H04L9/3226

Customized view of restricted information recorded into a blockchain
11706228 · 2023-07-18 · ·

Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level.

Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal

Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal are provided. The fingerprint encryption method includes: acquiring a fingerprint image; dividing the fingerprint image into a plurality of block images according to a preset window, wherein a size of the block image is the same with a size of the preset window; determining identifiers of the plurality of block images, wherein the identifiers of the plurality of block images have a first preset order; and determining, according to the identifiers of the plurality of block images and a received encryption order, a plurality of encrypted block images to obtain an encrypted fingerprint image. Security of fingerprint storage or fingerprint transmission is enhanced.

Authorization method and authorization system displaying authorization information on e-paper
11706030 · 2023-07-18 · ·

An authorization method and an authorization system are provided. The authorization method includes displaying, by a service device, authorization information on an e-paper arranged on the service device; obtaining, by a user device, the authorization information from the e-paper; and using, by the user device, the authorization information displayed on the e-paper to perform an authorization operation between the user device and the service device.

Entity authentication for pre-authenticated links

Techniques for increasing security for pre-authenticated links are disclosed herein. Computing systems that generate pre-authenticated links are configured to assign an entity identifier to pre-authenticated links to specify an entity permitted to access respective data through the pre-authenticated link. When activating a respective pre-authenticated link, an entity attaches an entity token to the request to prove an identity of the requesting entity. If the identity from the entity token matches the entity identifier, the computing system may grant access to the respective data.

Method for secondary authentication

Described embodiments provide systems and methods for validating a request to perform an action to access at least one file. A computing device can receive a request from the client, the request being to perform an action to access at least one file and including a first computed value indicative of one or more previous actions on files. The computing device may compare the first computed value to a second computed value maintained by the computing device independently from the first computed value. The second computed value may be indicative of the one or more previous actions on the files. The computing device may perform secondary authentication in addition to primary authentication for the client, responsive to an indication of trustworthiness of the client or the file according to the comparison of the first computed value to the second computed value.

SYSTEM AND METHOD TO PERFORM DIGITAL AUTHENTICATION USING MULTIPLE CHANNELS OF COMMUNICATION

Embodiments are generally directed to systems, devices, and techniques to authenticate unauthenticated users to perform sensitive actions.

SYSTEM AND METHOD FOR A TRUSTED DIGITAL IDENTITY PLATFORM
20230020703 · 2023-01-19 · ·

A system and method is disclosed for a digital identity (DI) management platform. A carbon identification may be generated to include personal information unique to a user. The personal information may be authenticated by an external entity (e.g., governmental agency) to the digital identity management platform. A silicon identification may be generated for multiple devices registered to the user and may include a unique identifier for each device. A digital identity may be generated that links the carbon identification and the silicon identification The digital identity may be stored within a digital wallet accessible on each device by a user profile created and secured using a blockchain process. A request to access the personal information stored within the digital identity may be received and a predefined trust level will determine the amount of personal information to be provided.

System and Method of Providing Physically Authenticated Digital Tracking and Association for Objects and Products
20230019729 · 2023-01-19 ·

A method and system comprising; a physical medium having a first unique identifier and a second unique identifier stored within; where said physical medium is in communication with a first distributed ledger having said first unique identifier associated with said second unique identifier stored within; where said distributed ledger is operatively connected with a first comparison algorithm providing; physical authentication of data associated with additional data elements; further provides mathematical coupling to further additional data which allows for novel visibility and management, including reducing inefficiencies and errors, within physical systems, for example product supply chains, without the need to fully replace current supply chain management systems.

SYSTEMS AND METHODS FOR STORING, MANAGING, VERIFYING, AND ACCREDITING DIGITAL DATA
20230015446 · 2023-01-19 ·

Embodiments provide methods and systems for verifying digital data. A method performed by server system to verify the digital data is disclosed. A request is received to verify information associated with a user. The request includes the credentials of the user for a digital platform. It is determined whether the information is present in a database associated with the digital platform. The information is verified by comparing the information with datasets stored in the database upon determining that the information is present in the database. Thereafter, a report is generated based on the verification. The report includes an output of the verification.

Access to secured networks for known entities

Techniques for connecting known entities to a protected network are described. A user device with a certified application installed is authenticated with an identification repository. The authentication is accomplished using credentials associated with the certified application. The user device is also enrolled with an authentication server and the authenticated user device is connected to the protected network.