G06F21/33

Login token management

Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.

Login token management

Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.

Method, computing unit and system for token-based information exchange

A method, a computing unit and a system for token-based information exchange between a computing unit of a first entity (400A) and a computing unit of one second entity (400B) are presented. The method comprises obtaining (110) a token set (200A) associated with the first entity (400A) and a token set (200B) associated with the one second entity (400B), clustering (120) the token set (200A) associated with the first entity (400A) into clusters, requesting (130) information on tokens (205, 205A, 205B) from the computing unit of the one second entity (400B), receiving (140) information on said tokens (205, 205 A, 205B) from the computing unit of the one second entity (400B), determining (150) an active cluster associated with the first entity (400A), modifying (160) the token subset (310, 320) associated with the determined active cluster of the first entity (400A) at least partly with information on the received tokens (205, 205A, 205B) associated with the second entity (400B).

Method, computing unit and system for token-based information exchange

A method, a computing unit and a system for token-based information exchange between a computing unit of a first entity (400A) and a computing unit of one second entity (400B) are presented. The method comprises obtaining (110) a token set (200A) associated with the first entity (400A) and a token set (200B) associated with the one second entity (400B), clustering (120) the token set (200A) associated with the first entity (400A) into clusters, requesting (130) information on tokens (205, 205A, 205B) from the computing unit of the one second entity (400B), receiving (140) information on said tokens (205, 205 A, 205B) from the computing unit of the one second entity (400B), determining (150) an active cluster associated with the first entity (400A), modifying (160) the token subset (310, 320) associated with the determined active cluster of the first entity (400A) at least partly with information on the received tokens (205, 205A, 205B) associated with the second entity (400B).

Partitioned platform security mechanism

A computer platform is disclosed. The computer platform comprises a central processing unit (CPU) including at least one socket having a plurality of tiles and control circuitry to partition the socket into a plurality of sub-sockets and assign a unique identity to each of the plurality of sub-sockets for security verification, wherein each sub-socket comprises at least one of the plurality of tiles to operate as a cluster of resources.

Partitioned platform security mechanism

A computer platform is disclosed. The computer platform comprises a central processing unit (CPU) including at least one socket having a plurality of tiles and control circuitry to partition the socket into a plurality of sub-sockets and assign a unique identity to each of the plurality of sub-sockets for security verification, wherein each sub-socket comprises at least one of the plurality of tiles to operate as a cluster of resources.

ENABLING A FUNCTION OF AN APPLICATION BASED ON A CHARACTERISTIC OF A USER DEVICE
20230004629 · 2023-01-05 ·

In some implementations, a user device may receive, from a user of the user device, a request to initiate an application session that is associated with an application. The user device may provide, to a server device based on receiving the request, an optical code associated with the server device establishing the application session. The user device may output the optical code via an output component. The user device may receive, from the server device, a notification that an agent device has joined the application session via a scan of the optical code from the output component. The user device may enable a function of the application based on the notification indicating that the agent device is capable of facilitating a service via the application session, wherein the service is associated with the function.

AUTHENTICATION TO MEDICAL DEVICE VIA MOBILE APPLICATION
20230005592 · 2023-01-05 · ·

A medical system, device, and methods are provided having programming to communicate with a mobile device; the medical device further having programming to authenticate the mobile device; the medical device granting access to one or more functions if the mobile device is authenticated.

Secure session capability using public-key cryptography without access to the private key

A first server receives a set of cryptographic parameters from a second server. The set of cryptographic parameters is received from the second server as part of a secure session establishment between a client device and the second server. The first server accesses a private key that is not stored on the second server. The first server signs the set of cryptographic parameters using the private key. The first server transmits the signed set of cryptographic parameters to the second server. The first server receives, from the second server, a request to generate a premaster secret using a value generated by the second server that is included in the request and generates the premaster secret. The first server transmits the premaster secret to the second server for use in the secure session establishment between the client device and the second server.

Secure multi-factor tokenization-based sub-cryptocurrency payment platform

Example methods, apparatuses, and systems are presented that allows a consumer to conduct a purchase backed by a volatile currency that is not recognized by a merchant as a valid form of payment, such as a cryptocurrency. A third-party payment system is configured to issue a secure, reliable token to replace a reserved amount of volatile currency that represents a reliable amount of currency that is recognized by the merchant as a valid form of payment. The third-party payment platform may issue the reliable amount of currency in the reliable token based on one or more risk factors associated with the volatile currency. After purchase, the third-party payment platform may perform a consumer settlement process at a later time, including performing a cryptocurrency blockchain verification process that typically takes at least several minutes and would be impractical to perform at the point of sale.