Mastercard International Incorporated (20240267229). SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURES simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURES

Organization Name

Mastercard International Incorporated

Inventor(s)

Rajat Maheshwari of SIngapore (SG)

Charles Walton of Marshfield MA (US)

Karthik Ramanathan of Singapore (SG)

Prashant Sharma of Madison NJ (US)

SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240267229 titled 'SYSTEMS AND METHODS FOR USE IN APPENDING LOG ENTRIES TO DATA STRUCTURES

Simplified Explanation: The patent application describes a method for appending log entries to a data structure using encryption and digital signatures.

  • Communication device receives log entry from a terminal.
  • Log entry is signed with a private key specific to the device.
  • Signed log entry is transmitted to an identity provider (IDP).
  • Communication device receives a signed, encrypted log entry from the IDP.
  • Signature of the encrypted log entry is verified using a public key associated with the IDP.
  • Encrypted log entry is appended to a digital identity in the communication device.

Key Features and Innovation:

  • Use of encryption and digital signatures for secure log entry management.
  • Integration of private and public key pairs for authentication.
  • Collaboration between communication device and IDP for secure data handling.

Potential Applications:

  • Secure logging systems for sensitive information.
  • Identity verification processes in digital transactions.
  • Secure communication protocols in IoT devices.

Problems Solved:

  • Ensuring the integrity and authenticity of log entries.
  • Preventing unauthorized access to log data.
  • Establishing secure communication channels between devices.

Benefits:

  • Enhanced data security and privacy.
  • Reliable audit trails for tracking system activities.
  • Streamlined authentication processes for users.

Commercial Applications: Secure Data Logging and Management: Implementing secure logging systems in industries handling sensitive information. Digital Identity Verification Services: Providing secure identity verification solutions for online transactions and access control systems.

Questions about the Technology: 1. How does the use of encryption and digital signatures improve the security of log entries? 2. What are the potential challenges in implementing this method in large-scale communication networks?

Frequently Updated Research: Stay updated on advancements in encryption technologies and secure communication protocols for enhanced data protection.


Original Abstract Submitted

systems and methods are provided for use in appending log entries to a data structure. one exemplary method includes receiving, at a communication device, a log entry from a terminal and signing the log entry with a private key of a key pair specific to the communication device. the method also includes transmitting the signed log entry to an identity provider (idp) and receiving, by the communication device, from the idp, a signed, encrypted log entry. the method further includes verifying, by the communication device, a signature of the signed, encrypted log entry based on a public key associated with a key pair specific to the idp and then appending the encrypted log entry to a digital identity included in the communication device.