Patent classifications
H04L9/3236
Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information
Methods, systems, and media for secure authentication of users using one or more biometric recognition systems are provided. In some embodiments, the method comprises: receiving an indication that a biometric identifier is to be used to authenticate a user to a service; receiving (i) the biometric identifier of the user from a capture device and (ii) knowledge-based secondary information associated with the user from an input device; determining a Voronoi cell identifier that corresponds to the biometric identifier; calculating a hash of the Voronoi cell identifier and the knowledge-based secondary information; transmitting the hash to a server device for verification; in response to transmitting the hash to the server device, receiving a response indicating whether the hash matches a previously stored hash that was stored in the server device; and determining whether to automatically authenticate the user to the service based on the response from the server device.
SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION
Systems and methods are provided for authenticating an identity of a user requesting a resource or service from an entity. In some embodiments, a system may include at least one processor; and a non-transitory medium containing instructions that cause the system to perform operations. The operations may include receiving credential information associated with the remote user, and receiving, from the server associated with the entity, first hash information. The operations may also include generating second hash information based on information associated with the user, comparing the first hash information with the second hash information, and transmitting an indication based on the comparison to the server associated with the entity.
SECURE OFF-CHAIN BLOCKCHAIN TRANSACTIONS
Provided herein is a computer-implemented method, a system, and a non-transitory computer-readable storage medium. The system may be implemented using a blockchain network. The computer-implemented method includes: i) attaching a digital asset of a first entity to an exchange platform; ii) computing a first shared key associated with the digital asset using a key of the first entity and a first key of the exchange platform; iii) generating and broadcasting a first blockchain transaction to a blockchain network; and iv) initiating, by the first entity, transfer of ownership of the digital asset from a first entity to a second entity; v) computing a second key and a second shared key; vi) replacing the first key associated with the exchange platform with the second key associated with the exchange platform; and vii) detaching, by the second entity, the deposit from the exchange platform using the second shared key.
METHOD FOR IMPROVING DATA TRANSMISSION SECURITY
A method for improving data transmission security at a user equipment comprises receiving, from a source network node, a connection release message including instructions for computing a hash value for data to be included in a connection request message; computing the hash value based on the instructions included in the connection release message; calculating a token based on the hash value, and sending, to a target network node, the connection request message including the token. The method may further forward the data from the target network node directly to a gateway after the token has been verified. The method may reduce a signaling overhead by having a fixed-size hash value for data. Furthermore, the method may improve a transmission security by including the token in an RRC message, in which the token is calculated based on the hash value representing the data.
METHOD AND CORRESPONDING TELECOMMUNICATION NETWORK FOR SECURE DATA TRANSMISSIONS
A method of communication between nodes in a telecommunications network, each node maintaining a copy of a shared digital ledger, including that each sending node of a data packet executes the steps of: identifying a receiver node to which to transmit said data packet, generating the data packet to be delivered to a recipient node, transmitting to the receiver node the data packet, issuing a request to the nodes of the telecommunication network to record said data packet transmission on the distributed ledger, and when a data packet is received, the method requires that each receiver node, other than the recipient node of the data packet, repeat some of the steps. The method can also include generating, recursively, a data block of the distributed ledger and recording transmission of the data packet in the data block.
END-POINT CONFIGURATION AND HARDENING FOR IOT DEVICES
A process for management of Internet-of-Things (IoT) devices includes a management system for identifying, interrogating, and updating devices connected to one or more networks. The management system can include a data store for storing various data related to the devices and the various processes of the management system. The management system can include a controller for executing processes such as interrogation processes, firmware change processes, credential change processes, and other processes. The controller can determine versions of firmware and other configuration properties of a device and generate various profiles for updating the firmware and other configuration properties. The controller can determine upgrade paths for updating the firmware and other configuration properties from a first version to a second version, the upgrade paths including one or more intermediary versions for facilitating the upgrade path. The management system can update devices individually, on a device family basis, or on a system-wide basis.
INTEGRATING BIOMETRIC DATA ON A BLOCKCHAIN SYSTEM
A method of initiating a transaction in a blockchain system includes receiving, by a processing device, biometric data associated with a first party of a transaction to be added to a block of a blockchain system. The method further includes providing the biometric data to a validation node of the blockchain system. The method further includes determining that the biometric data has been validated by the validation node. The method further includes, in response to determining that the biometric data has been validated, recording, by the processing device, the biometric data in the block of the blockchain system.
BLOCKCHAIN JOINING FOR A LIMITED PROCESSING CAPABILITY DEVICE AND DEVICE ACCESS SECURITY
A computer-implement method comprises: selecting a trusted computing node via smart contract on a blockchain; completing remote attestation of the selected trusted computing node; writing secret information to an enclave of the selected node; causing a thin device to establish a private connection with the selected node without revealing the secret information; and causing the selected node to act as a proxy on the blockchain for the device. Another method comprises: receiving a signed device access request from a device owner; validating, by the verification node, the received request; executing, by a verification node, a smart contract on a blockchain based on the received request; and producing, based on the executed smart contract, an output command to access the device for the device to validate, decrypt and execute.
INTELLIGENT DATAFLOW-BASED SERVICE DISCOVERY AND ANALYSIS
The disclosed embodiments are directed toward monitoring and classifying encrypted network traffic. In one embodiment, a method is disclosed comprising intercepting an encrypted network request, the network request transmitted by a client device to a network endpoint; identifying a network service associated with the network endpoint based on unencrypted properties of the encrypted network request; identifying, based on the encrypted network request and a series of subsequent network requests issued by the client device, an action taken by the client device, the action comprising an activity performed during a session established with the network service; and updating a catalog of network interactions using the network service and the action.
SYSTEM AND METHOD FOR DIGITAL PROOF GENERATION
A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.