H04L63/12

System and method for dynamically orchestrating application program interface trust
11526928 · 2022-12-13 · ·

A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.

MULTIFACTOR AUTHENTICATION USING BLOCKCHAIN TRANSACTIONS
20220393871 · 2022-12-08 ·

A method of providing credentials to enable a second party to verify an identity of a first party. The first party is associated with a first public key which is registered with a third party. One or more first credentials are provided to the second party. A request transaction is obtained, which comprises a) an input comprising a signature generated based on a respective private key of the third party, and b) an output locked to a second public key of the first party. The second public key is based on the first public key. A confirmation transaction is generated. The confirmation transaction comprises an input that references the output of the request transaction, and a signature generated based on a private key corresponding to the second public key of the first party. The confirmation transaction is transmitted to nodes of a blockchain network for inclusion in a blockchain.

SECURELY AND RELIABLY TRANSMITTING MESSAGES BETWEEN NETWORK DEVICES
20220393856 · 2022-12-08 ·

The present disclosure relates to systems for generating network packets that facilitate reliable and secure transmission of data between computing devices. For example, systems described herein involve generating a network packet in which a transport layer and security layer are implemented within an authentication header of the network packet. Information from the authentication header may be evaluated by a receiving device using a security key to compute an integrity check vector and an initialization vector to determine that a network packet has been provided in a correct order as well as check against a variety of security threats.

STREAMING FRAUD DETECTION USING BLOCKCHAIN

Systems and methods for detecting fraudulent streaming activity. Streaming activity is posted to a blockchain by one or more DSPs. Blockchain streaming data is extracted from the blockchain and used as input in a machine learning model. The machine learning model takes the extracted blockchain data, along with additional inputs such as DSP trend pool and social pool inputs, and makes a determination regarding potentially fraudulent streaming activity.

CONTEXTUAL CONTROL OF DIGITAL FILES BUILT ON THE BLOCKCHAIN & PROJECTED IN AUGMENTED REALITY
20220392176 · 2022-12-08 ·

Provided is a process including: identifying, with a computing system, a blockchain-based token mapped to an asset configured to be presented in an augmented reality application; obtaining, with the computing system, contextual information indicative of a physical context of a physical geolocation of a display upon which the augmented reality application is to present the asset; causing, with the computing system, visual attributes or audio attributes of the asset to be determined based on the contextual information; and causing, with the computing system, the asset to be presented with the display according to the visual attributes or the audio attributes.

PLAGIARISM DETECTION FROM ENCRYPTED DOCUMENTS

An example operation may include one or more of receiving a request to verify a first encrypted document from a computing device, retrieving a second set of encrypted tokens of a second encrypted document from a blockchain, determining a similarity value of the first encrypted document with respect to the second encrypted document based on a first set of encrypted tokens in the first encrypted document and the second set of encrypted tokens in the second encrypted document, and outputting the determined similarity value to the computing device in response to the request.

Radio access nodes and terminal devices in a communication network

According to an exemplary embodiment, there is provided a method of operating a terminal device. The method includes operating the terminal device in a connected state with respect to the communication network. The method further includes receiving a first signal from a first radio access node in the communication network indicating that the connected state is to be suspended, the first signal having information for use in determining a first key for encrypting data to be sent between the terminal device and the first radio access node or another radio access node in the communication network if the connected state is resumed.

Systems and methods for block chain authentication
11522711 · 2022-12-06 · ·

A system for providing secure authentication between a service provider and at least one user device having a storage. The system having a processor managed by the service provider, which processor manages authentication between the at least one device and the service provider. The processor is configured to generate a block including at least user account information upon receipt of an authentication request from the at least one device; apply a cryptographic hash function to the block to create a hash; transmit the hash to the at least one device for storage in the memory of the at least one device; and upon receipt of the hash, validate the hash prior to providing access to the service provider.

Methodology for trustworthy software build
11520902 · 2022-12-06 · ·

A certificate-based methodology is used to establish the trustworthy relationship between source codes and produced binary files for a given software build. The trustworthy relationship between the source code and binary files is generated by recording build information during building of the source code. The build information may include build environment information, framework information, source files identification, intermediately generated files information, final binary files information, file operations during building of the source code, and/or commands/operations during building of the source code. A certificate is generated using the build information for establishing a relationship between the source code and a binary file created from the source code, and the certificate is signed with a public cryptographic key. A software release package is provided to the recipient including at least the source code, final binary files generated from the source code, and the certificate.

Method and system for publicly verifiable proofs of retrievability in blockchains
11522706 · 2022-12-06 · ·

A method for securing a blockchain and incentivizing the storage of blockchain data using a publicly verifiable proof of retrievability (PoR) includes receiving a PoR transaction having a PoR proof, determining whether the PoR proof is a verified PoR proof, and based upon determining that the PoR proof is a verified PoR proof, incorporating, by a block creator node, the PoR transaction into a new block of the blockchain.