H04L2209/24

METHODS OF MANUFACTURING A GARMENT APPARATUS
20230254142 · 2023-08-10 · ·

Methods of manufacturing a garment apparatus are provided. The garment apparatus can be, for example, a device, a panty, a boyshort, a short, a lingerie item, a barrier, a garment, an undergarment, a membrane, a prophylactic, and/or a system.

Methods for communicating data utilizing sessionless dynamic encryption

The present disclosure is directed to methods that provide a secure communication protocol by utilizing one step process of authenticating and encrypting data without having to exchange symmetric keys or needing to renew or re-issue digital identities fundamental to asymmetric encryption methodology.

Method for programming banking data in an integrated circuit of a watch
11308465 · 2022-04-19 · ·

The method enables banking data to be programmed in an integrated circuit of a watch by an asymmetric encryption and decryption algorithm. The method includes the steps of: transmitting a public key of the integrated circuit and a digital certificate generated by a certification authority on the basis of a private key of the certification authority and of the integrated circuit public key, from the portable object to a bank, verifying the digital certificate in the bank by a public key of the authority, and if the digital certificate is validated, transmitting encrypted confidential data personalized to an owner of the portable object from the bank to the portable object, and decrypting the encrypted data received by the application-specific integrated circuit of the portable object by means of a private key of the integrated circuit, to store the decrypted confidential data personalized to the portable object owner.

Systems and methods for tracking and transferring ownership of connected devices using blockchain ledgers

The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of an event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule and involving at least one of assets tracked within the secured blockchain-based ledger or an owner of a portion of the tracked assets. By way of example, the detected event may triggering a sale, transfer, and/or re-allocation of an ownership interest in a tracked asset, and the identified rule may specify a distribution of proceeds derived from the sale, transfer, and/or re-allocation.

Cryptanalysis Method and System
20210367931 · 2021-11-25 ·

A cryptanalysis method comprising:

(A) Performing a ciphertext-only direct cryptanalysis of A5/1 and
(B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output;
The solution of the equations gives the internal state of RI, R2, and R3;
Together with R4, this gives the full internal state which gives a suggestion for the key.

LIMITED-USE KEYS AND CRYPTOGRAMS
20220019995 · 2022-01-20 ·

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include encrypting account information with a first encryption key to generate a second encryption key, and encrypting key index information using the second key to generate a limited-use key (LUK). The key index information may include a key index having information pertaining to generation of the LUK. The LUK and the key index can be provided to the communication device to facilitate generation of a transaction cryptogram for a transaction conducted using the communication device, and the transaction can be authorized based on the transaction cryptogram generated from the LUK.

System and method for securing content keys delivered in manifest files
11228427 · 2022-01-18 · ·

A method and a user device are disclosed for securing streaming content decryption. The method includes receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding first private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device.

METHOD AND SYSTEM FOR SECURE OVER-THE-TOP LIVE VIDEO DELIVERY
20210360304 · 2021-11-18 ·

A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content encryption key has expired, a second content encryption key is provided to the content packaging engine for encryption of a second portion of a video stream. The method further provides for notification of client devices of imminent key changes, as well as support for secure retrieval of new keys by client devices. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method.

CLOUD-BASED TRANSACTIONS WITH MAGNETIC SECURE TRANSMISSION
20210357925 · 2021-11-18 ·

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and transmitting a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction. The token and the transaction cryptogram can be transmitted to a magnetic stripe reader by generating an emulated magnetic signal. The LUK may be associated with a set of one or more limited-use thresholds that limits usage of the LUK, and the transaction can be authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds.

CERTIFICATE-BASED PAIRING OF KEY FOB DEVICE AND CONTROL UNIT
20220009444 · 2022-01-13 ·

An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.