H04L2463/121

SYSTEM AND METHOD FOR DISTRIBUTED, KEYLESS ELECTRONIC TRANSACTIONS WITH AUTHENTICATION
20220337570 · 2022-10-20 ·

Disclosed are systems and methods for performing distributed, keyless authorized electronic transactions. The disclosed systems and methods provide an electronic transaction framework where hardware and/or software devices can be used to authenticate users and/or authorize transactions involving such users. The disclosed framework operates as a distributed system in that it can be built without an entity that all parties must trust. The framework relies entirely on one-way functions and avoids using both symmetric and asymmetric cryptography; therefore, the framework does not have secret keys that can be compromised. The framework provides a distributed, electronic authorization system that does not require a reference clock to which components are synchronized, thereby enabling dynamic, agile authorization with improved security for user and transactional data.

DETERMINING TRUSTED FILE AWARENESS VIA LOOSELY CONNECTED EVENTS AND FILE ATTRIBUTES

Disclosed in some examples are methods, systems, devices, and machine-readable mediums which monitor for file system element transfers to and from both the endpoint and authorized accounts on network-based service providers (e.g., cloud-based storage). The system uses the capabilities of monitoring both the network-based service and the client computing device to filter out legitimate uploads to authorized network-based services and legitimate downloads to authorized computing devices. By matching events, it filters out events that are likely legitimate, the system may provide more accurate information, notifications, awareness, and unmatched event indications.

Zero-Knowledge Encryption Protocol for Sensitive Data

Disclosed herein are system, method, and computer program product embodiments for encrypting and decrypting a sensitive data item using a zero-knowledge encryption protocol. An embodiment operates by receiving a request to decrypt the sensitive data item from a client. The embodiment retrieves the requested sensitive data item from a data store. The embodiment generates a result set by replacing a ciphertext value of the sensitive data item to be stored in the result set with a placeholder identifier. The embodiment retrieves a data encryption key (DEK) block from a DEK manager, wherein the DEK block comprises a DEK associated with the sensitive data item. The embodiment generates and encrypts a cipher ticket comprising the ciphertext value of the sensitive data item. The embodiment then sends the result set, the cipher ticket, and the DEK block to the client for decryption of the ciphertext value of the sensitive data item.

Device, computer program and method

A device for authenticating a user is described. This device comprises transceiver circuitry configured to receive motion information from a plurality of wearable devices located on a user's body indicative of the motion of the user's body at the location of the respective wearable device at a particular time; and 5 controller circuitry configured to: compare the received motion information and the location of the respective wearable device and authenticate the user in the event of a positive comparison between the received motion information and the location of the respective wearable device with stored motion information and the location of the respective wearable device.

System and methods for tamper proof interaction recording and timestamping
11636216 · 2023-04-25 · ·

A system and method for securely recording voice communications, comprising a network-connected computer server and an authentication system which verifies the validity of voice communications.

Dynamic user ID

The disclosed subject matter provides authentication between a client device and a server. The server allocates a dynamic user ID contained within an authentication token that is provided to the client device. In response to each successful authentication with the server, a new dynamic user ID is generated and provided to the client device for use in a subsequent authentication session. In generating the new dynamic user ID for the client device, the server invalidates any previously-provided dynamic user IDs for the client device.

Method and system for pro-active desktop resume operation based on historical data

A system and method for resuming a remote desktop for a networked client device. An access control system accepts login data from a user input to a networked client device, and/or user activity data collected by an agent running on the desktop. The networked client device may include a client application. A data center allows access to an activated desktop to the networked client device. The access control system suspends the desktop when the user is inactive in operating the client device. The access control system resumes the desktop on the networked client device in relation to a predicted start time. The predicted start time is based on login data from past logins by the user on networked client devices.

Securely authorizing service level access to a backup system using a specialized access key

Described is a system (and method) for securely authorizing service level access to a backup system using an access key. The service level access (or access via a service account) may provide a user with an enhanced set of privileges to perform troubleshooting operations on the backup system. Such privileges may be unlocked by allowing a user to perform operations using an unrestricted interface of the backup system such as an operating system shell. To authorize such access, the system may provide a limited (or specialized) access key. The access key may be narrowly tailored to only provide access to a particular backup system and only remain viable for a limited duration. Accordingly, the access key may be configured to embed a system identifier, a timestamp, and a digital signature, which may be independently verifiable by the backup system before granting service level access.

Distributed ledger object router for transactions, contracts and data
11477022 · 2022-10-18 · ·

A system, method and apparatus in which a client computer initiates and communicates a distributed ledger transaction either to an individual node in a network of distributed ledger nodes or to the network itself, which transaction is labeled with a nanosecond scale timestamp, encrypted using quantum event generated random binary data and then securely transmitted to other ledger nodes in the network at substantially the same time. Networks may consist of traditional wireline and wireless networks, cloud networks and 5G wireless networks in any combination and configuration. Using the invention, distributed ledger networks may take the forms of blockchains, transactionally integrated multiple distributed ledgers, decentralized exchanges, or immutable distributed databases. After the transaction is transmitted, additional messages necessary to the completion of the transaction are communicated between ledger nodes in the network using the same or similar system, method and apparatus.

LOCATION-BASED ACCESS TO CONTROLLED ACCESS RESOURCES
20230120723 · 2023-04-20 ·

Systems and methods provide access to location-restricted resources outside of recognized locations. An example, a method includes receiving a request for a controlled access resource from a client device and determining that the request is not associated with a recognized location but that state data exists for the client device identifier. In response to identifying the state data, the method includes generating a link for accessing the controlled access resource at a server, generating an encrypted token including a timestamp, a random number, and licensed resource information from the state data, including the encrypted token in the link, and providing the link to the client device. The client device uses the link to request the controlled access resource from the server, which determines that the request includes the token, determines that the token is not expired, and provides the controlled access resource to the client device.