18407653. GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES simplified abstract (Capital One Services, LLC)
GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES
Organization Name
Inventor(s)
Jeffrey Rule of Chevy Chase MD (US)
Kevin Osborn of Newton MA (US)
Srinivasa Chigurupati of Long Grove IL (US)
GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18407653 titled 'GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES
The abstract describes a patent application related to the secure generation of barcodes using cryptographic techniques. An application receives encrypted data from a contactless card associated with an account, along with verification of the data and an encrypted authorization token from a server. The application then generates a barcode using the encrypted authorization token.
- Application receives encrypted data from a contactless card
- Verification of encrypted data and encrypted authorization token received from a server
- Barcode generated using the encrypted authorization token
Potential Applications: - Secure transactions - Access control systems - Ticketing and event management
Problems Solved: - Ensuring secure generation of barcodes - Preventing unauthorized access to sensitive information
Benefits: - Enhanced security for transactions - Streamlined authentication processes - Protection against fraud and unauthorized access
Commercial Applications: Title: Secure Barcode Generation Technology for Enhanced Transaction Security This technology can be utilized in various industries such as banking, retail, transportation, and event management to enhance security measures and protect sensitive data during transactions.
Questions about Secure Barcode Generation Technology: 1. How does this technology improve transaction security?
This technology enhances transaction security by utilizing cryptographic techniques to generate secure barcodes, preventing unauthorized access to sensitive information.
2. What are the potential applications of this technology beyond secure transactions?
This technology can also be applied in access control systems, ticketing, and event management to ensure secure authentication processes.
Original Abstract Submitted
Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. An application may receive a request to generate a barcode. The application may receive encrypted data from a communications interface of a contactless card associated with an account. The application may receive, from a server, verification of the encrypted data and an encrypted authorization token associated with the account. The application may generate the barcode utilizing the encrypted authorization token.