H04L9/38

Embedding PINs into Identification and Credit Card Numbers to Encrypt User's Cards
20190114448 · 2019-04-18 ·

An encryption method to protect the identification and account constructs displayed on cards, like identification cards and credit cards, or on paper medium like hospital or bank statements, where these constructs are comprised of numbers, and/or characters, and/or symbols and where the encryption method works by replacing some of the elements comprising the account construct with a special symbol(s) to avoid revealing the entire construct to unauthorized people and where the numbers and/or characters replaced by the special symbol(s) represent the personal identification number (PIN) associated with the construct. The method is designed to be utilized by issuers of cards like hospitals, governments and banks, and used as a process to protect the cardholder account information or account statements on paper medium. To provide the entire construct, the user simply replaces the special symbol(s) with his PIN. Without the PIN, a person will not be able to complete the construct.

Chaotically modulated communications with switched-capacitance resistance tuning

Various embodiments are described that relate to a switched-capacitor in a chaotically modulated communication device. For one chaotically modulated communication device to communicate with another chaotically modulated communication device, the devices should be finely tuned with one another. To achieve this fine tuning, the devices can employ a switched-capacitor set that can function as a variable resistor set. Employing the switched-capacitor set can cause achievement of precise resistances that allow the devices to successfully communicate with one another.

TECHNIQUES TO POWER ENCRYPTION CIRCUITRY

Various embodiments are generally directed to techniques to power encryption circuitry, such as with a power converter, for instance. Some embodiments are particularly directed to a power converter that utilizes one or more capacitors to power encryption circuitry while masking the power signature of the encryption circuitry. In one or more embodiments, for example, a power converter may charge a capacitor with a power source of a computing platform, and then power encryption circuitry with the capacitor to perform a first portion of an encryption operation. In one or more such embodiments, the power converter may recharge the capacitor with the power source after completion of the first portion of the encryption operation, and perform a second portion of the encryption operation.

TECHNIQUES TO POWER ENCRYPTION CIRCUITRY

Various embodiments are generally directed to techniques to power encryption circuitry, such as with a power converter, for instance. Some embodiments are particularly directed to a power converter that utilizes one or more capacitors to power encryption circuitry while masking the power signature of the encryption circuitry. In one or more embodiments, for example, a power converter may charge a capacitor with a power source of a computing platform, and then power encryption circuitry with the capacitor to perform a first portion of an encryption operation. In one or more such embodiments, the power converter may recharge the capacitor with the power source after completion of the first portion of the encryption operation, and perform a second portion of the encryption operation.

Method and apparatus for blockchain community governance, device and storage medium

Provided are a method and apparatus for blockchain community governance, a device and a storage medium. The method is described below. A community governance transaction request initiated by a blockchain account and a governance scene to which the community governance transaction request belongs are acquired. Community governance authority of the blockchain account in the governance scene is verified according to the governance scene and governance token resource information in the blockchain account. In a case where a community governance authority verification is successful, the community governance transaction request is executed.

Blockchain Rideshare Data Aggregator Solution
20240271949 · 2024-08-15 ·

Systems and methods are described for generating transactions based upon rideshare data and updating a distributed ledger. The method may include (1) monitoring a distributed ledger for an indication of an accident, the indication of the accident identifying at least a user and a time period; (2) obtaining rideshare data from the distributed ledger, wherein the rideshare data: identifies one or more rideshare companies for which the user offered driving services during the time period; and (3) verifying, based upon the rideshare data, a controlling party, wherein the controlling party is one of the user or one of the one or more rideshare companies.

SECURE DEVICE-TO-DEVICE PROCESS FOR GRANTING ACCESS TO A PHYSICAL SPACE
20180351941 · 2018-12-06 ·

An unmanned vehicle may be utilized to perform various tasks, such as delivering packages and picking up packages for delivery in coordination with a physical access control device. Authentication and authorization processes may be used to grant the unmanned vehicle access to a physical space controlled by a physical access control device. A subsystem of the unmanned vehicle and the physical access control device may both support execution of computer instructions in a protected execution environment. A protected execution environment may be configured to provide an attestation to a remote counterparty, receive a purported attestation associated with the counterparty, verify the purported attestation is authentic using a root of trust in common with the remote counterparty, and perform authentication and authorization routines in connection with access policies of the unmanned vehicle, the physical access control device, or both.

SECURING AUTHENTICATION FLOWS USING A DECENTRALIZED IDENTIFIER

A digital wallet generates an identification value associated with a DID of a DID owner. The digital wallet generates a first request including the identification value for an authentication token from an identification provider. The first request is provided to the identification provider. The digital wallet receives, in response to the identification provider validating the first request, the authentication token that authenticates the digital wallet with a verifiable claim issuer including the identification value from the identification provider. The digital wallet generates a second request for one or more verifiable claims from the verifiable claim issuer. The second request includes the DID and authentication token including the identification value. In response to the verifiable claim issuer validating the authentication token and the identification value, one or more verifiable claims from the verifiable claim issuer are received by the digital wallet.

Retroactively adding encryption and/or authentication levels to a blockchain
12095926 · 2024-09-17 · ·

A request to retroactively add one or more of an encryption level, an encryption type, a security level, and an authentication level to an existing blockchain is received. An authentication/encryption block is added to the existing blockchain. The authentication/encryption block comprises the one or more of the encryption level, the encryption type, the security level, and the authentication level. Based on the added authentication/encryption block in the existing blockchain, the one or more of the encryption level, the encryption type, the security level, and the authentication level are retroactively applied to at least a portion of blockchain data in the existing blockchain. In one embodiment, a data structure is used in place of the authentication/encryption block.

IMAGING-BASED AUTOMATIC DATA EXTRACTION WITH SECURITY SCHEME
20180227274 · 2018-08-09 ·

A system and method for secure data transfer between two secure computer systems via display-based transfer in geometric form. A first computer network stores alphanumeric data. The alphanumeric data is encoded into a geometric data form, such as a bar code or matrix code representation or other non-text, non-numeric data form suitable for visual display. The bar code or matrix code, or other geometric data form, is displayed on a display monitor connected to the first computer network. The system and method then receives the displayed geometric data form on a second computer network. The second computer network has a camera which obtains a view of the bar code, matrix code, or other geometric data representation. The second computer network then decodes the geometric data representation to restore the data to its native form (such as text or numbers). The second computer network then stores the retrieved data.