at the mid-infrared domain, the transmitter comprising a master mid-infrared optical source configured to generate a mid-infrared signal and a chaos generator configured to generate a chaotic signal by applying external optical feedback to the master mid-infrared optical source, the transmitter being configured to determine an encrypted message from an original message by applying a message encryption technique to the original message and to send the encrypted message to the receiver through an optical isolator, the receiver comprising a slave mid-infrared optical source similar to the master mid-infrared optical source the slave mid-infrared optical source being configured to recover the chaotic signal from the encrypted message by applying chaos synchronization, the receiver further comprising a first detector configured to detect the encrypted message, a second detector configured to detect the chaotic signal, and a message recovery unit configured to recover the original message from the encrypted message detected by the first detector and the chaotic signal detected by the second detector.
SYSTEM AND METHOD FOR SECURED FREE SPACE OPTICAL TRANSMISSION IN THE MID-INFRARED DOMAIN
A free-space optical communication system includes a transmitter and a receiver, the transmitter being configured to transmit an encrypted message to the receiver at the mid-infrared domain, the transmitter comprising a master mid-infrared optical source configured to generate a mid-infrared signal and a chaos generator configured to generate a chaotic signal by applying external optical feedback to the master mid-infrared optical source, the transmitter being configured to determine an encrypted message from an original message by applying a message encryption technique to the original message and to send the encrypted message to the receiver through an optical isolator, the receiver comprising a slave mid-infrared optical source similar to the master mid-infrared optical source the slave mid-infrared optical source being configured to recover the chaotic signal from the encrypted message by applying chaos synchronization, the receiver further comprising a first detector configured to detect the encrypted message, a second detector configured to detect the chaotic signal, and a message recovery unit configured to recover the original message from the encrypted message detected by the first detector and the chaotic signal detected by the second detector.
Methods and systems for a synchronized distributed data structure for federated machine learning
A system for an artificial intelligence synchronized distributed ledger. The system includes a computing device containing a receiving module, the receiving module designed and configured to receive an input from a remote device, parse the input to identify protected and non-protected data contained within the input, transform the protected data into a digitally signed assertion and convert the non-protected into an encrypted datastore. The computing device containing a processing module, the processing module designed and configured to receive the digitally signed assertion from the receiving module, insert the digitally signed assertion into an immutable sequential data structure, receive the encrypted datastore, retrieve at least an input, generate a record utilizing the at least a retrieved input, and perform a first machine-learning process utilizing the at least a retrieved input.
Method and apparatus for third-party managed data transference and corroboration via tokenization
A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database. By one approach, network elements provisioned with tokens jointly manage the protocol.
Encryption key management system and encryption key management method
A storage apparatus sends a request for a key encryption key to a key management server using a storage apparatus ID as a parameter, acquires the key encryption key, for which a request has been sent to the key management server, and its attribute information, and stores the key encryption key and its attribute information in a key encryption key list while eliminating the key encryption key that is duplicated. Then, in the order listed in the key encryption key list, decryption of the encryption key is attempted by the key encryption key stored in the key encryption key list, and the success or failure of the decryption of the encryption key is determined. When the decryption of the encryption key using the key encryption key fails, the decryption of the encryption key is attempted using a key encryption key, which has not been attempted yet, in the key encryption key list.
Methods and systems for secure cross-platform token exchange
Systems and methods are disclosed for cross-platform token exchange. One method comprises receiving a primary token exchange request from an upstream entity, generating an ancillary detokenization request based on the primary token exchange request, and transmitting the ancillary detokenization request to an input token vault. An ancillary detokenization response comprising sensitive data may then be received from the input token vault, and one or more ancillary tokenization requests may be generated based on the ancillary detokenization response and the primary token exchange request. The one or more ancillary tokenization requests may be transmitted to one or more output token vaults. Subsequently, one or more ancillary tokenization responses may be received from the one or more output token vaults, each ancillary tokenization response comprising an output token. A primary token exchange response may be generated based on the one or more ancillary tokenization responses and transmitted to the upstream entity.
Methods and apparatus for lawful interception of communications
Lawful intercept is supported by providing a network communications device target identifiers in encrypted form. Received encrypted target identifiers are stored in a non-volatile storage device. Before communications interception occurs, one or more encrypted target identifiers are loaded into active memory which is secure and not accessible by a network device operating system administrator. A decryption request is sent to a security device and the result loaded into the secure active memory. Plain text target identifier(s) returned by the security device are loaded directly into the active memory without being stored in the operating system administrator accessible storage device. In the case of a reset resulting in the contents of the active memory being lost, the active memory is repopulated by sending decryption requests using the stored encrypted target identifiers to indicate to the security device the target identifiers which need to be decrypted and reloaded into active memory.
System and method for remote monitoring of released individual
A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.