G06F21/40

Secret distribution among storage devices
11706024 · 2023-07-18 · ·

In a storage system that includes a plurality of storage devices configured into one or more write groups, quorum-aware secret sharing may include: encrypting a device key for each storage device using a master secret; generating a plurality of shares from the master secret such that a minimum number of storage devices required from each write group for a quorum to boot the storage system is not less than a minimum number of shares required to reconstruct the master secret; and storing the encrypted device key and a separate share of the plurality of shares in each storage device.

SYSTEMS AND METHODS FOR USING HAPTIC VIBRATION FOR INTER DEVICE COMMUNICATION

The present disclosure relates to systems and methods for using haptic vibration for inter-device communication. In one implementation, a system for inter-device communication using haptic vibration may include at least one force gauge configured to measure displacements caused by an external device in contact with the at least one force gauge; at least one memory storing instructions; and at least one processor configured to execute the instructions to: receive an identifier associated with a user; retrieve a pattern associated with the received identifier; receive, from the at least one force gauge, one or more measurements over a period of time; assess a degree of difference between the received one or more measurements and the retrieved pattern; and, when the degree of difference is below a threshold, authenticate the user.

USER AUTHENTICATION, FOR ASSISTANT ACTION, USING DATA FROM OTHER DEVICE(S) IN A SHARED ENVIRONMENT
20230223031 · 2023-07-13 ·

Implementations set forth herein relate to an automated assistant that can solicit other devices for data that can assist with user authentication. User authentication can be streamlined for certain requests by removing a requirement that all authentication be performed at a single device and/or by a single application. For instance, the automated assistant can rely on data from other devices, which can indicate a degree to which a user is predicted to be present at a location of an assistant-enabled device. The automated assistant can process this data to make a determination regarding whether the user should be authenticated in response to an assistant input and/or pre-emptively before the user provides an assistant input. In some implementations, the automated assistant can perform one or more factors of authentication and utilize the data to verify the user in lieu of performing one or more other factors of authentication.

SYSTEMS AND METHODS FOR MANAGING CRYPTOCURRENCY

A system for managing and using digital financial assets, such as cryptocurrency uses multiple independent devices that mutually cooperate to control cryptocurrency assets in a secure manner. Each of these devices may store a unique private key associated with the cryptocurrency assets, which may be configured such that a certain minimum number of these private keys are required to transfer the cryptocurrency assets. The use of multiple private keys spread across multiple distinct devices may reduce the likelihood of loss stemming from a hardware failure or reduce the likelihood of an attacker successfully gaining access to the cryptocurrency assets. In addition, selection of the devices to be used for storing these private keys, as well as how many private keys are required to authorize a transaction, may be tailored to balance a user's preferences for reliability of access versus security and for third-party custody versus self-custody.

Secure multi-factor tokenization-based sub-cryptocurrency payment platform

Example methods, apparatuses, and systems are presented that allows a consumer to conduct a purchase backed by a volatile currency that is not recognized by a merchant as a valid form of payment, such as a cryptocurrency. A third-party payment system is configured to issue a secure, reliable token to replace a reserved amount of volatile currency that represents a reliable amount of currency that is recognized by the merchant as a valid form of payment. The third-party payment platform may issue the reliable amount of currency in the reliable token based on one or more risk factors associated with the volatile currency. After purchase, the third-party payment platform may perform a consumer settlement process at a later time, including performing a cryptocurrency blockchain verification process that typically takes at least several minutes and would be impractical to perform at the point of sale.

Secure multi-factor tokenization-based sub-cryptocurrency payment platform

Example methods, apparatuses, and systems are presented that allows a consumer to conduct a purchase backed by a volatile currency that is not recognized by a merchant as a valid form of payment, such as a cryptocurrency. A third-party payment system is configured to issue a secure, reliable token to replace a reserved amount of volatile currency that represents a reliable amount of currency that is recognized by the merchant as a valid form of payment. The third-party payment platform may issue the reliable amount of currency in the reliable token based on one or more risk factors associated with the volatile currency. After purchase, the third-party payment platform may perform a consumer settlement process at a later time, including performing a cryptocurrency blockchain verification process that typically takes at least several minutes and would be impractical to perform at the point of sale.

SYSTEMS AND METHODS FOR TWO-FACTOR AUTHENTICATION USING VIBRATION
20220414202 · 2022-12-29 · ·

A two-factor authentication system includes a mobile device having a vibration element configured to generate a vibration sequence based on a unique vibration code received by the mobile device. A two-factor authentication server is communicatively coupled to the mobile device and is configured to send the unique vibration code to the mobile device in response to the two-factor authentication server receiving a two-factor authentication request. A vibration receiver is configured to support the mobile device and communicatively coupled to the two-factor authentication server. The vibration receiver includes a vibration sensor configured to detect the vibration sequence generated by the mobile device based on the unique vibration code and generate a vibration authentication signal based on the detected vibration sequence. the two-factor authentication server is configured to receive the vibration authentication signal generated by the vibration receiver and authenticate the two-factor authentication request based on the received vibration authentication signal.

SYSTEMS AND METHODS FOR TWO-FACTOR AUTHENTICATION USING VIBRATION
20220414202 · 2022-12-29 · ·

A two-factor authentication system includes a mobile device having a vibration element configured to generate a vibration sequence based on a unique vibration code received by the mobile device. A two-factor authentication server is communicatively coupled to the mobile device and is configured to send the unique vibration code to the mobile device in response to the two-factor authentication server receiving a two-factor authentication request. A vibration receiver is configured to support the mobile device and communicatively coupled to the two-factor authentication server. The vibration receiver includes a vibration sensor configured to detect the vibration sequence generated by the mobile device based on the unique vibration code and generate a vibration authentication signal based on the detected vibration sequence. the two-factor authentication server is configured to receive the vibration authentication signal generated by the vibration receiver and authenticate the two-factor authentication request based on the received vibration authentication signal.

Transport related n-factor authentication

An example operation includes one or more of determining, via a transport, that a person seeks access to the transport, visually indicating, via the transport, an action for the person to perform, receiving, via the transport, the action and validating, via the transport, that the person is associated with the transport, based on the receiving.

Transport related n-factor authentication

An example operation includes one or more of determining, via a transport, that a person seeks access to the transport, visually indicating, via the transport, an action for the person to perform, receiving, via the transport, the action and validating, via the transport, that the person is associated with the transport, based on the receiving.