H04L9/38

SECURE ENGINE COMMUNICATION

A method of communication, within a processing system of a gas turbine engine, between a first electronic component and a second electronic component, comprising: generating by the first electronic component, a request, comprising a digital certificate, intern comprising a first host public key and a first client public key, signed with a first host private key, to initiate a trusted communication session with a second electronic component; encrypting at the first electronic component, at least a portion of the request with a first client private key; transmitting the request to the second electronic component; the first host private key and the first host public key defining a first asymmetric keypair and the first client private key and the first client public key defining a second asymmetric keypair.

APPARATUS AND METHODS FOR AUTHENTICATING CYBER SECURE CONTROL SYSTEM CONFIGURATIONS USING DISTRIBUTED LEDGERS

Control systems and methods for securely authenticating and validating a control system. The control system may include a plurality of dependent control nodes and master control nodes. Each dependent control node is communicatively coupled to one or more peripheral devices. Each control node maintains a unit level distributed ledger, where each unit level distributed ledger includes information from corresponding peripheral devices. Each control node may transmit a portion of the unit level distributed ledger to a master control node. Each master control node may maintain a system level distributed ledger that includes information from the corresponding unit level distributed ledgers. Each master node may transmit a portion of the system level distributed ledger to a central node that maintains a separate secure distributed ledger. The master node may authenticate the control system based on the received portion of the system level distributed ledgers and the secure distributed ledgers.

METHOD AND PROCESS FOR BLOCKCHAIN IMPLEMENTATION WITH THIRD PARTY DEVICES

A method for controlling an engine having a control module and smart nodes. The method includes maintaining a block chain ledger, which includes an information block from at least a preceding engine start, may be at the control module of the aircraft engine. The method also includes maintaining a hash of at least a digital certificate and data at one of the smart nodes; transmitting a message including the hash to the control module; receiving the message at the control module; determining a control hash based upon the information from at least a preceding engine start at the control module; module comparing the hash to the control hash at the control; and based upon the comparison, starting the engine and updating the block chain ledger as a function of the received message.

ACOUSTIC DETECTOR FOR SOLID MEDIUM WITH WIRELESS TRANSMISSION
20200195449 · 2020-06-18 ·

An example acoustic detector includes an acoustic transducer, an analog-to-digital converter, an encryption module, and a wireless communication interface. The acoustic transducer is to be coupled to a solid medium and is configured to generate an electrical signal in response to acoustic waves propagating through the solid medium. The analog-to-digital converter is coupled to the acoustic transducer to convert the electrical signal into digital acoustic data. The encryption module is coupled to encrypt the digital acoustic data to generate encrypted acoustic data and the wireless communication interface is coupled to transmit the encrypted acoustic data via one or more radio access technologies (RATs).

ACOUSTIC DETECTOR FOR SOLID MEDIUM WITH WIRELESS TRANSMISSION
20200195449 · 2020-06-18 ·

An example acoustic detector includes an acoustic transducer, an analog-to-digital converter, an encryption module, and a wireless communication interface. The acoustic transducer is to be coupled to a solid medium and is configured to generate an electrical signal in response to acoustic waves propagating through the solid medium. The analog-to-digital converter is coupled to the acoustic transducer to convert the electrical signal into digital acoustic data. The encryption module is coupled to encrypt the digital acoustic data to generate encrypted acoustic data and the wireless communication interface is coupled to transmit the encrypted acoustic data via one or more radio access technologies (RATs).

Systems and methods for quorum-based data recovery

The present disclosure includes systems and methods for quorum-based data recovery, in which data is recovered provided at least a minimum number of quorum data portions are presented. In exemplary embodiments, a predetermined minimum number of versions of original data is received, and the original data is reconstructed from the received versions, wherein the original data cannot be reconstructed without loss unless a predetermined minimum number of versions is received. In other embodiments, erroneous or corrupted quorum data portions are detected and associated participants presenting said erroneous or corrupted quorum data portions are identified.

System and apparatus for providing authenticable electronic communication
10673636 · 2020-06-02 ·

The present disclosure provides generally for system and method of authenticating a source of electronic communication. According to the present disclosure, authenticable communications may allow for authentication of a source of the electronic communication, which may limit potential damage caused by fraudulent communications. In some aspects, an authenticable communication may allow the recipient to confirm that the indicated source is the actual source of the authenticable communication. In some embodiments, the authentication may not require an exchange of encrypted communications or an exchange of communications solely within the same communication system. Authenticable communications may provide a separate layer of security that may allow a recipient to review the contents with confidence that the communication is not fraudulent. Further, authenticable communications may provide the additional security without requiring specialized software.

Embedding PINs into identification and credit card numbers to encrypt user's cards
10664617 · 2020-05-26 ·

An encryption method to protect the identification and account constructs displayed on cards, like identification cards and credit cards, or on paper medium like hospital or bank statements, where these constructs are comprised of numbers, and/or characters, and/or symbols and where the encryption method works by replacing some of the elements comprising the account construct with a special symbol(s) to avoid revealing the entire construct to unauthorized people and where the numbers and/or characters replaced by the special symbol(s) represent the personal identification number (PIN) associated with the construct. The method is designed to be utilized by issuers of cards like hospitals, governments and banks, and used as a process to protect the cardholder account information or account statements on paper medium. To provide the entire construct, the user simply replaces the special symbol(s) with his PIN. Without the PIN, a person will not be able to complete the construct.

Embedding PINs into identification and credit card numbers to encrypt user's cards
10664617 · 2020-05-26 ·

An encryption method to protect the identification and account constructs displayed on cards, like identification cards and credit cards, or on paper medium like hospital or bank statements, where these constructs are comprised of numbers, and/or characters, and/or symbols and where the encryption method works by replacing some of the elements comprising the account construct with a special symbol(s) to avoid revealing the entire construct to unauthorized people and where the numbers and/or characters replaced by the special symbol(s) represent the personal identification number (PIN) associated with the construct. The method is designed to be utilized by issuers of cards like hospitals, governments and banks, and used as a process to protect the cardholder account information or account statements on paper medium. To provide the entire construct, the user simply replaces the special symbol(s) with his PIN. Without the PIN, a person will not be able to complete the construct.

METHOD AND APPARATUS FOR BATTERY-FREE IDENTIFICATION TOKEN FOR TOUCH SENSING DEVICES
20200110482 · 2020-04-09 ·

The present disclosure relates to data communications. More specifically, the present disclosure relates to the generation of touch events on a capacitive touch-screen of an electronic device to communicate information to the electronic device. A method, apparatus, and system for using a user device to communicate with a touch-screen of an electronic device involves the token transmitting its identity (ID) directly through the touch-sensor by artificially modifying the effective capacitance between the touch-sensor and token surfaces. The electronic device receives the signal to identify the individual token.