Patent classifications
H04L2463/121
Internet of things system based on security orientation and group sharing
The present application discloses an Internet of Things (IoT) system, comprising a cloud account server, configured to manage user accounts corresponding to the users respectively, wherein the users comprise a first user; a plurality of IoT devices, communicating with the cloud account server respectively, wherein the plurality of IoT devices including a first IoT device corresponding to the first user, and the first IoT device preserves a first authorization list set by the first user; and a plurality of peripheral devices, including a first peripheral device connected to or communicating with the first IoT device. The first IoT device determines whether other users possess a first authority to access the first peripheral device based on the first authorization list.
MUTATION PROCESSING FOR EVENTS
A system for committing event data includes an interface and a processor. The interface is configured to receive input data and receive a client key. The processor is configured to generate an Nth sequence number; determine an Nth event hash using the input data, an N-1 signature, and the Nth sequence number; encrypt the Nth event hash with the client key to generate an Nth signature; generate an Nth event from the input data, the N-1 signature, the Nth sequence number, and the Nth signature; and, in response to an aggregate N-1 of one or more prior events being valid, apply Nth event onto the aggregate N-1.
System architecture and database for context-based authentication
An authentication correlation (AC) computing device is provided. The AC computing device includes a processor and a memory. The AC computing device receives a first authentication request from a requesting computer device including an account identifier, a first timestamp, and at least one authentication factor, and determines a first security level of the first authentication request. The AC computing device stores the first security level and the first timestamp. The AC computing device is also configured to receive a second authentication request including the account identifier and a second timestamp, determine that the second authentication satisfies an authentication rule based on the account identifier, the second timestamp, and the stored authentication data wherein the rule defines a timeframe and an authentication threshold, and generate an authentication response based on the determination and the authentication rule wherein the authentication response includes an approval indicator.
Systems and methods for hiding identity of transacting party in distributed ledger transaction by hashing distributed ledger transaction ID using secured representation of distributed ledger address of transacting party as a key
Implementations of the disclosure are directed to proving and creating on a distributed ledger a verifiable transaction record of a transaction between a user associated with user device and an agent associated with agent system, where the identities of the user and agent are hidden. Some implementations are directed to providing for hidden identity of claims where a distributed ledger identity of a user may be masked from an agent.
SECURITY EVENT CONNECTIVITY GENERATED BY LINKING ENITITIES AND ACTIONS FROM PROCESS TRACKING
A system and method automatically links security events associated with a computer network and system calls of plural networked computers interfaced with the computer network. System call information of the system calls of the plural networked computers are communicated to a network location to associate security events with system calls across the networked computers and provide a causal graph that reconstructs a sequence of events with precise attribution and timing to comprehend entities and actions associated with the security event.
NON-REPUDIATION METHOD AND SYSTEM
In one embodiment, the present disclosure is directed to a system for digital authentication. A device includes a second processor for security functionality. The second processor generates a public key and a private key, and uses the private key and to-be-signed signature data to generate digital signatures. The device transmits the public key and a first digital signature to the server. As part of subsequent communication, the device transmits the public key and a second digital signature to the server. Using the public key, the server validates the second digital signature to verify that the second digital signature is from the device or a user of the device, thereby verifying that the subsequent communication is from the device or the user of the device.
Systems and methods for distributed key storage
A system for implementing a distributed certificate authority using trusted hardware includes a first verifying node communicatively coupled to a plurality of remote devices, the verifying node designed and configured to receive an authorization request from a remote device, wherein receiving the authorization request further comprises receiving an identifier of the remote device, authenticate the remote device, and generate an authorization token, wherein generating the authorization token further includes associating the identifier of the remote device with at least an authorization datum, associating the identifier of the remote device with at least a temporal attribute, and digitally signing the authorization datum, and generating the authorization token containing the digitally signed authorization datum.
Systems and methods for quantum consensus
Systems, apparatuses, and methods are disclosed for quantum entanglement authentication (QEA). An example method includes transmitting a first number and a second electronic identification of a second subset of the first set of entangled quantum particles to a second computing device, transmitting a second number and a first electronic identification of a first subset of a first set of entangled quantum particles to a first computing device, wherein each entangled quantum particle in the first set of entangled quantum particles is entangled with a respective entangled quantum particle in a second set of entangled quantum particles, receiving, from the first computing device, a third number, receiving, from the second computing device, a fourth number and in an instance in which the third number corresponds to the first number and the fourth number corresponds to the second number, authenticating a session between the first computing device and the second computing device.
MANAGING TRANSACTION REQUESTS IN LEDGER SYSTEMS
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing transaction requests in ledger systems. One of the methods includes: receiving a plurality of transaction requests by a computing system, each of the plurality of transaction requests including content information of a corresponding transaction and authentication information of the corresponding transaction, storing each of the plurality of transaction requests in a request stream by the computing system, obtaining storage information of a transaction request of the plurality of transaction requests in the request stream by the computing system, and storing the storage information of the transaction request in an index of an index stream and authentication information of a transaction corresponding to the transaction request in a storage element of a storage stream by the computing system, the storage element corresponding to the index, the index stream being associated with the storage stream.
RISK-BASED VULNERABILITY REMEDIATION TIMEFRAME RECOMMENDATIONS
Systems and methods for computing times to remediate for asset vulnerabilities are described herein. In an embodiment, a server computer receives first vulnerability data for a plurality of entities identifying asset vulnerabilities and timing data corresponding to the vulnerability data indicating an amount of time between identification of an asset vulnerability and a result of the asset vulnerability. The server computer identifies a strict subset of the first vulnerability data that belongs to a particular category of a first plurality of categories. The server computer receives second vulnerability data for a particular entity identifying asset vulnerabilities. The server computer identifies a strict subset of the second vulnerability data the belongs to the particular category. Based, at least in part, on the strict subset of the first vulnerability data, the server computer computes a time to remediate the asset vulnerabilities in the strict subset of the second vulnerability data.