H04L2463/121

User data electronic exchange platform
11831618 · 2023-11-28 · ·

An indication that data packets of personal data that correspond to data packet types for data categories are approved for transfer between user accounts via the personal data sharing platform is provided. A first data packet identifying first personal data that is related to a first user of the first user account is received. The first data packet includes first personal data values that correspond to first attributes specified by a first data packet type and that have been individually encrypted at first user account. Whether the first data packet satisfies a condition that the first data packet include data values for each of the first attributes specified by the first data packet type for a first data category is determined. Responsive to determining that the first data packet satisfies the condition, the individually encrypted first personal data values and the corresponding first attributes are stored at a data store.

UWB SYSTEM
20230137042 · 2023-05-04 · ·

The present invention is proposed to solve the above problems and is directed to providing a UWB system comprising: a memory in which a UWB ranging factor definition program is embedded; and a processor which executes the program, wherein the processor predefines UWB ranging factors to define an encryption key in consideration of a unique m-byte key characteristic for each set of a vehicle and a device.

UWB SYSTEM
20230137532 · 2023-05-04 · ·

According to an aspect of the present invention, there is provided a ultra-wideband (UWB) system comprising: a memory in which a UWB ranging factor definition program is embedded; and a processor which executes the program, wherein the processor predefines UWB ranging factors to define a scrambled timestamp sequence (STS) index in consideration of a characteristic of an n-byte random value that is changed every ranging.

UWB SYSTEM
20230135499 · 2023-05-04 · ·

The ultra-wideband (UWB) system includes an input unit configured to receive information on a separation distance between a tag and a vehicle, a memory in which a ranging program corresponding to the separation distance is embedded and a processor which executes the program, wherein the program determines a ranging scheme and an anchor to perform ranging according to the separation distance.

SHARING ACCESS TO DATA EXTERNALLY
20230135168 · 2023-05-04 · ·

A method including transmitting, by a device, encrypted content to an endpoint capable of managing access to the encrypted content; determining, by the device, a sharing link including a static portion and a dynamic portion, the static portion being associated with the endpoint and the dynamic portion including a unique identifier associated with the encrypted content; and transmitting, by the device, the dynamic portion of the sharing link to the endpoint to enable the endpoint to provide another device with access to the encrypted content. Various other aspects are contemplated.

Methods, systems, and devices for detecting over-the-top piracy

Techniques for detection over-the-top piracy are described. In some embodiments, a piracy detection method is performed at a server by a piracy detector. The piracy detector obtains records associated with requests for access from a plurality of client devices. The piracy detector further distributes the records to a plurality of nodes according to distribution keys extracted from the records, where each of the plurality of nodes receives a respective set of records associated with a respective distribution key and generates a set of respective watch session records based on the respective set of records. The piracy detector also generates watch session records associated with the distribution keys by aggregating the respective watch session records from the plurality of nodes. The piracy detector additionally identifies one or more pirated client devices among the plurality of client devices based on clusters established from the watch session records.

Authenticating access configuration for application programming interfaces

A system is configured to authorize client access to an application programming interface (API) of a host device. A proxy is configured to handle network traffic between a host and a client. Clients engage the host through the proxy to access an API of the host. An authorized client-side application permitted use of the API includes an API request to the proxy. The proxy determines whether an internet protocol (IP) address of the client and the token match an existing IP-token pair. If no match exists, the proxy determines whether the token matches an existing token. The proxy authorizes the client access to the API when the IP and token match an existing pair or if the token does not match an existing token and the token is verified by the proxy.

Multi-factor authentication methods and related systems
11528265 · 2022-12-13 · ·

The present disclosure provides various embodiments of systems and methods to securely authenticate a user. More specifically, the present disclosure provides embodiments of multi-factor authentication methods that improve both security and user convenience by using trusted secondary devices or peripherals (hereinafter “trusted devices”) to provide additional authentication factor(s) for verifying user presence/identity after an initial authentication factor has been used to verify user presence/identity. Unlike conventional multi-factor authentication methods, the additional authentication factor(s) provided by the trusted devices do not require user input or intervention.

System and apparatus for providing authenticable electronic communication
11539531 · 2022-12-27 ·

The present disclosure relates to security risk warning system that a recipient may acknowledge and act accordingly. Security insights may be provided explicitly in a security insight panel that may clearly identify vulnerabilities specific to a particular authenticable communication. This may limit risk that a recipient would ignore or not understand the risk. Security insights may be provided for a combination of indicated source, recipients, and content, such as links, text, attachments, and images. Security insights may be provided on site, such as on or proximate to the reviewed portions of the authenticable communication.

Method and system for anonymous sending of physical items with possibility of responding
11539674 · 2022-12-27 ·

The present invention relates to a method and a system that enable a sender to send one or more physical items to a recipient in an anonymous way, allowing the recipient to respond to the sender after receiving the one or more physical items. No data related to the sender and the recipient are retained in the system.