Jump to content

18407653. GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES simplified abstract (Capital One Services, LLC)

From WikiPatents

GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES

Organization Name

Capital One Services, LLC

Inventor(s)

Jeffrey Rule of Chevy Chase MD (US)

Kevin Osborn of Newton MA (US)

Srinivasa Chigurupati of Long Grove IL (US)

GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18407653 titled 'GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES

The abstract describes a patent application related to the secure generation of barcodes using cryptographic techniques. An application receives encrypted data from a contactless card associated with an account, along with verification of the data and an encrypted authorization token from a server. The application then generates a barcode using the encrypted authorization token.

  • Application receives encrypted data from a contactless card
  • Verification of encrypted data and encrypted authorization token received from a server
  • Barcode generated using the encrypted authorization token

Potential Applications: - Secure transactions - Access control systems - Ticketing and event management

Problems Solved: - Ensuring secure generation of barcodes - Preventing unauthorized access to sensitive information

Benefits: - Enhanced security for transactions - Streamlined authentication processes - Protection against fraud and unauthorized access

Commercial Applications: Title: Secure Barcode Generation Technology for Enhanced Transaction Security This technology can be utilized in various industries such as banking, retail, transportation, and event management to enhance security measures and protect sensitive data during transactions.

Questions about Secure Barcode Generation Technology: 1. How does this technology improve transaction security?

  This technology enhances transaction security by utilizing cryptographic techniques to generate secure barcodes, preventing unauthorized access to sensitive information.
  

2. What are the potential applications of this technology beyond secure transactions?

  This technology can also be applied in access control systems, ticketing, and event management to ensure secure authentication processes.


Original Abstract Submitted

Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. An application may receive a request to generate a barcode. The application may receive encrypted data from a communications interface of a contactless card associated with an account. The application may receive, from a server, verification of the encrypted data and an encrypted authorization token associated with the account. The application may generate the barcode utilizing the encrypted authorization token.

Cookies help us deliver our services. By using our services, you agree to our use of cookies.