H04L2463/121

Behavior-based authentication
11356455 · 2022-06-07 · ·

Methods and systems for authenticating users based on user application activities are described herein. One or more questions and one or more answers may be generated and stored based on a history of user application activities associated with a user. The one or more questions and one or more answers may be generated randomly, and may relate to one or more other users. A request for access to a service may be received. Based on the request, a question associated with the history of user application activity may be selected and presented to the user. A candidate answer may be received from the user, and the user may be authenticated based on comparing the candidate answer to an answer associated with the question presented.

Systems and methods for using distributed ledger micro reporting tools

Systems and methods for using distributed ledger micro reporting tools are disclosed. In one embodiment, in a distributed computer application executed by an information processing apparatus comprising at least one computer processor, a method for using a distributed ledger micro reporting tool may include: (1) an event listener establishing a connection a distributed ledger; (2) in response to the creation of each block of a plurality of blocks on the distributed ledger, the listener reading block details from the block, wherein the block comprises a plurality of transactions, and the block details comprise a transaction hash for each of the plurality of transactions; (3) indexing the transaction hash with a timestamp; and (4) storing the index of the transaction hash with the timestamp.

SYSTEMS AND METHODS OF PHYSICAL INFRASTRUCTURE AND INFORMATION TECHNOLOGY INFRASTRUCTURE SECURITY
20220174039 · 2022-06-02 ·

Systems and methods of physical infrastructure and information technology infrastructure security are provided. A data processing system can provide distributed sensing through mobile devices, active cyber defense through time-based port hopping, and message delivery verification through retinal tracking.

VERIFYING THE TRUST-WORTHINESS OF ARP SENDERS AND RECEIVERS USING ATTESTATION-BASED METHODS

Systems, methods, and computer-readable media for assessing reliability and trustworthiness of devices operating within a network. An ARP responder can receive an ARP request from an ARP requestor for performing address resolution between the ARP requestor and the ARP responder in a network environment. The ARP responder can build an ARP response including attestation information of the ARP responder. Further, the ARP responder can provide, to the ARP requestor, the attestation information for verifying the ARP responder using the ARP response and the attestation information of the ARP responder.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING PROGRAM
20220171830 · 2022-06-02 · ·

The present disclosure relates to an information processing apparatus, an information processing method, and an information processing program, capable of managing the copyright-related information of content appropriately.

An information processing apparatus according to the present disclosure includes an acquisition unit configured to acquire, in a case where there is a plurality of copyright holders relating to one piece of content, consensus information indicating an agreement on a share of respective copyrights of the plurality of copyright holders, and a generation unit configured to create a transaction for recording the consensus information acquired by the acquisition unit on a blockchain.

Secure Safety-Critical System Log
20220173889 · 2022-06-02 ·

Embodiments are disclosed for secure safety-critical system log. In an embodiment, a method comprises: obtaining data to be added to a log; creating an entry for the data; and adding the entry to a sequence of chained entries in the log, wherein: the sequence of chained entries includes a number of data entries and a number of sentinels interleaved with the number of data entries, wherein each data entry in the chain of entries is appended to an error-detecting code computed for the entry and a previously computed error-detecting code of a preceding data entry or an error-detecting root, and each sentinel in the chain of entries includes an error-detecting code computed for the sentinel and a previously computed error-detecting code of a preceding data entry or the error-detecting root, and each sentinel includes a previously computed and encrypted blockchain value of a preceding sentinel or a blockchain root value.

Instant enforcement of centrally configured IT policies

Managing an authenticated user session. A method includes a resource provider computer system subscribing to a conditional access termination service for an entity configured to obtain resources from the resource provider computer system through a user session. The resource provider computer system receives an event, related to resource requests, for the entity from the conditional access termination service. The resource provider computer system receives a request for resources from the entity. The resource provider computer system evaluates the request with respect to the event. The resource provider computer system responds to the request based on evaluating the request with respect to the event.

Persistent login

Systems and methods are provided for persistent login. Such persistent login may be based on linking user identity across accounts of different entities to allow each entity to maintain control over their respective sets of user data, while providing a streamlined user experience that avoids much of the repetitive need to login to different services with different login credentials (e.g., during periods of heavy use). Such persistent login may utilize a set of tokens issued and exchanged between devices of the partnering entities. Such tokens may include an access token, refresh token, and identity token. When a user associated with a first entity requests access to information secured by a second entity, such request may be associated with the access token. If the access token is determined to be expired, the refresh token may be used to refresh the access token, which may also trigger issuance of a new refresh token. The refreshed access token may be used in conjunction with the identity token to access the requested information secured by the second entity.

SYSTEM FOR ENCRYPTING AND AUTHENTICATING COMMUNICATIONS WITH MUTUAL AUTHENTICATION OF THE COMMUNICATORS

SYSTEM FOR ENCRYPTING AND AUTHENTICATING COMMUNICATIONS WITH MUTUAL AUTHENTICATION OF THE COMMUNICATORS which can be used between two parties who exchange messages supported by a communication network in which the parties are unequivocally identified. The system includes processes supported by respective authentication applications available to each party on a hardware/software device, the applications comprising at least: an identifier (Id) of the authentication application (AA); an encryption key (CC) of each party; a random number generator for encrypting and authenticating messages Mx; and an encryption algorithm that is shared with the rest of the parties of the system, allowing them to encrypt and decrypt the sent/received messages.

Method and System for Anonymous Sending of Messages and Items with Possibility of Responding
20220166758 · 2022-05-26 ·

The present invention relates to a method and a system that enable a sender to send a message or another type of item to a recipient in an anonymous way, allowing the recipient to respond to the sender after receiving the message or another type of item. No data related to the sender and the recipient are retained in the system.