The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 28, 2021

Filed:

Jul. 01, 2019
Applicant:

Capital One Services, Llc, McLean, VA (US);

Inventors:

Kevin Osborn, Newton, MA (US);

Srinivasa Chigurupati, Long Grove, IL (US);

William Duane, Westford, MA (US);

Assignee:

Capital One Services, LLC, McLean, VA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06Q 20/38 (2012.01); G06Q 20/40 (2012.01); G06Q 20/34 (2012.01); H04L 9/14 (2006.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06Q 20/3829 (2013.01); G06Q 20/352 (2013.01); G06Q 20/401 (2013.01); H04L 9/085 (2013.01); H04L 9/14 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01);
Abstract

Example embodiments provide systems and methods for increasing the cryptographic strength of an encryption or message-authentication-code-(MAC) generation technique. According to some embodiments, a MAC may be constructed around a shared secret (such as a random initialization number), thereby increasing strength of the MAC against brute force attacks based on the size of the shared secret. The MAC may be combined with randomized data, and may also be encrypted to further bolster the strength of the code. These elements (shared secret, MAC algorithm, and encryption algorithm) may be employed in various combinations and to varying degrees, depending on the application and desired level of security. At each stage, the cryptographic construct operates on the cyptographically modified data from the previous stage. This layering of cryptographic constructs may increase the strength of the group of contrasts more efficiently than applying any one construct with a larger key size or similar increase in complexity.


Find Patent Forward Citations

Loading…