H04L2463/121

Systems and methods for location-based automated authentication

Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

Classifying software modules based on fingerprinting code fragments

A method includes extracting one or more code fragments from a first software module and computing fingerprints of the code fragments extracted from the first software module. The method also includes determining a similarity score based on distances between the fingerprints of the code fragments extracted from the first software module and fingerprints of one or more code fragments extracted from at least a second software module, the second software module being classified as a given software module type, each of the fingerprints being computed by application of a fuzzy hash function to a given one of the code fragments. The method further includes classifying the first software module as the given software module type based on the similarity score and modifying access by a given client device to the first software module responsive to classifying the first software module as the given software module type.

AUTOMATED AUTHENTICATION OF A NEW NETWORK ELEMENT
20190349198 · 2019-11-14 ·

The technology presented herein enables a new network element to be authenticated to other network elements automatically. In a particular embodiment, a method provides determining a current time relative to a first time. The first time is known to the new network element and a provisioning network element. The method further provides generating first beacon data using seed data stored on the new network element and the current time and generating keying data using the first beacon data and identification information associated with the new network element. The method also provides identifying a first one-time pad (OTP) from the keying data and using the first OTP to encrypt an authentication request for transfer from the new network element to the provisioning network element.

Lateral movement detection for network security analysis

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

Cryptographic algorithm status transition

Various embodiments relate to a method performed by a processor of a computing system. An example method includes determining a first cryptographic algorithm utilized in a first block of a first blockchain. The first block of the first blockchain has a first unique block identifier. A second cryptographic algorithm utilized in a second block of the first blockchain is determined. The second block of the first blockchain having a second unique block identifier. A first cryptographic algorithm status transition (CAST) event is defined if the second cryptographic algorithm is different than the first cryptographic algorithm. A first CAST record is defined upon occurrence of the first CAST event. The first CAST record includes the second cryptographic algorithm and the second unique block identifier. The first CAST record is digitally signed and stored on a second blockchain. The second blockchain may be referenced out-of-band of the first blockchain.

PROCESSING ANOMALY DATA TO IDENTIFY THREATS TO NETWORK SECURITY
20190342311 · 2019-11-07 ·

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected or threat, and to take action promptly.

SMART BUILDING DATA CONNECTOR
20240134326 · 2024-04-25 ·

There is described a smart building data connector, and method thereof, of a building management system. The connector receives change of value data from a local data device and generates processed data based on the change of value data and mapping data correlating the local data device to a remote cloud device. The connector attempts to transmit the processed data to the remote cloud device. The connector generates buffer data in response to determining that the remote cloud device is not ready to receive the processed data or the processed data has not been transmitted properly to the remote cloud device. Data analytics are determined based on the change of value data, the processed data, and the buffer data, and an action is performed at the remote cloud device based on the results of the data analytics.

SECURE PORTABLE MEDICAL INFORMATION ACCESS SYSTEMS AND METHODS RELATED THERETO
20240127916 · 2024-04-18 ·

Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will enable access to desired medical information stored on a computer network. The secure portable reference provides greater transportability of medical records to a patient or medical data repository including a doctor's office, clinic, or hospital, while maintaining data security to satisfy medical data privacy regulations and expectations. Some described embodiments use encrypted information inside the secure portable reference to hide, for example, who is allowed access to the stored medical information, and the network location of the stored information. Some embodiments use a secret PIN to authenticate the user attempting access to the referenced medical information. The secure portable reference contains information on network resources used to enable download access to medical information, including medical records and medical images.

Network-connectable sensing device

The invention concerns a sensing device (1) configured to selectively operate in: a manufacturing mode, an unprovisioned mode, a provisioned mode and an end-of-life mode. In the manufacturing mode, the electronic circuit (14) permanently stores a unique code (149) in a storage medium (12), while in the unprovisioned mode, the electronic circuit (14) waits for a provisioning code (31) for generating a private and a public key (143). In the provisioned mode, the electronic circuit (14) signs a timestamp (146) provided by a time-keeping unit (13) and data (110) provided by a sensing unit. The collected data (110), the timestamp (146), the digital signature (144) and the public key (143) is then transmitted. In the end-of-life mode, the electronic circuit (14) permanently erases the private key.

Token node locking with fingerprints authenticated by digital certificates

A system and method for receiving secure data in a client device. In one embodiment, the method comprises (a) receiving a token having a token ID and a digital certificate generated by a certificate authority (CA) having client device fingerprint data generated from client device parameters, (b) accepting a request in the client device to provide secure data to the client device, (c) regenerating the client device fingerprint data from the client device parameters, (d) determining, in the client device, differences between the client device fingerprint data of the digital certificate from the regenerated client device fingerprint data, and (e) transmitting a request to a secure data service to provide secure data based upon the determination.