Patent classifications
G06F21/31
Confidential information identification based upon communication recipient
One embodiment provides a method, including: receiving an indication of an addition of a new participant in a textual communication between at least two existing participants; identifying at least one confidential topic contained within the textual communication by (i) parsing the textual communication and (ii) identifying at least one topic contained within the textual communication; the identifying comprising (i) accessing a confidentiality graph comprising (a) nodes representing participants and (b) edges representing confidential concepts that are acceptable discussion topics between participants connected by a corresponding edge and (ii) determining that an edge corresponding to the at least one confidential topic does not connect the new participant with both of the existing participants; and alerting one of the existing participants that the at least one confidential topic is included in the textual communication to be sent to the new participant.
Secure data broker
The present disclosure is directed to for secure data access between multiple entities, and includes actions of receiving, by a secure file storage system, a set of metafiles including one or more metafiles that define actions to be performed and conditions to be satisfied before granting a first system use of data that is resident at a second system, the set of metafiles being provided by the second system, receiving, by the secure file storage system and from a central exchange, an indication that the actions are performed and the conditions are satisfied for use of the data by the first system, wherein the central exchange accesses the set of metafiles from the secure file storage without accessing the data, and in response to the indication, permitting use of the data by the first system.
Secure data broker
The present disclosure is directed to for secure data access between multiple entities, and includes actions of receiving, by a secure file storage system, a set of metafiles including one or more metafiles that define actions to be performed and conditions to be satisfied before granting a first system use of data that is resident at a second system, the set of metafiles being provided by the second system, receiving, by the secure file storage system and from a central exchange, an indication that the actions are performed and the conditions are satisfied for use of the data by the first system, wherein the central exchange accesses the set of metafiles from the secure file storage without accessing the data, and in response to the indication, permitting use of the data by the first system.
Method and system for securing access to a private key
An asymmetric cryptographic method for securing access to a private key generated and stored in a device is provided. The method includes generating an application password relating to a predetermined level of entropy; generating, within a trusted execution environment relating to a key manager, a user private key secured by using the application password; receiving, from a user via an input device, user entropy relating to a unique identifier for the user; deriving, using a password derivation function, a symmetric key based on the user entropy; encrypting, using an encryption system, the application password by using the symmetric key; and storing, in a memory, a device payload component relating to the application password and the symmetric key in a password management system.
BIOMETRIC IDENTIFICATION PLATFORM
An improved authentication, identification, and/or verification system is provided in various embodiments. The system is provided for use in relation to provisioning access or establishing identity in relation to one or more human users, and may be used in a single site/scenario/system, or across multiple sites/scenarios/systems. A combination of biometric modalities and authentication mechanisms having diverse characteristics are utilized to establish identity, the diverse characteristics being utilized to modify aspects of identity management and access provisioning.
DEVICE AND METHOD FOR AUTHENTICATING A USER OF A FIRST ELECTRONIC DEVICE CONNECTED TO A SECOND ELECTRONIC DEVICE
Authentication of a user of a first electronic device, such as a communication terminal or a virtual or augmented reality headset. The first electronic device is connected to a second electronic device, the first electronic device and the second electronic device being separately portable by the user. The authentication device includes an analyser capable of checking whether a detected value of a relative characteristic parameter of the second electronic device corresponds to a stored value of this relative characteristic parameter of the second electronic device associated with an identifier of a user requiring an authentication, the relative characteristic parameter corresponding to the characteristic parameter of the second electronic device measured relative to the characteristic parameter of the first electronic device.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.
PROTECTED ARTICLE MANAGEMENT
Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.
SYSTEMS AND METHODS FOR USE IN PROVISIONING CREDENTIALS
Systems and methods are provided for provisioning identity credentials based on interactions with verified or trusted users. One exemplary computer-implemented method includes receiving a request for a digital identity from a user, where the request includes identifying information for the user and a verified user identifier, and transmitting, to a verified user associated with the verified user identifier, an attestation request for the user. The method also includes receiving, from the verified user, an attestation in response to the attestation request with regard to at least some of the identifying information for the user, generating a digital identity for the user based on a number of attestations of the identifying information for the user, and sharing a digital identity notice with the user including an identifier for the user, whereby the user is permitted to share the digital identity with a relying party via the identifier.
MULTIPLE FACTOR AUTHENTICATION FOR PORTABLE MEMORY STORAGE SYSTEM
A method of configuring a controller 14 for controlling access to a memory 12 is provided. The controller 14 has a display 18 configured to selectively display a plurality of different input screens, wherein each input screen has a unique code associated therewith and the input screens are for receiving user credentials from a user. The method comprises the steps: a) inputting to the controller 14 a plurality of authentication factors required to access at least a first portion of the memory 12; b) generating, by the controller 14, a first encryption key for encrypting data stored on the first portion of the memory 12; c) displaying a first input screen at the display 18; d) entering first user credentials to the first input screen and storing the first user credentials as a first factor of authentication; e) displaying a second input screen at the display 18; f) entering second user credentials to the second input screen and storing the user credentials as a second factor of authentication; g) encrypting the code for the second input screen using the first user credentials; and h) encrypting the first encryption key using at least one of the user credentials. A method of gaining access to the memory 12 is also provided in which the code for each subsequent input screen is decrypted using user credentials provided at the previous input screen. A method of authenticating a user and a device configured according to the method are also disclosed.