H04L9/3215

Decentralized out-of-band accelerated blockchain transaction processing

An example operation may include one or more of identifying a blockchain transaction requiring commitment processing for commitment to a blockchain, determining the blockchain transaction is delayed, responsive to identifying the blockchain transaction is delayed, creating a transaction acceleration smart contract defining an incentive for performing the commitment processing of the blockchain transaction, and storing the transaction acceleration smart contract blockchain in a different blockchain.

Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
11711355 · 2023-07-25 · ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

System and method for securely exchanging messages
11563562 · 2023-01-24 · ·

The present system and method allow the exchange of messages, such as email, between a sender and a recipient while maintaining the data secure and the integrity of the content of the messages. The method and system do not require a user having an account to open a received message. The method comprises the server creating a new communication key upon reception of a request. The communication key is typically valid for a single request to ensure that each request is encrypted using different communication keys. The method typically comprises a client [A] establishing communication on [HANDSHAKE] with one or more servers [B]. The HANDSHAKE generally aims at initializing the encryption key that will be used to exchange information between A and B.

Communication device and non-transitory computer-readable recording medium storing computer-readable instructions for communication device

A communication device may receive a specific signal from a first external device; display a first instruction screen; in a case where it is instructed that the target process is to be executed in a situation where the first instruction screen is displayed, send a public key to the first external device, wherein in a case where it is not instructed that the target process is to be executed in the situation where the first instruction screen is displayed, the public key is not sent; after the public key has been sent to the first external device, receive an authentication request from the first external device; send an authentication response to the first external device; receive connection information from the first external device; and establish, by using the connection information, a wireless connection between the communication device and a second external device.

Communication node, method of operating thereof and collaborative system

The present invention relates to a communication node, a method of operating the same, and a collaborative system. In an example of the present invention, there may be provided an operation method of a first communication node (a transmission node) comprising: a step of confirming whether data is to be transmitted to the receiving side communication node by a transmitting side communication node among communication nodes connected to each other on the network; a step for generating first control information for verifying authentication and integrity of the data; a step for generating a first control information including information for authenticating and verifying integrity of the data to be transmitted by the transmitting side communication node; a step for sharing the first control information with at least one or more participating communication nodes including the receiving side communication node through a channel formed in a block chain network; and a step for transmitting a message including the data through a channel formed in a network different from the block chain network.

Data sharding for transmission over a high generation cellular network
11706299 · 2023-07-18 · ·

Aspects of the disclosure relate to data sharding for transmission over a high generation cellular network. A computing platform may detect, via a communication network, transmission of data from a first computing device to a second computing device. Subsequently, the computing platform may intercept, prior to receipt of the transmission by the second computing device, the data. Then, the computing platform may shard the data into a first shard and a second shard. Then, the computing platform may identify, within the communication network, a first communication channel and a second communication channel. Then, the computing platform may send, to the second computing device, the first shard via the first communication channel, and the second shard via the second communication channel. Subsequently, the computing platform may merge, the first shard and the second shard, to reconfigure the data.

Systems and methods for tokenized data delegation and protection

Example embodiments of systems and methods for data delegation and control through the use of tokenized data are provided. In an exemplary method of data delegation and control, a data device may store private information associated with a user and generate an access token, comprising tokenized data identifying the data device. The data device may transmit the access token to a user device through a front channel and receive an information request from a merchant device comprising the access token through a secure back channel. Upon authenticating the access token, the data device may transmit a portion of the private information to the merchant device through the secure back channel.

Method and system for asynchronous side channel cipher renegotiation
11700243 · 2023-07-11 · ·

A method for asynchronous side channel cipher renegotiation includes: establishing, by a first computing device, a first communication channel and a second communication channel with a second computing device, where the first communication channel is an encrypted tunnel and packages exchanged using the encrypted tunnel are encrypted using a first cipher; receiving, by a receiver of the first computing device, a renegotiation request from the second computing device using the second communication channel, where the renegotiation request includes at least a password value and a relative time; generating, by a processor of the first computing device, a second cipher using at least an encryption protocol and the password value; receiving, by the receiver of the first computing device, a new encrypted packet from the second computing device using the first communication channel; and decrypting, by the processor of the first computing device, the new encrypted packet using the second cipher.

AUTHENTICATION WITH OFFLINE DEVICE
20230216844 · 2023-07-06 · ·

A first user device can transmit an interaction request to a remote computer via a long range communication channel. The first user device can receive an authentication request message from the remote computer and can then transmit the authentication request message to a second user device via a short range communication channel. The first user device can then receive an authentication response message comprising a response value from the second user device via the short range communication channel. The first user device can then transmit the authentication response message to the remote computer causing the remote computer to verify the response value and perform further processing if the response value is verified.

Usable security with social network assistance

Methods and arrangements for effecting authentication in a secure transaction. There are defined, on behalf of a user, individuals who are members of a social network of the user. There is received, from the user, a transaction request for a secure transaction. An authentication test is conducted with the user and, upon meeting a predetermined requirement of the authentication test, the transaction request is validated. The authentication test requests the user to confirm at least one information item related to at least one member of the user's social network. Other variants and embodiments are broadly contemplated herein.