Patent classifications
H04L2463/121
TOKEN NODE LOCKING WITH FINGERPRINTS AUTHENTICATED BY DIGITAL CERTIFICATES
A system and method for receiving secure data in a client device. In one embodiment, the method comprises (a) receiving a token having a token ID and a digital certificate generated by a certificate authority (CA) having client device fingerprint data generated from client device parameters, (b) accepting a request in the client device to provide secure data to the client device, (c) regenerating the client device fingerprint data from the client device parameters, (d) determining, in the client device, differences between the client device fingerprint data of the digital certificate from the regenerated client device fingerprint data, and (e) transmitting a request to a secure data service to provide secure data based upon the determination.
Systems and methods for fraud detection and prevention
Systems and methods for fraud detection and prevention is disclosed. The system may receive a transaction request for a first customer including a transaction location, transaction time stamp, and merchant type code. The system may determine whether the transaction location is expected for the first customer. When the transaction location is unexpected, the system may identify a last-known video detection having a last-known time stamp and last-known location. The system may determine a travel time estimate between the last-known location and the transaction location and determine a buffer based on the merchant type code. The system may compare the travel time estimate to an allotted time that includes a difference between the transaction time stamp and last-known time stamp less the buffer. When the travel time estimate exceeds the allotted time, the system may execute one or more fraud prevention steps.
Information security system and method for secure data transmission among user profiles using a blockchain network
A system for transmitting data objects among user profiles receives a request to transmit a particular number of a first type of data object to a receiver profile. The system determines whether a sender profile is associated with the particular number of the first type of data object. In response to determining that the sender profile is not associated with the particular number of the first type of data object, the system identifies one or more other types of data objects that correspond to the particular number of the first type of data object. The system initiates a user interaction session. The system generates a block within a blockchain network to store user interaction session metadata. The system transmits the identified one or more other types of data objects to the receiver profile. The system stores, in the block, a completion token that indicates the user interaction session is completed.
Multi-level user device authentication system for internet of things (IoT)
The present invention describes the user authentication system comprising of multiple levels of security which is used to authorize the user. The system uses more than one levels of authentication process which receives the credentials from the user and authorizes them to allow access to the IoT devices which are used by the user. The connected devices represent individual targets for the cyber-criminals who 20 would hack the devices to retrieve the secure information of the users. Such insecurities about the IoT devices and the system are eliminated by using the multiple level user authentication system which is described in the present invention.
Information processing apparatus, for storing consensus information among copyright holders in a blockchain
An information processing apparatus, an information processing method, and an information processing program configured to manage the copyright-related information of content appropriately. The information processing apparatus includes control circuitry to acquire, when there is a plurality of copyright holders relating to one piece of content, consensus information indicating an agreement on a share of respective copyrights of the plurality of copyright holders, and create a transaction for recording the acquired consensus information on a blockchain system.
AUTHENTICATED INTERFACE ELEMENT INTERACTIONS
- James R. Montgomerie ,
- Jessica ARANDA ,
- Patrick Coffman ,
- Julien Freudiger ,
- Matthew H. Gamble ,
- Ron Huang ,
- Anant JAIN ,
- Glen S. LOW ,
- Andrey Pokrovskiy ,
- Stephen J. Rhee ,
- Matthew E. Shepherd ,
- Ansh Shukla ,
- Katherine Skinner ,
- Kyle M. SLUDER ,
- Christopher Soli ,
- Christopher K. Thomas ,
- Guy L. Tribble ,
- John WILANDER
An access control system is provided to prevent the surreptitious granting of access to privacy related functionality on an electronic device. Software-based events to grant access to device functionality can be validated by confirming that the software event corresponds with a hardware input event. This validation prevents the spoofing of a user interface input that may be used to fraudulently grant access to specific functionality.
TECHNIQUES FOR DATA RETRIEVAL USING CRYPTOGRAPHIC SIGNATURES
A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.
INTERNET OF THINGS SECURITY ANALYTICS AND SOLUTIONS WITH DEEP LEARNING
Embodiments may provide robust defenses for IoT devices against criminal actions, such as the theft of information and invasion of privacy. A method of detecting anomalous network traffic may perform monitoring an operational IoT network to obtain network traffic data representing events occurring in the monitored operational IoT network, extracting data relating to a plurality of features of the events from the obtained network traffic data, training a machine learning model to classify the events using the extracted data relating to a plurality of features, monitoring additional operation of the operational IoT network to obtain additional network traffic data in the monitored operational IoT network and extracting additional data relating to a plurality of features of the additional events, classifying the additional events using the extracted additional data relating to a plurality of features, and detecting an anomalous event based on the classification of the additional events.
Determining trusted file awareness via loosely connected events and file attributes
Disclosed in some examples are methods, systems, devices, and machine-readable mediums which monitor for file system element transfers to and from both the endpoint and authorized accounts on network-based service providers (e.g., cloud-based storage). The system uses the capabilities of monitoring both the network-based service and the client computing device to filter out legitimate uploads to authorized network-based services and legitimate downloads to authorized computing devices. By matching events, it filters out events that are likely legitimate, the system may provide more accurate information, notifications, awareness, and unmatched event indications.
Graph-based intrusion detection using process traces
Methods and systems for detecting malicious processes include modeling system data as a graph comprising vertices that represent system entities and edges that represent events between respective system entities. Each edge has one or more timestamps corresponding respective events between two system entities. A set of valid path patterns that relate to potential attacks is generated. One or more event sequences in the system are determined to be suspicious based on the graph and the valid path patterns using a random walk on the graph.