Patent classifications
H04L2463/121
Database platform for realtime updating of user data from third party sources
A data processing system communicates with a secure third-party database to obtain information about a user that is usable to determine one or more items associated with the user. The system then coordinates gathering and identification of additional data relevant to the user from other third-party data sources, to potentially update the user's information stored with the secure third-party database. The updated information may then be accessed at the secure third-party database to determine items associated with the user, which may include additional items in view of the additional data.
Node-indexed system, apparatus and method configured to sequence client events within a peer-to-peer network
Systems, apparatus, and methods for tracking and sequencing client events in a federated computer network are discussed herein. Various embodiments provide a computer-implemented method for assigning timestamps to client events received by nodes within the network and appending node identifiers to the timestamps to create node time signatures for the client events to facilitate updating of a client event database. Still other embodiments provide methods for comparing a last event node time signature to a recently received node time signature and generating an updated node time signature in view of the same. Such embodiments address client event sequencing problems that tend to plague federated and distributed networks as they expand in scale, geographic distribution, complexity, and involve programmatic client event generating services such as credential management services.
System and method of cloud detection, investigation and elimination of targeted attacks
Disclosed are systems and methods for cloud detection, investigation and elimination of targeted attacks. In one exemplary aspect, the system comprises a computer protection module configured to: gather information on an object in a computer in a network; and save a security notification with the object in an object database in the network; and a module for protection against targeted attacks configured to: search for the object in a threat database in the network; add one or more tags to the object when the object is found in the threat database and adding a correspondence between a record in the object database and the threat database; and determine that a computer attack has occurred when the one or more tags correspond to signatures in a database of computer attacks.
Authenticating access configuration for application programming interfaces
A system is configured to authorize client access to an application programming interface (API) of a host device. A proxy is configured to handle network traffic between a host and a client. Clients engage the host through the proxy to access an API of the host. An authorized client-side application permitted use of the API includes a Software Development Kit configured to generate a unique token and provide the token in association with an API request to the proxy. The proxy determines whether an internet protocol (IP) address of the client and the token match an existing IP-token pair. If no match exists, the proxy determines whether the token matches an existing token. The proxy authorizes the client access to the API when the IP and token match an existing pair or if the token does not match an existing token and the token is verified by the proxy.
SYSTEMS AND METHODS TO TIMESTAMP AND AUTHENTICATE DIGITAL DOCUMENTS USING A SECURE LEDGER
Systems and methods to timestamp and authenticate digital documents using a secure ledger are described. Some implementations can include computer-implemented method to timestamp and authenticate electronic documents. The method can include receiving, by a timestamp and authentication server and from a user device, a unique hash value that is generated at the user device based on a source document and a device identifier of the user device, and verifying, by the timestamp and authentication server, the device identifier. The method can also include, upon verifying the device identifier, inserting, by the timestamp and authentication server, the hash value and the device identifier into a secure ledger, and upon successful insertion into the secure ledger, transmitting, from the timestamp and authentication server to the user device, a success status message including a location in the secure ledger where the hash value was inserted.
AUTHENTICATED ACCESS AND AGGREGATION DATABASE PLATFORM
A data processing system is disclosed for data processing, including database and file management, as well accessing one or more databases or other data structures, authenticating users, and categorizing data items for addition to the database system. In some embodiments, the system may be configured to coordinate access to user account information via user-provided authentication credentials; apply account identification rules to the accessed account information to identify a plurality of accounts of the user; and initiate updates to a database record associated with the user indicative of any accounts identified.
METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO REDUCE SPOOFING VULNERABILITIES
Methods, systems, articles of manufacture and apparatus are disclosed to reduce spoofing vulnerabilities. An example apparatus to verify token integrity for a computing device includes an artifact engine to store first artifact data with a first timestamp in a device artifact storage, and store second artifact data with a second timestamp in the device artifact storage. The example apparatus includes an offchain identification protector (OIP) controller to generate a first token based on the first artifact data and the first timestamp, the first token to establish a first entry in a blockchain at a first time, and generate a second token based on the second artifact data, the second timestamp, and the first token, the second token to establish a second entry in the blockchain at a second time after the first time. The example apparatus also includes a verify engine to select the first or the second artifact from the device artifact storage, and search for a match of the selected first or second artifact in the blockchain to verify an integrity of the second token at a third time.
FOOTPRINT DATA TO PREVENT MAN-IN-THE-MIDDLE ATTACKS
Systems and methods are disclosed for preventing relay or replay attacks using time-stamped, localized footprint data. An access device may receive, from one or more beacon transmitters, a plurality of broadcast messages, each broadcast message, of the plurality of broadcast messages, comprising a timestamp and a unique identifier for a beacon transmitter, of the one or more beacon transmitters. The access device may store the timestamps and the unique identifiers. The access device may receive, from a user device, an access request comprising timestamps and unique identifiers corresponding to a subset of the broadcast messages received by the access device. The access device may verify that the stored timestamps and unique identifiers match the timestamps and unique identifiers received from the user device. Based on the verifying, the access device may authenticate the access request.
Systems and methods for location-based authentication
Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request comprising authentication credentials and a first location from a first location-aware device; receiving a second location from a second location-aware device associated with the authentication credentials; and upon determining that the first location and second location are within a pre-determined distance, authenticating the authentication credentials.
METHOD AND DEVICE FOR PORTAL AUTHENTICATION
The present application provides a method and device for Portal authentication. The method includes: sending an authentication webpage to a user terminal in response to an authentication request from the user terminal; authenticating login information returned by the user terminal through the authentication webpage; in response to successful authentication with respect to the login information, sending online information corresponding to the user terminal to an authentication device, such that the authentication device updates an online state of the user terminal.