H04L9/3234

Method and Apparatus for Securely Backing Up and Restoring a Computer System
20230009355 · 2023-01-12 ·

Data of a computer system can be secured from malware. During a Primary Operating System (PrimaryOS) run-time, the system determines if the computer system has been compromised and, if so, a Trusted Operating System (TrustedOS) is launched and assumes control of the hardware resources and the software resources of the computer system. The TrustedOS obtains a cryptographic key that is inaccessible to the PrimaryOS. The TrustedOS uses the cryptographic key to disable writing to a first portion of the storage media that includes the first set of logical block addresses. The PrimaryOS can incrementally back-up files to a second set of logical block addresses on a second portion of the storage media. Control of the hardware resources and the software resources is returned to the PrimaryOS.

CALL CENTER WEB-BASED AUTHENTICATION USING A CONTACTLESS CARD
20230216688 · 2023-07-06 · ·

Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account.

Secure request authentication for a threat protection service
11552997 · 2023-01-10 · ·

A client application manages a resolver configuration and sends DNS requests to a threat protection service when a mobile device operating the client application is operating off-network. The client application detects network conditions and automatically configures an appropriate system-wide DNS resolution setting. DNS requests from the client identify the customer and the device to threat protection (TP) service resolvers without introducing a publicly-visible customer or device identifier. The TP system applies the correct policy to DNS requests coming from off-network clients. In particular, the TP resolver recognizes the customer for requests coming from such clients and applies the customer's policy. The resolver is also configured to log the customer and the device associated with requests from the TP off-net client. Request logs from the TP resolver are provided to a cloud security intelligence platform for threat intelligence analytics and customer visible reporting.

Method and system for authenticating a secure credential transfer to a device
11552798 · 2023-01-10 · ·

A method for authenticating a secure credential transfer to a device includes verifying user identity and device identity. In particular, the method includes verifying user identity by requesting and receiving a user identification input at a first client device and verifying device identity of a second client device by (i) determining a security status of the second client device from hardware of the second client device, (ii) invoking an identifier related to the security status of the second client device to an authentication server, and (iii) obtaining certification from the authentication server for the second client device based on the invoked identifier. After verifying the user identity and the device identity, the method includes establishing a secure channel between the first client device and the second client device for the secure credential transfer using one or more tokens generated by the authentication server.

Presentation of a verifiable credential having usage data

The presentation of a verifiable credential that is represented within a data structure that represents the verifiable credential as well as usage data of the verifiable credential. The usage of the verifiable credential is monitored, such that as usage of the verifiable credential changes or progresses, the stored usage data also changes. This data structure may be used to not only cause visual representations of the verifiable credential to be displayed to the user, but the user can selectively cause at least some of that usage data to also be presented to the user. Thus, the user can easily keep track of how their verifiable credential is being used, regardless of where or from which device the verifiable credential is presented.

Intercepting calls for encryption handling in persistent access multi-key systems

Some database systems may implement encryption services to improve the security of data stored in databases or on disks. The systems may implement encryption using multiple encryption keys. For example, a worker server may implement a system call interceptor, such as a filesystem in userspace (Fuse) driver. The system call interceptor may intercept system calls (e.g., associated with query or extract, transform, and load (ETL) jobs) as they enter or exit the kernel. The system call interceptor may determine whether data sets associated with the jobs are marked for encryption, and may perform an encryption process on the data sets. A worker may encrypt and store data sets on a worker disk or at a file store, or may retrieve and decrypt the data sets. The system may additionally manage encryption keys, and may provide mechanisms for archiving or revoking encryption keys while maintaining user access to stored data sets.

Access control apparatus and method for controlling configuration of automation apparatus
11693942 · 2023-07-04 · ·

An access control apparatus and method for controlling a configuration of an automation apparatus. The method includes: reading authentication information from an electronic tag; transmitting the authentication information to a networked service; receiving access rights from the networked service; and controlling the configuration of the automation apparatus according to the access rights.

Multi-factor authentication for access control using a wearable device
11693941 · 2023-07-04 ·

A system and method for providing multi-factor authentication for access through a door, but without the user having to repeat a physical act of providing authentication every time that the door is opened, wherein the first time through the door, multi-factor authentication is provided to the access control system, and wherein each subsequent access through the door, multi-factor authentication is performed automatically and without intervention of the user as long as the user has a wearable device providing at least one factor of the multi-factor authentication, and the user has not removed the wearable device since the multi-factor authentication was last provided to the access control system.

Systems and methods for contactless card activation

A method, apparatus, and system of activating and using a contactless card are disclosed. A mobile device includes a wireless chip structured to allow short-range wireless communications (e.g., a near-field communication), a processor, and a memory storing instructions. The mobile device is configured to communicate with a contactless card via a short-range wireless communication and receive a customer-specific uniform resource locator (URL) from the contactless card via a wireless chip. In response, the mobile device is configured to automatically open a web browser and navigate to a website associated with the customer-specific URL. The customer-specific URL identifying the client associated with the contactless card. The mobile device then prompts, via a GUI on the display, a user for authentication information, and based on a verification of the authentication information, display a confirmation page indicating activation of the contactless card.

Multi-device remote attestation
11695549 · 2023-07-04 · ·

Systems and methods for attesting an enclave in a network. A method includes receiving, by a first device, proof information from an application provider entity that the enclave is secure, wherein the proof information includes a public part, Ga, of information used by the enclave to derive a Diffie-Hellman key in a key generation process with the application provider entity, processing, by the first device, the proof information to verify that the enclave is secure and ensuring that Ga is authentic and/or valid, deriving, by the first device, a new Diffie-Hellman key, based on Ga and x, wherein x is a private part of information used by the first device to derive the new Diffie-Hellman key, and sending, by the first device, a message including Ga and a public part, Gx, of the information used by the first device to derive the new Diffie-Hellman key to the enclave.