H04L9/3234

Methods and systems for efficient cryptographic third-party authentication of asset transfers using trusted computing
11601272 · 2023-03-07 · ·

A system for efficient third-party authentication of asset transfers using trusted computing includes a process authentication node configured to receive transfer data relating to an asset transfer, wherein the transfer data includes at least a first authentication datum, retrieve, from an instance of a secure listing, a first digitally signed assertion including at least a second authentication datum, wherein the first digitally signed assertion is generated by a data validator device as a function of information of a transferring entity, compare the at least a first authentication datum to the at least a second authentication datum, and authenticate the transfer data as a function of the comparing of the at least a first authentication datum to the at least a second authentication datum.

Apparatus and methods for testing circuit elements at one or more manufacturing stages

A method for testing circuit elements at one or more manufacturing stages comprising receiving, at a circuit verifier a fingerprint of at least a circuit element to be manufactured, wherein the fingerprint further comprises at least an expected output corresponding to at least a test input, transmitting, from the circuit verifier the at least a test input to the at least a circuit element, receiving, at the circuit verifier at least a test output from the at least a circuit element, and comparing, by the circuit verifier the at least a test output to the at least an expected output of the fingerprint of the at least a circuit element.

Method and apparatus for effecting a data-based activity

A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.

Systems and methods for a transaction card having a cryptographic key

A method, apparatus, and system of activating and using a contactless card are disclosed. More particularly, a transaction card including a contactless enabled chip having payment information and identity information stored thereon, where the contactless enabled chip is configured to communicate the identity information to a mobile device via a contactless communication, and where the identity information comprises a cryptographic key, cryptographic token, or a digital certificate is disclosed.

REMOTE SECURED TERMINAL

A method for providing a secured client computer that includes peripheral components. Each peripheral component processes a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component codes the corresponding data of the data type for establishing a secured peer-to-peer communication with other peripheral components.

Using secure tokens for stateless software defined networking

Systems and techniques are described to facilitate using secure tokens for stateless software defined networking. An initial configuration may be created for deploying a network device at a deployment site. A cryptographically secure certificate may be created that includes the initial configuration for deploying the network device at the deployment site. The cryptographically secure certificate may be stored in a secure token that can be inserted into a secure token reader that is located at the deployment site and communicatively coupled to the device at the deployment site. The network device may then be configured at the deployment site by using the secure token.

Data communication system to selectively and securely couple distributed ledgers with artificial intelligence (AI) engines

A data communication system generates Artificial Intelligence (AI) responses to distributed ledger data. In the data communication system, ledger clients discover distributed ledgers and establish hardware-trust with the distributed ledgers. The ledger clients discover AI engines and establish hardware-trust with the AI engines. The ledger clients read ledger information from the top data blocks of the distributed ledgers and select top-block ledger information. The ledger clients select AI engines to receive the selected top-block ledger information and transfer the selected ledger information to the selected AI engines. The selected AI engines process the selected top-block ledger information and generate the AI responses.

SINGLE SIGN-ON USING SMART CREDENTIAL

Methods and systems for facilitating authentication of a user with a plurality of applications are described. One method includes authenticating a user with a first secure application based on information received from a smart credential stored on a mobile device via a local wireless connection. The method includes obtaining a remote challenge from a remote authentication service and a mobile challenge, signing the mobile challenge with a private key, and transmitting a signed version of the mobile challenge, the remote challenge, and a public key to the mobile device. The method further includes receiving a signed version of the remote challenge and a certificate indicating validation of the mobile challenge, and transmitting the signed version of the remote challenge to the remote authentication service. Based on receiving an authentication result from the remote authentication service, access is granted to a remote secure application via the browser.

DECENTRALIZED CONTENT FABRIC
20230064466 · 2023-03-02 ·

Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to execute a software stack to define a fabric node of a plurality of fabric nodes of an overlay network situated in an application layer differentiated from an internet protocol layer. The defined fabric node is configured to: obtain a request for digital content from a client device; obtain, from one or more of the plurality of fabric nodes, a plurality of content object parts of a content object representing, in the overlay network, at least a portion of the digital content; generate consumable media using: raw data stored in the content object parts, metadata stored in the content object parts, and build instructions stored in the content object parts; and provide the consumable media to the client device. In some instances, the consumable media is further generated using a digital contract stored in a blockchain.

SYSTEM AND METHOD FOR PROCESSING CHIP-CARD TRANSACTIONS FROM A HOST COMPUTER
20230065485 · 2023-03-02 · ·

A system, method and computer-readable medium for interfacing with an EMV compliant chip card having an embedded microchip. A transaction computer includes a virtual credit card terminal running in a web browser and that is in communication with an EMV card reader having a chip card slot. The virtual terminal defines a first EMV transaction and a second EMV transaction based upon user input. The virtual terminal then causes the embedded microchip of the EMV chip card to generate a first cryptogram associated with the first transaction and a second cryptogram associated with the second transaction during a contact interface session or a contactless interface session. The virtual terminal then authenticates the first and second cryptograms over a computer network with a card issuer. Once authenticated, the virtual terminal completes the first transaction and the second transaction.