H04L9/0872

Blockchain Enabled Data Authentication System Using Simulated Quantum Entanglement
20220385472 · 2022-12-01 ·

A real or simulated quantum entanglement can also exhibit a very high level of security in secure key exchanges between two or more components or devices. The present invention relates to a mechanism to simulate entanglement of devices using electronic hardware and software in such a way to emulate the real particle entanglement (without the need for all the necessary systems and costs associated with it), using localized blockchain ledger evaluation and authentication.

Systems and methods for selectively processing blockchain data
11515999 · 2022-11-29 · ·

An improved blockchain implementation that reduces application transaction processing bottlenecks for applications that operate on a decentralized network. For example, if an application operating on a decentralized network becomes sufficiently popular, an existing blockchain can be split into the original blockchain and an application-specific chain (or app chain) that includes blocks that only store transactions for the sufficiently popular application. A peer that is not interested in tracking transactions for the sufficiently popular application, however, does not need to track the application-specific chain. Thus, the peer can reduce the number of computational operations that are performed by simply storing block data for blocks in the original blockchain and not for blocks in the application-specific chain.

BALANCING PRIVACY AND EFFICIENCY FOR REVOCATION IN VEHICULAR PUBLIC KEY INFRASTRUCTURES

According to some embodiments, systems and methods are provided for revoking one or more of a plurality of entities in a vehicular public-key infrastructure. The systems and methods balance privacy and efficiency by distributing activation codes according to various approaches, including a direct request approach, a fixed-size subset approach, and a variable-size subset approach.

TOKEN MANAGEMENT SYSTEM AND METHOD
20220376914 · 2022-11-24 ·

A method is disclosed. The method includes transmitting, to a token service computer, a request message comprising a token requestor identifier associated with the token requestor and a service provider computer identifier associated with the service provider computer. The method also includes receiving a response message comprising the token and/or a cryptogram, generating an authorization request message comprising the token and the cryptogram, and transmitting the authorization request message to a processing computer in communication with a token service computer.

Timestamp-based shared key generation
11509463 · 2022-11-22 ·

Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have synchronized clocks. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp. Since the computing systems have synchronized clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another. Furthermore, both computing systems may synchronize their clocks to a private time server that maintains a clock that runs faster or slower than standard time. Security is maintained by one or more of restricting access to the time server, using secret key generation processes, and/or using a secret random number generator.

Methods and systems for password recovery based on user location
11509469 · 2022-11-22 · ·

A secure method and/or system allowing a user to import, export, recover and use their private keys based in part on the user's location information, to allow for reliable, consistent, and easy management of user identity and private keys across all of a user's devices and eliminate of traditional username/password authentication schemes.

Private key creation using location data

Methods and a system of generating a master seed using location-based data. The system includes a pseudo-random number generator configured to generate a random number and a global positioning system module configured to determine a location of the system. The system also includes an encryption module configured to generate a signing request message. The signing request message includes the random number and the location. The system further includes a communication device configured to transmit the signing request message to a location authority for authorization. The communication device further configured to receive a signature from the location authority upon authorization of the signing request message. The system is further configured to generate a master seed based on the signature.

MANAGEMENT SYSTEM
20230050821 · 2023-02-16 ·

A system for tracking an asset including one or more processing devices that identify a spatial region in a complex number space, the spatial region being associated with the asset, receive a user defined password, identify a plurality of key locations within the spatial region at least in part using the user defined password, calculate key numerical values at each of the plurality of key locations using a defined complex number formula and use the key numerical values to generate an encryption key. The asset can be associated with a user by storing an asset record in a database which is indicative of an asset identifier, the spatial region and an encrypted payload derived using the encryption key.

LOCATION-KEY ENCRYPTION SYSTEM

An encryption method comprises: creating an asymmetric profile key comprising a multipart threshold key using a set of user devices; signing a declaration using the profile key and the set of user devices, the declaration identifying the set of user devices; creating an asymmetric location key comprising two multipart threshold keys; sharding and storing the asymmetric location key; creating a symmetric key; encrypting a file with the symmetric key; encrypting the symmetric key with the location key; and storing the encrypted file and encrypted key such that the encrypted file cannot be decrypted without decrypting the location key by a threshold of the set of user devices.

Mobile voting and voting verification system and method

A mobile voting system and method are provided. The mobile voting system may include a mobile messaging aggregator configured to receive voter verification requests from one or more mobile carriers, and a mobile voter verification server configured to verify a voter's identity in response to a voter verification request and generate a link to a mobile ballot once the voter's identity has been verified. The mobile messaging aggregator may cause the link to the mobile ballot to be transmitted to a mobile device of the voter, which when selected by the voter, allows the voter to cast a vote.