H04L9/3234

Systems and methods for identifying an individual

The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an individual. These systems and methods are useful for, amongst many applications, more secure identification of high-risk individuals attempting to gain access to an entity, transport, information, location, security organization, law enforcement organization, transaction, services, authorized status, and/or funds.

Systems and methods for dynamically and randomly encrypting and decrypting data
11637816 · 2023-04-25 · ·

A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods. The system and methods may be employed in virtually any system or network, and may be used to protect virtually any type of data, whether at rest (data storage), in motion (data transfer), or in use. In some embodiments, synchronization points are used as analogs for encryption/decryption keys, enabling the encrypting system and decrypting system to begin randomly altering encryption data in a like-manner, thereby creating a constantly changing encryption field that is virtually impossible to decrypt without authorization.

Secure authentication system with token service

An enhanced authentication system is described. One embodiment of the invention is directed to a method comprising: receiving, by a token service computer and from an initiating computer, a first authentication request message including verification method data and a token; transmitting, by the token service computer, a second authentication request message comprising the token and the verification method data to an access control server; receiving, by the token service computer from the access control server, an authentication response message comprising the token and a user authentication verification value; and transmitting, by the token service computer to the initiating computer, the authentication response message comprising the token, the user authentication verification value, and a token authentication verification value.

System and method for carrying out two factor authentication using augmented/virtual reality

There is provided a method and system for carrying out two factor authentication, which renders an augmented reality environment or a virtual reality environment at the user device to depict an authentication object, and when a user interaction with the authentication object is detected, an authentication code received from an issuer server is displayed at the user device.

Toner refill kits genuineness authentication using electrical signals

An image forming device and a method of operating an image forming device are provided. The method includes detecting a coupling of a first toner refill kit to an image forming device, obtaining, based on a first electrical signal generated in the first toner refill kit, first authentication data corresponding to the first electrical signal, obtaining a first authentication key used to authenticate the first toner refill kit from the first authentication data, applying the first authentication key to a predetermined criterion used to determine validity of an authentication key of a toner refill kit to confirm whether the first toner refill kit is genuine, and controlling a toner refilling operation of the first toner refill kit based on whether the first toner refill kit is genuine.

Method and apparatus for determining trust status of TPM, and storage medium

Various embodiments provide a method and an apparatus for determining a trust status of a TPM, and a storage medium, and pertains to the field of data security technologies. In those embodiments, a verifier send an unsealing request to a host, so that the host unseals current PCR values in the TPM based on a seal key handle carried in the unsealing request, and sends verification information to the verifier based on the unseal verification key obtained after the unsealing. Therefore, any verifier that establishes an encrypted channel with the host can determine the trust status of the TPM in the host based on a second verification key transmitted on the encrypted channel, and there is no need to pre-deploy a remote attestation server to determine the trust status of the TPM.

System and method for securing electronic document execution and authentication
11636218 · 2023-04-25 · ·

The present embodiments provide an environment where a user first creates or imports a document comprising of fields to be completed by one or more users. All users who have view-only access or can act on a document are considered to be “in the workflow.” All users in the workflow (except view-only users) can take actions in the document by editing, adding or entering values or signatures in those fields. When the document is complete, a computing device adds an encrypted token visualization element to the document that uniquely identifies and secures the document. Thereafter, a copy of the original document, all attachments, authentication, security and validation information, and all other relevant information about the document and users will be available to view in the chain of custody and audit trail by the authorized users by scanning the token visualization element within the platform (web application or mobile application).

Client device authentication using contactless legacy magnetic stripe data
11638148 · 2023-04-25 · ·

A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.

Vehicle operation device, vehicle operation method, and non-transitory storage medium storing vehicle operation program
11597349 · 2023-03-07 · ·

A vehicle operation device includes memory and a processor. The processor is configured to store tokens received from a server in the memory to be used for authentication to a vehicle. When an operation of the vehicle is performed in a state in which communication with the server is possible, a token is used to conduct authentication to the vehicle. When a predetermined operation of the vehicle is performed in a state in which communication with the server is interrupted, authentication to the vehicle is conducted without using a token.

Remote attestation of modular devices with multiple cryptoprocessors

A methodology for requesting at least one signed security measurement from at least one module is provided. The methodology includes receiving the at least one signed security measurement from the at least one module; validating the at least one signed security measurement; generating a signed dossier including all validated signed security measurements in a secure enclave, the signed dossier being used by an external network device for remote attestation of the device.