Patent classifications
G06F2221/2115
ACCESS CONTROL SYSTEM AND METHOD THEREOF
The present invention provides a robust and effective solution to an entity or an organization for fully ensuring people and property security by designing and developing an intelligent access control system (ACS) that can provide a smart, swift and simplified user authentication and authorization mechanism. This proposed system may be an event-driven system. A plurality of events such as location-centric, people-inspired, unplanned, and the like can be captured and acted upon by using artificial intelligence along with an adaptive control system.
Methods for verifying database query results and devices thereof
Methods, non-transitory computer readable media, and query verification apparatuses are disclosed that receive data, store the data into a table of a database, and receive a query that is associated with the database table. A query plan and a query result are generated for the query, one or more partial proofs are generated from one or more commitments, and an overall proof is generated from the one or more partial proofs. Each of the one or more partial proofs is associated with at least one node of the query plan in some examples, which can include a directed acyclic graph. The overall proof is returned along with the query result in response to the query to facilitate verification of the query result. One or more GPUs are configured to generate the one or more commitments in some examples to thereby accelerate the verification process and improve database scalability.
TECHNIQUES FOR USER ACCOUNT AND DATA RECOVERY
This Application sets forth techniques for establishing a custodial relationship between a user device and a custodian device for recovering access to a user account and/or to encrypted user data with assistance provided by the custodian device to effect access recovery. A server of a cloud network service provides an anonymous identifier to associate with the custodian device and an account recovery key to store at the custodian device. Identity of an account of the cloud network service associated with the custodian device can be hidden from the server. The user device generates a data recovery key and provides a first portion of the data recovery key to the custodian device and a second portion of the data recovery key to the server. Integrity of the stored account recovery key and portions of the data recovery key are checked regularly by the custodian device and the user device.
System, method and architecture for secure sharing of customer intelligence
A key master service capable of operating on a service provider in a network enables is disclosed. The key master enables authorized parties to securely exchange client information without compromising client security. One feature of the key master service is the generation of a unique key for each client. All parties in an authorized universe access, exchange and modify client information by referencing the universal key, rather than using known client identifiers. Client information is further secured by advantageously applying an obfuscation function to the data. Obfuscated client information is stored together with the universal key as keyed client data at the client and/or server, where it may be directly accessed by the service provider or third parties. Because client information is stored and exchanged without the ability to discern either the client identity or the nature of the information, such information is secured against malicious third-party interception.
Detecting and patching network vulnerabilities
Embodiments of the present invention disclose a method, a computer program product, and a computer system for a drone-based network vulnerability detection system. According to embodiments of the present invention, a drone receives routes and protocols for detecting and resolving network vulnerabilities. The drone identifies one or more electronic devices connected to one or more networks within an area of interest and detects one or more network vulnerabilities of the one or more electronic devices. If the drone detects a vulnerability, the drone updates a command center and identifies a resolution to the one or more network vulnerabilities. The drone then resolves the one or more network vulnerabilities based on the identified resolution.
ENCRYPTED COMMUNICATION METHOD AND ELECTRONIC DEVICE
An encrypted communication method is applied in a first electronic device, which includes a first processor communicating through encrypted channel of first Bluetooth, and a second processor communicating through unencrypted channel of second Bluetooth. The method includes: receiving, by the first processor, a key transmitted from a second electronic device, and transmitting the key to the second processor, the key being transmitted from the second electronic device to the first processor through the encrypted channel of the first Bluetooth; receiving, by the second processor in response to the first electronic device being switched to a system run by the second processor, a first ciphertext transmitted from the second electronic device, the first ciphertext being transmitted from the second electronic device to the second processor through the unencrypted channel of the second Bluetooth; and decrypting, by the second processor, the first ciphertext with the key to obtain the first plaintext.
Method and system for self-sovereign information management
The present teaching relates to method, system, medium, and implementation for secure data management by a service provider. A request is first received for carrying out a transaction with a user and one or more data items associated with the user are then determined that need to be validated prior to the transaction. A request is then sent to the user seeking to validate the one or more data items. When a cloaked identifier is received from the user with information related to a trusted party, the cloaked identifier is then sent to the trusted party with a request for a validation response. When the validation response is received with an indication that the one or more data items are validated, the transaction with the user is carried out.
Automation of workloads involving applications employing multi-factor authentication
A robotic process automation (RPA) system provides bots that interact with and provide user credentials to applications that require multi-factor authentication (MFA). First user credentials associated with MFA are retrieved by the bots from credential storage. Second user credentials that correspond to questions posed to a user of an application are retrieved from credential storage. Second user credentials that correspond to a one-time password are generated by the RPA system. The second user credentials may also be generated by a third-party authentication service that provides the credentials via a secondary channel such as email or SMS, which are then retrieved for presentation to the application.
AUTHENTICATION DEVICE AND AUTHENTICATION SYSTEM
According to an embodiment, an authentication device includes an apparatus main body interface, a memory, a biosensor, and a processor. The apparatus main body interface communicates with an apparatus main body controlling a locking mechanism. The memory stores therein biological information of a registrant. The biosensor acquires biological information The processor transmits information that an operator has been authenticated as the registrant with the biological information to the apparatus main body and controlles the locking mechanism, when the processor determines that the biological information acquired with the biosensor and the biological information of the registrant are pieces of biological information of the same person.
NOVEL DATA EXCHANGE SYSTEM AND METHOD FOR FACILITATING A NETWORK TRANSACTION
The invention discloses a method and system for exchanging data between users using a transaction phrase, comprising: composing a data package by a source, uploading the data package onto a server, receiving a transaction phrase associated solely with the data package generated from a dictionary database utilized by the server, communicating the transaction phrase by the source to a recipient, requesting the data package by the recipient using the phrase, and receiving the data package from the server to the recipient if the parameters allow. The invention also details a financial aspect wherein a payment dialogue is initiated on the recipient interface allowing the recipient to complete a payment through a merchant server. Another embodiment comprises receiving a payment by the recipient upon submitting the transaction phrase to the server. The invention also envisions allowing the source to create a source account before composing the data package.