H04L9/0637

Method and system for offline data transfer via machine-readable code
11704665 · 2023-07-18 · ·

A method for offline transmission of blockchain details includes: storing, in a computing device, a first private key and a currency amount; receiving a first destination address associated with a blockchain network and a transaction amount; generating a second private key; generating a second destination address associated with the blockchain network using the second private key; generating a blockchain transaction including at least the first destination address, the transaction amount, the second destination address, and a remainder amount based on at least the currency amount and the transaction amount; signing the generated blockchain transaction using the first private key; executing a query to replace the first private key with the second private key, wherein replacement of the first private key includes deletion of the first private key from the computing device; and transmitting the generated blockchain transaction.

System and method for maintaining a distributed ledger

A method of maintaining a distributed ledger at a client node includes: storing a distributed ledger defining a plurality of records each containing a set of values; storing (i) a local voting weight corresponding to the client node, and (ii) respective remote voting weights for a plurality of remote client nodes; obtaining a proposed update to a record of the distributed ledger; generating a local vote to apply or discard the proposed update and transmitting the local vote to the remote client nodes; receiving remote votes to apply or discard the proposed update from the remote client nodes; determining whether to permit the proposed update based on (i) the local vote and the local voting weight, and (ii) the remote votes and the corresponding remote voting weights; and according to the determination, applying the proposed update to the distributed ledger or discarding the proposed update.

Secure firmware transfer for an integrated universal integrated circuit card (iUICC)
11706025 · 2023-07-18 · ·

A device can (i) operate a primary platform (PP) within a tamper resistant element (TRE) and (ii) receive encrypted firmware images for operating within the primary platform. The TRE can store in nonvolatile memory of the TRE (i) a PP static private key (SK-static.PP), (ii) a server public key (PK.IDS1), and (iii) a set of cryptographic parameters. The TRE can generate a one-time PKI key pair of SK-OT1.PP and PK-OT1.PP and send the public key PK-OT1.PP to a server. The TRE can receive a one-time public key from the server comprising PK-OT1.IDS1. The TRE can derive a ciphering key using an elliptic curve Diffie Hellman key exchange and the SK-static.PP, SK-OT1.PP, PK.IDS1, and PK-OT1.IDS1 keys. The TRE can decrypt the encrypted firmware using the derived ciphering key. The primary platform can comprise a smart secure platform (SSP) and the decrypted firmware can comprise a virtualized image for the primary platform.

Block cipher side-channel attack mitigation for secure devices
11704443 · 2023-07-18 · ·

Systems and methods are disclosed for side-channel attack mitigation for secure devices including cryptographic circuits using block ciphers that are not based upon feedback. For disclosed embodiments, an integrated circuit includes a cryptographic circuit and a controller. The cryptographic circuit performs cryptographic operations in a block cipher AES mode without feedback. The controller outputs control signals to the cryptographic circuit that cause the cryptographic circuit to perform the cryptographic operations on sequential data blocks with an internally permuted order to mitigate block cipher side-channel attacks. The internally permuted order can be generated using one or more random number generators, one or more pre-configured permutated orders, or other techniques. Further, sequential data blocks can be grouped into sequential subsets of data blocks, and the cryptographic operations can be performed in sequence for the subsets with data blocks within each subset being processed with an internally permuted order.

DEVICE AND METHOD FOR GENERATING SCRAMBLED TIMESTAMP SEQUENCE (STS) IN ULTRA WIDE BAND (UWB) COMMUNICATION SYSTEM

Provided is a method of an electronic device for performing ultra wide band (UWB) communication. The method includes receiving upper bit information including pre-set at least one parameter via a UWB command interface (UCI), obtaining slot count information and key information including a constant key value, and performing static scrambled timestamp sequence (STS) generation, based on the upper bit information, the slot count information, and the key information.

System and Method for asset backed crypto-currency to be used as a payment method through the issue of convertible blockchain-tokens, issued to a person who provides their personal data
20230222489 · 2023-07-13 ·

The present invention is a novel system and method for coding, programming and administering a cryptocurrency platform.

NETWORK TRAFFIC MANAGEMENT USING SERVER NAME INDICATION
20230012504 · 2023-01-19 ·

A network gateway apparatus monitors Quic user datagram protocol (UDP) Internet Connection (QUIC) packets between a first device and a second device, extracts a version of the QUIC protocol and a connection identification from an unprotected portion of the protected header in response to detecting a QUIC packet having a protected header in use, determines a salt used in encryption of the protected header based on the version of the QUIC protocol, calculates a client initial secret based on the salt and the connection identification, determines an unprotected payload of the QUIC packet based on the client initial secret, a protected payload of the QUIC packet and the unprotected portion of the protected header, and extracts a server name indication (SNI) from the unprotected payload.

UPDATING ENCRYPTED SECURITY CONTEXT IN STACK POINTERS FOR EXCEPTION HANDLING AND TIGHT BOUNDING OF ON-STACK ARGUMENTS

A processor is to execute a first instruction to perform a simulated return in a program from a callee function to a caller function based on a first input stack pointer encoded with a first security context of a first callee stack frame. To perform the simulated return is to include generating a first simulated stack pointer to the caller stack frame. The processor is further to, in response to identifying an exception handler in the first caller function, execute a second instruction to perform a simulated call based on a second input stack pointer encoded with a second security context of the caller stack frame. To perform the simulated call is to include generating a second simulated stack pointer to a new stack frame containing an encrypted instruction pointer associated with the exception handler. The second simulated stack pointer is to be encoded with a new security context.

SYSTEM AND METHOD FOR TRUE PEER-TO-PEER AUTOMATIC TELLER MACHINE TRANSACTIONS USING MOBILE DEVICE PAYMENT SYSTEMS
20230013074 · 2023-01-19 ·

A system and method for true peer-to-peer automatic teller machine transactions using mobile device payment systems, where a user may receive physical cash in exchange for digital currency from another user, without either one of them having to have a merchant account or a credit/debit card clearing system through a payment processor, comprising a smartphone with an associate peer-to-peer ATM application, blockchain datastore, GPS satellite, cellular tower, and smart wallet application.

SYSTEMS AND METHODS FOR SHARED LEDGER FOR SUB-MERCHANT ONBOARDING
20230014113 · 2023-01-19 ·

A computer-implemented method for generating and maintaining shared ledgers for sub-merchant onboarding includes receiving a request from a payment facilitator to onboard a sub-merchant, receiving information about the sub-merchant from the payment facilitator or the sub-merchant, providing the information about the sub-merchant to a third party, receiving underwriting information corresponding to the information about the sub-merchant from the third party, generating an onboarding decision based on the information about the sub-merchant and the underwriting information, storing the information about the sub-merchant, the underwriting information, and the onboarding decision to a shared ledger, and generating and transmitting an electronic offer of a product or a service to the sub-merchant based on the stored contents of the shared ledger.