G06F2221/2151

SECURING DATA STORED IN A MEMORY OF AN IOT DEVICE DURING A LOW POWER MODE
20210182435 · 2021-06-17 ·

The disclosure relates to a method for enabling the secure functions of a chipset (1) and especially the encryption of the content of the secure memory (7) when the device goes into low power mode. The content of the secure memory (7) may be encrypted and stored in an external memory (20) during low power mode of the chipset (1).

LOCATION-BASED INFORMATION EXCHANGE BETWEEN PHYSICALLY PROXIMATE USERS
20210173943 · 2021-06-10 ·

The present invention includes a wireless communication method and device comprising a one-to-one exchange of wireless electronic device identifications or unique profile IDs between a sending and a receiving party who are both registered users of the electronic business/personal card service and further comprising upload of the wireless electronic identifications to a data server computer system wherein said system matches said identifications with those of registered users and said computer system displays information about the user associated with each identification.

METHOD AND SYSTEM FOR STAKE-BASED EVENT MANAGEMENT WITH LEDGERS
20210286878 · 2021-09-16 ·

A trust-less system for sharing event information among autonomous nodes may include: a plurality of autonomous nodes, each of which creates an event related to a condition, a first ledger configured to collect and store a record of each event; a second ledger configured to store reputation information for the plurality of autonomous nodes; and a bookmaker module operable to determine a reward and a penalty for each event. The bookmaker module may be operable to modify the reputation information based on a status of the condition determined by subsequent events created by autonomous nodes where the subsequent events either validate or invalidate the condition.

Identifying copyrighted material using embedded timestamped copyright information
11036834 · 2021-06-15 · ·

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying copyrighted material based on embedded copyright information. One of the methods includes generating, by a computing device, a timestamp indicating a time at which an update to a text segment within the textual content is performed to provide an updated text segment; generating, by the computing device, a unique identifier (ID) based on the timestamp and copyright information associated with the textual content, wherein the timestamp, the textual content, the updated text segment, and the copyright information are recorded on a blockchain of a blockchain network; and embedding, by the computing device, the unique ID in at least a portion of the updated text segment to provide an information-embedded updated text segment that enables retrieval of the copyright information associated with the updated text segment from the blockchain based on the unique ID.

PREVENTING DIGITAL FORGERY
20210264044 · 2021-08-26 ·

A set of security templates is maintained including first and second templates. The first template specifies time and location stamp authentication for a file, and contextual security conditions that must be met before the file can be accessed. The second template specifies the time and location stamp authentication, but not the contextual security conditions. One of the first or second security templates is applied to the particular file. When the second security template is applied, a GPS-crypto device adds a time and location stamp to the particular file. The particular file is signed using a private key associated with the GPS-crypto device to generate an authentication signature based on the time and location stamp. The authentication signature is added to the particular file to allow a recipient to verify the time and location stamp of the particular file using a public key corresponding to the private key.

Continuous authentication based on motion input data

Disclosed is a method for continuously authenticating a user based on motion input data. The method includes recording motion input data from a keyboard such as starting coordinates, ending coordinates, and timestamps of key-up actions to determine that a key has been pressed, recording a timestamp of motion input at the starting coordinate, mapping the timestamp of said motion input at the starting coordinate to a key-down action for the key press, determining which key of said virtual keyboard said key-down action refers to, and granting or denying access to a device if the timing of the key which was pressed and released in the key-down action and the corresponding key-up action matches the press and flight timing of a key which was pressed and released in a previously-recorded key-down action and a previously-recorded key-up action.

Index creation for data records

A computer-implemented index creation method includes obtaining, by a server storing data in a blockchain ledger, an identifier, in which the identifier identifies an attribute value of a data record; determining location information of the data record in the blockchain ledger, in which the location information includes a block height of a data block in which the data record is located and an offset of the data record in the data block; and writing the location information into an index, in which the index stores a correspondence between the location information and the attribute value, the attribute value being used as a primary key in the index.

SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION

Disclosed herein are systems and methods for continuous user authentication during access of a digital service. In an exemplary aspect, a continuous authentication module may receive, at a computing device, initial authentication credentials of the user. The initial authentication credentials enable access to a service via the computing device. While the service is being accessed, the continuous authentication module may continuously monitor whether an unauthorized user has replaced the user in accessing the service by comparing usage attributes of the service with historic usage attributes associated with the user. In response to determining that the unauthorized user has replaced the user, the continuous authentication module may cease the access to the service via the computing device.

Verifiable redactable audit log

A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

Method for the secure interaction of a user with a mobile terminal and a further entity
11017062 · 2021-05-25 · ·

A method for the secure interaction of a user with a mobile terminal and a further entity includes transmitting a secret or an image of the secret generated by a one-way function and an individual data from the user to a back-end, transmitting the image and the individual data from the back-end to a protected execution environment of a processor of the mobile terminal; notifying the user on a secure user interface of the mobile terminal, wherein the individual data is displayed to the user and wherein the user is authenticated with the secret, the user interacting with a secure element of the mobile terminal having a secure connection with the protected execution environment, via the secure user interface and the protected execution environment; and the secure element interacting with the further entity via a secured connection providing a complete security chain of all entities involved in the interaction.