Patent classifications
H04L9/0668
Systems and methods for quantum consensus
Systems, apparatuses, and methods are disclosed for quantum entanglement authentication (QEA). An example method includes transmitting a first number and a second electronic identification of a second subset of the first set of entangled quantum particles to a second computing device, transmitting a second number and a first electronic identification of a first subset of a first set of entangled quantum particles to a first computing device, wherein each entangled quantum particle in the first set of entangled quantum particles is entangled with a respective entangled quantum particle in a second set of entangled quantum particles, receiving, from the first computing device, a third number, receiving, from the second computing device, a fourth number and in an instance in which the third number corresponds to the first number and the fourth number corresponds to the second number, authenticating a session between the first computing device and the second computing device.
Capacitor architecture for wireless communication tag
Embodiments of the present disclosure generally relate to a wireless identification tag configured to collect and store ambient energy for use in delayed transmission, and system and methods for use thereof. In one implementation, the tag may include a receiver for receiving ambient energy; a first capacitor for storing the ambient energy; and a second capacitor for collecting and storing the ambient energy. The second capacitor may have lower capacitance than the first capacitor. The tag may also include an inductor interconnecting the first capacitor and the second capacitor. The tag may also include circuitry configured such that ambient energy received by the receiver is initially stored in the second capacitor and subsequently transferred to and stored in the first capacitor. The tag may also include a transmitter electrically connected to first capacitor, to enable the energy stored in the first capacitor to power the transmitter.
Encryption engine and decryption engine with glitch randomization to prevent side channel attacks
A decryption integrated circuit (IC) includes an interface configured to receive an encrypted block of data and a decryption datapath. The decryption datapath has a plurality of computational stages arranged in a pipeline configured to decrypt the encrypted block of data to form a decrypted block of data. A non-linear computational stage included in the pipeline of the decryption datapath includes multiple asymmetric logical paths and multiple bypassable latches. A first signal traverses a first logical path and a second signal traverses a second logical path having a greater number of logical units than the first logical path. Each bypassable latch is positioned in a respective logical path of the multiple asymmetric logical paths. The decryption IC further includes a controller configured to assign an individual random bit sequence to each bypassable latch to randomly activate or randomly disable each bypassable latch of the multiple bypassable latches.
Wireless device configured for powering transmissions with harvested energy
Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include an antenna configured to receive ambient energy. The tag may also include an energy storage component configured to aggregate and store the received ambient energy. The tag may also include a transmitter electrically connected to the energy storage component and configured to transmit the identification signal. The tag may also include a circuit connected to the transmitter and configured to implement an identification transmission rule, to cause the transmitter to delay sending the identification signal even when sufficient energy for transmission of the identification signal is aggregated and stored in the energy storage component.
PRIVACY SYSTEM FOR ELECTRONICALLY TAGGED GOODS
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the second owner from accessing the first information.
DEVICE AND METHOD FOR RESONANT CRYPTOGRAPHY
A communication network can include a random number beacon broadcasting a random number stream to multiple computing devices. At least two of those computing devices can generate private keys for secured communication based a subset of random numbers from the random number stream. Other devices do not have access to these private keys even though they have access to the subset of random numbers by virtue of receiving the broadcasted random number stream. The subset of random numbers can be extracted based on a predetermined time known only to the two or more devices, and/or the subset of random numbers can be extracted following detection of a predetermined number sequence in the random number stream known only to the two or more devices. Following a similar concept, a computing device can generate private cryptographic keys from a public random number stream.
System for simultaneous tag triggering and sequential tag reading
Embodiments of the present disclosure generally relate to systems, methods, and computer readable media containing instructions for causing simultaneous triggering and sequential reading of a plurality of tags. In one implementation, the instructions may include displaying an activatable element on a graphical user interface for activating a 2.4 GHz transmitter. The instructions may also include activating the transmitter to cause each of a plurality of tags to send a unique tag ID to a receiver. The instructions may also include reading a first group of tag IDs during a first time interval; recording first information associated with the first group; maintaining activation of the transmitter to cause transmission of at least some of the tag IDs of the first group along with the unique tag IDs of a second group of tag IDs to the receiver; and recording second information associated with the second group.
Systems and methods for managing data based on secret sharing
Systems and methods are provided for obtaining data to be secured based on a secret sharing technique, the data being associated with a file identifier and a split specification that includes at least a number of splits n and a minimum number of splits m required for reconstructing the data, and an RRSG scheme. An RRSG state can be initialized based at least in part on a given data transformation key to provide repeatable sequence of random bytes. For every m bytes of data: a polynomial whose coefficients are determined based at least in part on m bytes of the data and a portion of the repeatable sequence of random bytes can be determined; the polynomial can be evaluated at n unique values determined by a portion of repeatable sequence of random bytes to generate n bytes. Each byte can be stored into one of the n split stores.
REPEATED MODULO METHOD AND APPARATUS FOR SIZE-LIMITATION OF INTERIM CALCULATION RESULTS
A method and apparatus for limiting the size of large numbers during numeric calculations, such as during encryption and decryption calculations.
Wireless dual-mode identification tag
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the first owner from accessing the second information.