H04L2463/121

SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA
20200349293 · 2020-11-05 · ·

The present disclosure provides systems and methods for authenticating photographic data. In one embodiment, a method comprises providing an image authentication application for use on a client device, the application configured to control image capture and transmission; receiving an image data file from the application at the authentication server comprising a photographic image captured by the application and metadata associated therewith; applying a watermark to the photographic image to create a watermarked image; applying date and time information to the tagged image; applying location information to the tagged image; creating a web address associated with the image data file; uploading the photographic image, the tagged image, or both to the web address; and transmitting an authenticated image file to the client device, the authenticated image file comprising one or more of: the watermarked image, the photographic image, the date and time information, geographic information, and the web address.

DYNAMIC USER ID
20200351263 · 2020-11-05 ·

The disclosed subject matter provides authentication between a client device and a server. The server allocates a dynamic user ID contained within an authentication token that is provided to the client device. In response to each successful authentication with the server, a new dynamic user ID is generated and provided to the client device for use in a subsequent authentication session. In generating the new dynamic user ID for the client device, the server invalidates any previously-provided dynamic user IDs for the client device.

SECURE REAL-TIME CLOCK UPDATE IN AN ACCESS CONTROL SYSTEM
20200348719 · 2020-11-05 ·

A method according to one embodiment includes communicating a wireless advertisement that identifies a clock status of a real-time clock of the access control device, wherein the clock status includes a clock status value indicating that the real-time clock has not been set, establishing a wireless communication connection with a computing device in response to the wireless advertisement, transmitting a session random value to the computing device, receiving a clock update token from the computing device, wherein the clock update token is indicative of an authority of the computing device to update the real-time clock of the access control device, authenticating the clock update token based on at least the session random value, and updating the real-time clock based on a received update time in response to successful authentication of the clock update token.

Secure authentication of user and mobile device

An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a positive identification and verification response from the user, the mobile device may generate a cryptogram using a user identification (ID) associated with the user, a timestamp, a device ID associated with the mobile device, a service provider application ID associated with the service provider application, and a service provider device ID. The mobile device may transmit the generated cryptogram, the user ID, the timestamp, the device ID, the service provider application ID, and the service provider device ID, to a service provider computer associated with the service provider application. The service provider computer may decrypt the cryptogram and compare the decrypted data elements to the received data elements to validate and authenticate the user.

Detection of anomalous computer behavior

A computer-implemented method for determining features of a dataset that are indicative of anomalous behavior of one or more computers in a large group of computers comprises (1) receiving log files including a plurality of entries of data regarding connections between a plurality of computers belonging to an organization and a plurality of websites outside the organization, each entry being associated with the actions of one computer, (2) executing a time series decomposition algorithm on a portion of the features of the data to generate a first list of features, (3) implementing a plurality of traffic dispersion graphs to generate a second list of features, and (4) implementing an autoencoder and a random forest regressor to generate a third list of features.

Systems and methods for data exfiltration detection

Systems and methods for detecting anomalous data traffic over proxy servers in a data communications network. The method includes receiving, by a server computing device, network log data corresponding to data traffic during a timeframe. The method further includes normalizing the network log data using at least one of timestamp data of the network log data or IP address data of the network log data. The method also includes extracting risk-based data features from the network log data. The method further includes calculating using an isolation forest algorithm, anomaly scores for the normalized network log data based on the extracted risk-based features. The method also includes determining at least one anomaly event based on the calculated anomaly scores. The method further includes identifying at least one host device and at least one timestamp corresponding to the at least one anomaly event.

System and method of validating Internet of Things (IOT) devices

A system and method for validating an Internet of Thing (IoT) device on an IoT network. The IoT device captures and stores the historical sensor values, along with corresponding timestamps in a local memory. A controller receives the historical sensor values and also receives a heartbeat token over a network that is different than the IoT network. The controller calculates a historical hash value using the historical sensor value and the heartbeat token as inputs and stores the historical hash values and the corresponding timestamp in a blockchain ledger of an IoT management platform. At a later time, in response to a validation request from the IoT management platform, the controller polls the IoT device for the historical sensor value associated with a particular timestamp. The IoT device responds with the stored historical sensor value and the controller calculates a reconstructed hash value using the historical stored sensor value and a stored heartbeat token as inputs. If the reconstructed hash value matches the historical hash value, the IoT device is validated.

Timestamp-based authentication
10826912 · 2020-11-03 ·

Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a first and second computing system. The process provides as output a number that is based on a timestamp. The first computing system executes the authentication process using a timestamp obtained from its clock. The resulting number is transmitted to the second computing system, possibly along with other authentication data, such as a username and/or password. In response, the second computing system executes the authentication process using a timestamp obtained from its clock. If the numbers generated by the first and second computing systems match, the first computing system is authenticated.

MANAGING BLOCKCHAIN-BASED CENTRALIZED LEDGER SYSTEMS

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing blockchain-based centralized ledger systems. One of the methods includes transmitting a timestamp request for a to-be-timestamped block of a blockchain at a time point to a trust time server by a ledger server in a blockchain-based centralized ledger system that stores data in the blockchain, the trust time server being associated with a trust time authority and independent from the blockchain-based centralized ledger system, the blockchain including a plurality of blocks storing transaction data, and disregarding the timestamp request in response to determining that a predetermined time period has lapsed after the time point and that there has been no reply to the timestamp request from the trust time server.

SYSTEMS AND METHODS FOR DISTRIBUTED VERIFICATION OF ONLINE IDENTITY
20200344058 · 2020-10-29 · ·

At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.