H04L2463/121

PHYSICAL ACCESS CONTROL SYSTEM AND METHOD
20210390811 · 2021-12-16 ·

An access control system and method are described. In an example, an access control system includes a tag that interacts with a mobile device and communicates door information to the mobile device. The mobile device provides at least some of the information obtained from the tag to a trusted tag server that is configured to analyze whether or not the information was obtained from a valid and trustable tag. The trusted tag server may then forward along the door information to an access control server for analysis in connection with making an access control decision for the mobile device or a holder thereof. Results of the access control decision can be communicated to a mechanism that actuates and controls a protected asset that is within a predetermined proximity of the tag, thereby enabling access control without a dedicated access control reader deployed on or near the protected asset.

COMMUNICATION DEVICE, COMMUNICATION METHOD, AND DATA STRUCTURE

There is provided a communication device including: a communication section that executes communication with another node; and a control section that controls the communication by the communication section, the control section adding, to a packet directed toward a transmission destination node by a transmission source node, header information containing at least path information between the communication device located in a stage subsequent to the transmission source node and a target node located in a stage preceding the transmission destination node, and causing the communication section to send the packet toward another node residing in a path.

Receive-side timestamp accuracy
20210392065 · 2021-12-16 ·

In one embodiment, a network device, includes a network interface port configured to receive data symbols from a network node over a packet data network, at least some of the symbols being included in data packets, and controller circuitry including physical layer (PHY) circuitry, which includes receive PHY pipeline circuitry configured to process the received data symbols, and a counter configured to maintain a counter value indicative of a number of the data symbols in the receive PHY pipeline circuitry.

Network security system and method for operating same

Provided is a network security system including a communication interface that transmits a request for a preset option field value to a Dynamic Host Configuration Protocol (DHCP) server, receives a preset option field value corresponding to the request for the preset option field value from the DHCP server, transmits a request for a preset file to a Trivial File Transfer Protocol (TFTP) server, and receives a preset file corresponding to the request for the preset file from the TFTP server, and a processor that designates a preset location and the preset file of the TFTP server based on the preset option field value, wherein the preset file includes a file different from a file specified in the preset option field value by the DHCP.

SUPPLY AUTHENTICATION VIA TIMING CHALLENGE RESPONSE
20210379902 · 2021-12-09 ·

In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window.

SYSTEMS AND METHODS FOR DISTRIBUTED VERIFICATION OF ONLINE IDENTITY
20210385086 · 2021-12-09 ·

At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.

Systems, Devices, and Methods for Network Management at a Point of Sale (POS) Device
20210383343 · 2021-12-09 ·

Systems, devices and methods directed to operation of a point of sale (PoS) device during network connectivity to a cloud server, as well as during network outages and/or interruptions. The POS device can process transactions in a seamless manner even during network outages and/or interruptions. A POS application that runs on a POS device in an “online” mode can automatically detect an interruption in network connectivity, and switch to an “offline” mode. In the offline mode, the POS device can continue to process transactions and/or conduct other activities.

SYSTEMS AND METHODS FOR FRAUD DETECTION AND PREVENTION
20210383392 · 2021-12-09 ·

Systems and methods for fraud detection and prevention is disclosed. The system may receive a transaction request for a first customer including a transaction location, transaction time stamp, and merchant type code. The system may determine whether the transaction location is expected for the first customer. When the transaction location is unexpected, the system may identify a last-known video detection having a last-known time stamp and last-known location. The system may determine a travel time estimate between the last-known location and the transaction location and determine a buffer based on the merchant type code. The system may compare the travel time estimate to an allotted time that includes a difference between the transaction time stamp and last-known time stamp less the buffer. When the travel time estimate exceeds the allotted time, the system may execute one or more fraud prevention steps.

Encrypted control system, encrypted control method, and encrypted control program

An encrypted control system, an encrypted control method, and an encrypted control program make it possible to further reduce a risk of a cipher key leaking. An input device, a plant-side control device, and a controller are respectively equipped with pseudorandom number calculation units having a common function, are time synchronized, and start a synchronized operation at the same time. Since the encrypted control system is configured in such a manner, it becomes possible to switch a pair of a public key and a private key in synchronization with a control cycle of the entire control system. Consequently, it becomes possible to instantaneously and definitely detect intervention in the control system by a malicious third party.

Systems, methods, and apparatuses for adding a document history graph and corresponding hash value to a blockchain in a cloud based computing environment
11194961 · 2021-12-07 · ·

In a hosted computing environment a web server receives a document history graph. The web server performs a hash function, providing the document history graph as input to the hash function, the hash function providing a hash value as output. A blockchain services interface in the hosted computing environment generates a blockchain block that includes the hash value in a block payload hash field and the document history graph in a block payload field in the blockchain block. A blockchain consensus manager proposes adding the blockchain block to a private blockchain and receives an indication of consensus A block validator adds the blockchain block to the private blockchain responsive to consensus.