Patent classifications
H04L9/0668
Wireless dual-mode identification tag
Embodiments of the present disclosure generally relate to a wireless identification tag for association with a product to enable product self-identification and system and methods for use thereof. In one implementation, the tag may include at least one antenna tuned to receive energy transmitted at one or more frequencies within certain frequency bands. The tag may also include at least one transmitter that may be configured to send at least one identification signal. The tag may also include at least one circuit. The at least one circuit may be configured to detect whether energy is received in a certain frequency band, and to cause the at least one transmitter to operate in a mode corresponding to the certain frequency band.
Appliances with integrated communication tags
Embodiments of the present disclosure generally relate to an appliance for holding electronically tagged products and for recording an association between the tagged products and the appliance, and system and methods for use thereof. In one implementation, the appliance may include a housing defining a cavity for retaining the electronically tagged products. The appliance may also include an exciter integrated with the housing and configured to trigger tags of the products to cause the tag of each product to transmit a unique tag ID. The appliance may also include a receiver for receiving transmission of each unique tag ID. The appliance may also include a communicator for outputting indications of identities of electronically tagged products retained in the cavity.
Systems and methods for quantum consensus
Systems, apparatuses, and methods are disclosed for quantum entanglement authentication (QEA). An example method includes transmitting a first number and a second electronic identification of a second subset of the first set of entangled quantum particles to a second computing device, transmitting a second number and a first electronic identification of a first subset of a first set of entangled quantum particles to a first computing device, wherein each entangled quantum particle in the first set of entangled quantum particles is entangled with a respective entangled quantum particle in a second set of entangled quantum particles, receiving, from the first computing device, a first session key, receiving, from the second computing device, a second session key and in an instance in which the first session key corresponds to the second session key, authenticating a session between the first computing device and the second computing device.
Systems and methods for quantum consensus
Systems, apparatuses, and methods are disclosed for quantum entanglement authentication (QEA). An example method includes transmitting a first number and a first electronic identification of a first set of entangled quantum particles to a first computing device, each entangled quantum particle in the first set of entangled quantum particles is entangled with a respective entangled quantum particle in a second set of entangled quantum particles, receiving from the first computing device, a first session key, the first session key being a function of the first number and a second number provided to the first computing device in response to a first measurement initiation control signal comprising the first electronic identification of a first subset of the first set of entangled quantum particles, and in an instance in which the first session key corresponds to a second session key, authenticating a session between the first computing device.
Symmetric key stream cipher cryptographic method and device
The subject of the invention is a symmetric key stream cipher cryptographic method for encrypting plaintexts and decrypting ciphertexts during which process a text to be encrypted or an encrypted text is scanned with an input/output data buffer (5), a pseudo random number is created with a pseudo random number generator (8) with a seed (12), a key automaton (11) is used for encryption and/or decryption. It is characterized in that the procedure involves the method whereby using the characters of the text scanned by the input/output data buffer (5) and the pseudo random number generated by the pseudo random number generator (8), an element of the key automaton's (11) transition matrix is directly reached from the input/output data buffer (5); the procedure is then repeated. A symmetric key stream cipher cryptographic device for implementing the method of claim 1 is also the subject of the invention.
Reconfigurable security hardware and methods for internet of things (IOT) systems
A hardware encryption module with reconfigurable security algorithms for randomly selecting block ciphers, stream ciphers, and their components, for internet of things (IoT) and data security applications. A corresponding system contains a hardware number generator for generating unique secrets in digital and wireless communication protocols. The system contains a cryptographically secure pseudorandom number generator for creating deterministic random sequences for the reconfigurable logic module. The system contains a multiplexing scheme to send keys and cipher texts in accordance with a wireless communication protocol. The hardware encryption module can be used to reconfigure block cipher algorithms, modes of operation, key scheduling algorithms, confusion functions, and/or round orders, based on reconfigurable logic. One type of reconfigurable logic allows stream cipher algorithms and key mixing keys to be changed at random.
One-time pad generation
A computer-implemented method of generating a one-time pad for use in encryption, the method comprising: determining a seed sequence and an ordered set of initial values; and for each initial value, computing a sequence of terms, wherein each term of the sequence is computed by combining at least one other term of that sequence with at least one term of a previous one of the sequences using modular arithmetic, the previous sequence being the sequence generated for the previous initial value or, in the case of the first initial value, the seed sequence. Rather than using the final sequence as a direct basis for the one-time pad, one or more additional steps are taken to disrupt the final sequence, in order to improve the security of the method and the resulting one-time pad.
Cryptography device having secure provision of random number sequences
Secure computation of a random number sequence in a cryptographic device. The computation is secured by receiving a homomorphic ciphertext seed vector, selecting an initial internal state from the seed vector, the initial internal state composed of a subset of elements of the seed vector, updating an internal state from a previous internal state using multivariate functions accepting elements of the previous internal state as inputs to produce a homomorphic ciphertext from homomorphic ciphertext input values, generating an intermediate result vector of homomorphic ciphertexts from the homomorphic ciphertext internal state multivariate functions accepting the elements of the internal state as inputs to produce a homomorphic ciphertext from homomorphic ciphertext input values, and decrypting the intermediate result vector elements into plaintext vector elements, thereby producing a plaintext deterministic random sequence vector corresponding to plaintext seed elements used to produce the seed vector. Other systems and methods are disclosed.
Identification tag with variable response time
Embodiments disclosed generally relate to a wireless identification tag with a response time that varies as a function of incoming signal frequency and system and methods for use thereof. In one implementation, the tag may include at least one antenna tuned to receive energy transmitted at a first frequency and at a second frequency. The tag may also include at least one transmitter. The tag may also include at least one circuit configured to detect whether energy is received in the first frequency or the second frequency, and to cause the at least one transmitter to transmit an immediate response when the second frequency is detected and to transmit a delayed response when the first frequency is detected.
Parallel generation of pseudorandom number sequences using multiple generators with brined initial states
Embodiments comprise construction of a collection of pseudorandom number generators (PRNGs), with either a known or unknown cardinality, using unique brine values that comprise a salt value for the collection and also different index values for each PRNG for the collection. The additive parameters of such PRNGs are based on the respective brine values of the PRNGs, thereby ensuring that the PRNGs in the collection have different state cycles. Embodiments make it likely that PRNGs from different collections have distinct additive parameters by choosing a pseudorandom salt value for each collection. According to embodiments, a stream of generators in a collection is created by a spliterator that carries a salt value for the collection and combines the salt value with index values for the generators to produce brined additive parameters for the PRNGs in the stream. According to embodiments, such a stream may be executed by multiple threads in parallel.