H04L9/38

PRINTED MARKING FOR AN AUTHENTICATION METHOD, AND METHOD OF PRINTING AND OF AUTHENTICATING A PRINTED MARKING

A method of printing and of authenticating a marking, having a visible printed anti-copy pattern produced by pseudorandom noise that is generated on the basis of a secret generation key, includes processing at least one image of the printed anti-copy pattern. The anti-copy pattern is printed onto a marking substrate using predetermined printing conditions. The phase of marking control involves: regenerating the pseudorandom noise on the basis of the secret generation key; creating, computationally, a digital file of an image of a simulated printed anti-copy pattern which corresponding to a projected printing quality of the regenerated pseudorandom noise; capturing at least one image of the printed anti-copy pattern; and comparing the captured image of the printed anti-copy pattern with the image of the simulated anti-copy pattern in order to determine, computationally, a mathematical distance between the image of the printed anti-copy pattern and the image of the simulated anti-copy pattern.

PRINTED MARKING FOR AN AUTHENTICATION METHOD, AND METHOD OF PRINTING AND OF AUTHENTICATING A PRINTED MARKING

A method of printing and of authenticating a marking, having a visible printed anti-copy pattern produced by pseudorandom noise that is generated on the basis of a secret generation key, includes processing at least one image of the printed anti-copy pattern. The anti-copy pattern is printed onto a marking substrate using predetermined printing conditions. The phase of marking control involves: regenerating the pseudorandom noise on the basis of the secret generation key; creating, computationally, a digital file of an image of a simulated printed anti-copy pattern which corresponding to a projected printing quality of the regenerated pseudorandom noise; capturing at least one image of the printed anti-copy pattern; and comparing the captured image of the printed anti-copy pattern with the image of the simulated anti-copy pattern in order to determine, computationally, a mathematical distance between the image of the printed anti-copy pattern and the image of the simulated anti-copy pattern.

COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS

“COVERS OR COMPONENTS FOR CELL PHONES OR OTHER DIGITAL DEVICES FEATURING PHYSICAL CRYPTOGRAPHY TO FORWARD AND RECEIVE ENCRYPTED MESSAGES ON A TAMPER-PROOF BASIS”, more precisely, the present utility model addresses the use of physical cryptography for sending and receiving messages via cell phones or other digital devices (1), which allows messaging between two or more users, in a completely secure manner, without the possibility of message tampering or reading by third parties, since the decoding of the forwarded message takes place by overlaying (30) on the cell phone device or digital device (1) a key image cover (20) matching the forwarded matrix image (10).

Roller-shaped electronic stamp

A roller-shaped electronic stamp comprising a plurality of protrusions arranged on a surface of a cylindrical rotational body that rotates around a shaft, wherein a pattern of contact points provided by the plurality of protrusions represents data, and wherein the data is transmitted to an electronic terminal by rolling the surface of the cylindrical rotational body on a touchscreen of the electronic terminal.

Roller-shaped electronic stamp

A roller-shaped electronic stamp comprising a plurality of protrusions arranged on a surface of a cylindrical rotational body that rotates around a shaft, wherein a pattern of contact points provided by the plurality of protrusions represents data, and wherein the data is transmitted to an electronic terminal by rolling the surface of the cylindrical rotational body on a touchscreen of the electronic terminal.

COMPUTER NETWORK SYSTEMS FOR CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED OPERATIONS AND METHODS OF USE THEREOF

Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.

SECURING AUTHENTICATION FLOWS USING A DECENTRALIZED IDENTIFIER

A digital wallet generates an identification value associated with a DID of a DID owner. The digital wallet generates a first request including the identification value for an authentication token from an identification provider. The first request is provided to the identification provider. The digital wallet receives, in response to the identification provider validating the first request, the authentication token that authenticates the digital wallet with a verifiable claim issuer including the identification value from the identification provider. The digital wallet generates a second request for one or more verifiable claims from the verifiable claim issuer. The second request includes the DID and authentication token including the identification value. In response to the verifiable claim issuer validating the authentication token and the identification value, one or more verifiable claims from the verifiable claim issuer are received by the digital wallet.

PATIENT SPECIFIED HEALTH RECORD ON BLOCKCHAIN
20230317224 · 2023-10-05 ·

Embodiments herein use a blockchain to store encrypted patient data. The blockchain may be distributed amongst multiple different healthcare providers and use a shared data format standard. By placing the patient data on a blockchain which is accessible by multiple healthcare providers, the data is more readily transferrable. The patient can maintain a EHR wallet that stores cryptography elements for decrypting that patient's data on the blockchain. For example, when the patient wants her data to be readable by a healthcare provider that did not put the data on the blockchain, the patient can transfer the corresponding cryptography element (e.g., a private key) from her wallet to the new healthcare provider who can then use the cryptography element to decrypt the patient's data that was put on the blockchain by a different healthcare provider.

Composite code pattern, generating device, reading device, method, and program
11755867 · 2023-09-12 ·

For one-dimensional or two-dimensional images in which cells identified as bright-colored cells and cells identified as dark-colored cells are arranged in a matrix, the amount of information is further increased while the difficulty in reading information expressions are reduced. For this purpose, invented is a composite code comprising a first code, in which a plurality of cells each having a predetermined area are orderly arranged, and in which data is defined by each of the predetermined areas having one of two or more colors that can be distinguished from each other, and a second code in which special cells having an area other than the predetermined area form at least a part of the plurality of cells, and in which data is defined by distinguishable marks arranged at predetermined positions in the area other than the predetermined area.

Fluid meter communicating with an electromechanical valve

A fluid meter includes communication means arranged to receive an external opening or closing command to open or close an electromechanical valve suitable for being included in a cut-off unit mounted in the proximity of the fluid meter, authentication means arranged to authenticate a control frame including the opening or closing command, and a first communication interface arranged to transmit both the control frame and electrical energy to a second communication interface of the cut-off unit via a wireless link. The electrical energy is suitable for electrically powering the second communication interface of the cut-off unit.