H04L9/0618

DEPLOYING PHYSICAL DIAMOND TOKENS ON A BLOCKCHAIN
20230237474 · 2023-07-27 ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

Progressive Key Rotation for Format Preserving Encryption (FPE)
20230004667 · 2023-01-05 ·

Aspects of the disclosure provide a technological improvement to a cipher by improving data security of format-preserving encryption (FPE), by, inter alia, embedding specific key identifiers for rotating keys directly into ciphertext. Aspects of the disclosure relate to methods, computer-readable media, and apparatuses for improving data security in a format-preserving encryption (FPE) context by using specific methods of rotating and identifying the appropriate encryption key from among numerous rotating keys stored in a key data store. Specific to FPE, a plaintext of the data and its corresponding ciphertext of the data remain the same in length/size; yet the methods, computer-readable media, and/or apparatuses disclosed herein permit embedding of an identification of a specific key among the plurality of rotating keys for the particular ciphertext without compromising the technical requirements of FPE.

HOMOMORPHIC COMPUTATIONS ON ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that perform homomorphic computations on encrypted third-party data within a distributed computing environment. For example, an apparatus receives a homomorphic public key and encrypted transaction data characterizing an exchange of data from a computing system, and encrypts modelling data associated with a first predictive model using the homomorphic public key. The apparatus may perform homomorphic computations that apply the first predictive model to the encrypted transaction data in accordance with the encrypted first modelling data, and transmit an encrypted first output of the homomorphic computations to the computing system, which may decrypt the encrypted first output using a homomorphic private key and generate decrypted output data indicative of a predicted likelihood that the data exchange represents fraudulent activity.

FILE PROCESSING DEVICE AND FILE PROCESSING METHOD
20230006818 · 2023-01-05 ·

The present technology relates to a file processing device and a file processing method for enabling restriction of viewing of an image.

A file control unit generates a file that stores an encrypted image obtained by encrypting an image with a first encryption key, and an encrypted encryption key obtained by encrypting the first encryption key with a second encryption key, the encrypted image and the encrypted encryption key being associated with each other in the file. The file control unit also decrypts the encrypted encryption key in the file into the first encryption key, and, with the first encryption key obtained by the decryption, decrypts the encrypted image into the image. The present technology can be applied to a digital camera and the like that capture images, for example.

Data monetization and exchange platform
11568404 · 2023-01-31 · ·

A system for providing a large set of data resources for nearly any client with a centralized collection of historical data, and a server through which changing datasets located on provider networks may be accessed through the system without having to upload them to the system. The system providers a marketplace for buying and selling of data, optionally including blockchain technology to allow for secure and/or anonymous transactions.

Systems and methods for tokenization to support pseudonymization of sensitive data

Systems and methods for tokenization to support pseudonymization are provided herein. An example method includes receiving an input set, seeding a random number generator with one or more secret data, transposing the input set using a first random number/transposition parameter generated by the random number generator to create a transposed input set, transposing a token set using a second random number/transposition parameter generated by the random number generator to create a transposed token set, and generating a token by substituting transposed input set values with transposed token set values.

Encrypting and decrypting information
11569978 · 2023-01-31 · ·

Methods, systems, and devices for encrypting and decrypting data. In one implementation, an encryption method includes inputting plaintext into a recurrent artificial neural network, identifying topological structures in patterns of activity in the recurrent artificial neural network, wherein the patterns of activity are responsive to the input of the plaintext, representing the identified topological structures in a binary sequence of length L and implementing a permutation of the set of all binary codewords of length L. The implemented permutation is a function from the set of binary codewords of length L to itself that is injective and surjective.

Electronic system and computerized method for verification of transacting parties to process transactions

The present disclosure generally relates to electronic systems and computerized methods for verification of transacting parties to process transactions. A payment network server receives details of a transaction fulfilled by an agent and generates a transaction identification plaintext. A first party keyset for the first transacting party and an agent keyset for the agent is identified. The server generates cryptograms and ciphertexts encrypted by the first party keyset and agent keyset and sends the cryptograms to the first transacting party and agent. An encrypted cryptogram contains an encrypted ciphertext which contains a plaintext representing the transaction identification plaintext. The ciphertexts are exchanged between the first transacting party and agent by a computer handshake for decryption. The plaintexts are extracted from the ciphertexts and compared against the transaction identification plaintext for verifying the first transacting party and agent.

Replica: an improved communication concealment cipher
11716192 · 2023-08-01 ·

Replica is an encryption algorithm where security is based on lavish use of randomness rather than on mathematical complexity and the cipher is decoy-tolerant, namely it can readily distinguish between bona fide ciphertext bits and randomized meaningless bits. This attribute allows its users to project as much security as they care by mixing the message bits with more and more decoy bits. It also allows its user to conceal their pattern of communication in a fixed rate of message bit flow.

Integrated circuit performing fast unbreakable cipher
11711365 · 2023-07-25 · ·

An authentication and encryption protocol is provided that can be implemented within a single clock cycle of an integrated circuit chip while still providing unbreakable encryption. The protocol of the present invention is so small that it can co-exist on any integrated circuit chip with other functions, including a general purpose central processing unit, general processing unit, or application specific integrated circuits with other communication related functionality.