H04L2463/102

Method, user terminal, and service terminal for processing service data

A service terminal, which is communicatively coupled to a remote server, works with an offline user terminal to complete a service request initiated by a user of the user terminal. The service terminal repeatedly broadcasts a service message to neighboring user terminals until after receiving a service purchase request message wirelessly transmitted from a user terminal. The service terminal then suspends the broadcast of the service message and communicates the service purchase request to the remote server and receives a purchase confirmation message from the remote server. Next, the service terminal wirelessly transmits the purchase confirmation message back to the user terminal. From reading the purchase confirmation message, a user of the user terminal can tell whether the service purchase request has been completed successfully or not. If not, the service terminal then resumes the broadcast of the service message until after receiving another service purchase request message.

DEPLOYING A SECOND SMART CONTRACT BASED ON A FIRST SMART CONTRACT

A network node that includes at least one processor, at least one memory, and at least one network interface. The network node is configured to be within a plurality of network nodes communicatively coupled in a peer-to-peer network of network nodes implementing a distributed ledger. The network node is communicatively coupled to at least one remotely located computing device through the at least one network interface. The at least one processor is configured to deploy a second smart contract at a second address on the distributed ledger; set an address field in the first smart contract to reference the second address; subtract a particular number of tokens from a first respective value corresponding to a first respective address in the first table of balances; and add the particular number of tokens to a second respective value corresponding to the second address in the first table of balances.

Network authentication method for secure electronic transactions
09838205 · 2017-12-05 · ·

In a network authentication method, a client device stores a reference first private key portion obtained by encrypting a first private key portion of a private key. The private key and a public key cooperatively constitute an a symmetric key pair. After receipt of a second private key portion of the private key, the client device generates a digital signature for transaction data using a current key which combines the second private key portion and a current key portion obtained by decrypting the reference first private key portion. A verification server verifies, based on the public key, whether a received digital signature is signed with the private key, and obtains the transaction data when verification result is affirmative.

USING PROOF OF PURCHASE FOR MULTIFACTOR AUTHENTICATION

Multifactor authentication techniques described herein may allow a user to submit a recent proof of purchase as a part of a multifactor authentication process to access an account associated with a financial institution. As part of the login process, the user may submit a proof of purchase associated with a transaction. The financial institution may determine information associated with the transaction, such as a merchant associated with the proof of purchase, a time of the transaction, the last four numbers of the transaction card used, a dollar amount, or any combination thereof. If the information matches one or more records in the transaction history of the user's account, the financial institution may authenticate the user and provide access to the account. In this way, the financial institution may leverage transaction history known to the financial institution and the user to authenticate the user.

Method and system for preventing unauthorized processor mode switches
11675934 · 2023-06-13 · ·

Disclosed embodiments relate to a system having a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules.

AUTHENTICATION APPARATUS UTILIZING PHYSICAL CHARACTERISTIC
20170346800 · 2017-11-30 ·

An authentication apparatus includes: a combination information generator that generates first combination information indicating a combination of physical characteristics of at least two of first elements included in a first semiconductor device; a group identification information generator that generates first group identification information based on the combination of the physical characteristics of the at least two of the first elements, the first group identification information being for identifying the first semiconductor device as belonging to a same group as another semiconductor device manufactured in a same process; a transmitter that transmits the first combination information to an authentication partner; a receiver that receives second group identification information that the authentication partner generates in accordance with the first combination information; and an information verifier that compares the first group identification information with the second group identification information.

IC chip, information processing apparatus, system, method, and program

An IC chip, an information processing apparatus, system, method, and program are provided. An IC chip includes an authentication control unit configured to authenticate a request using authentication information. The request and/or the authentication information is received from outside the IC chip.

Secure authorization and transmission of data between trustless actors

One or more aspects described herein provide methods and systems for authoritatively confirming that a recipient is an intended recipient to receive personal data, and to securely transmit the personal data to the intended recipient, when both the sender and receiver are operating in a trustless ecosystem such as that used with blockchain technology. A computing device may receive an indication of a blockchain address used, by a sender computing device and via a blockchain, to send one or more virtual assets. The computing device may store an association between the blockchain address and the recipient. The computing device may send, to the sender computing device and in response to a query comprising the blockchain address, an indication of the recipient. The indication may be configured to cause the sender computing device to send, to the recipient, personal data associated with an owner of the one or more virtual assets.

DIGITAL WALLET AS A RELYING PARTY IN A DECENTRALIZED NETWORK
20230177487 · 2023-06-08 ·

A request is generated for verifiable claims that are related to services that a user is to provide to an entity that requests the services from the user. The request for the services is then provided to the requesting entity. The requested verifiable claims are then received from the requesting entity and are verified to determine that they are valid. If the received verifiable claims are valid, the user is authorized to provide the services to the requesting entity.

SYSTEMS AND METHODS FOR CARD INFORMATION MANAGEMENT
20220368679 · 2022-11-17 ·

Example embodiments of systems and methods for replacing card information. In an embodiment, a system comprises an authentication server in data communication with a network and a database in data communication with the authentication server. The authentication server is configured to receive an authentication signal from a user device via the network, retrieve a list of merchants having transaction history with an account associated with the account card, and transmit an access token to at least one merchant server selected using the list of merchants.