H04L9/3297

NETWORK ARCHITECTURES UTILIZING CELLULAR NETWORK HOSTED ACCESS CONTROLLING SCHEMAS TO FACILITATE INTERNET ACTIVITIES, AND METHODS FOR USE THEREOF
20230217255 · 2023-07-06 ·

In some embodiments, the present disclosure is directed to an exemplary process including: displaying, by a processor of a computing device, an access controller interface element and an access code on a screen of the computing device; where the access controller interface element is: communicatively coupled to a cellular network hosted access controlling schema and operationally linked to an access-restricted digital resource; transmitting, by the processor of the computing device, in response to the at least one activity, an access request having data that includes: the access code and an identity linked to the computing device; where at least one part of the data is configured to be accepted by the cellular network hosted access controlling schema; accessing, by the processor of the computing device, the access-restricted digital resource after the at least one part of the data has been accepted by the cellular network hosted access controlling schema.

SYSTEM AND METHOD FOR SECURE FILE-SHARING VIA A DISTRIBUTED NETWORK
20230216694 · 2023-07-06 · ·

Systems, computer program products, and methods are described herein for secure file-sharing. The present invention may be configured to receive a request to store data on a network, process the request through a firewall. Processing the request includes: generating a first electronic digital certificate, storing the first electronic digital certificate on a distributed ledger, encrypting the data using the first electronic digital certificate, storing the encrypted data on at least one of the plurality of data server nodes, and recording the request on the distributed ledger. The present invention is further configured to receive and process a second request. Processing the second request includes: decrypting the data using the second electronic digital certificate, providing the decrypted data to the second requestor, and recording the second request on the distributed ledger.

METHOD AND SYSTEM FOR IMPROVING COUPLING AND COHESION OF AT LEAST ONE EDUCATIONAL PROGRAM
20230216675 · 2023-07-06 ·

Methods and systems to improve coupling and cohesion of at least one educational program are provided. In some examples, the methods and systems include at least one educational program, where the at least one educational program comprises a first application programming interface (API) that is configured to be coupled to a second API of an internet enabled electronic device in a restricted state and partially decoupled in an unrestricted state.

Distributed ledger-based digital content tracing

Methods and systems for distributed ledger-based digital content distribution chain tracing may comprise receiving an indication of a content asset and an indication of a first user associated with the content asset. A first distributed ledger record may be stored and/or created on a distributed ledger comprising the indication of the content asset and the indication of the first user. A second distributed ledger record may be stored on and/or created on the distributed ledger comprising an indication of a second user associated with the content asset. A version of the content asset may be generated comprising one or more frames having a digital marker. The digital marker may comprise an indication of the first user. At least one of the first distributed ledger record or the second distributed ledger record may be determined based on the digital marker as part of tracking or tracing the content asset.

METHOD, APPARATUS, AND SYSTEM FOR PROVIDING TRANSACTION PROOF OF LOCATION
20230216691 · 2023-07-06 ·

An approach is provided for generating a transaction proof of location. The approach, for example, involves collecting sensor data from one or more sensors of a device at a time, a location, or a combination thereof associated with a transaction. The sensor data represents one or more environmental observations of the location. The approach also involves generating a capsule of the one or more environmental observations and tagging the capsule with the time of the transaction. The approach further involves cryptographically signing the capsule and providing the cryptographically signed capsule as a proof of location.

SECURING BORDER GATEWAY PROTOCOL ROUTE PROPAGATION AND UPDATING
20230216863 · 2023-07-06 ·

Embodiments of the present invention provide systems, methods, and computer storage media directed to propagating and authenticating border gateway protocol route advertisements. A trusted authority device stores and distributes routing information for various autonomous systems. The trusted authority device also issues and maintains digital certificates that are each assigned to one of the autonomous systems. The digital certificate can be utilized by autonomous systems to verify the authenticity of routing information advertised by another autonomous system. Each autonomous system can employ a routing device that can generate a route advertisement based on routing information received from the trusted authority device. The route advertisement can include a digital signature, a digital certificate, and a time-to-live value, among other things, each of which can be utilized by routing devices of other autonomous systems to determine the authenticity and validity of received routing information.

Method of operating memory system with replay attack countermeasure and memory system performing the same
11552801 · 2023-01-10 · ·

In a method of operating a memory system, first security data and a first timestamp for preventing a replay attack are written by a host device to a first memory area which is an external memory area. A second timestamp is updated by the host device based on the first timestamp. The second timestamp corresponding to the first timestamp is stored in a second memory area distinguished from the first memory area. A first notification signal representing a result of updating the second timestamp is received by the host device. A writing operation for the first security data is completed when it is determined, by the host device, based on the first notification signal that the second timestamp is successfully updated.

Using security event correlation to describe an authentication process

Techniques are described herein that are capable of using security event correlation to describe an authentication process. Multiple events may describe a common (i.e., same) attempt to authenticate the user. For instance, a first event may include a first description of the attempt, a second event may include a second description of the attempt, and a third event may include a third description of the attempt. The first, second, and third events may be correlated based at least in part on the first, second, and third descriptions. The first, second, and third events may be aggregated to provide an aggregated event that includes an aggregation of the first, second, and third descriptions. An authentication report may be generated to include the aggregation of the first, second, and third descriptions to describe the authentication process.

Systems and methods for prescription and dosing of therapeutic stimuli using recorded guarantees

Systems and methods for management of a distributed ledger including prescription information are disclosed. An example apparatus includes a processor and a logical data structure to configure a device according to an electronic prescription defining an action for a patient, the electronic prescription organized as record(s) in a distributed ledger and processible by the device to apply the action to the patient. The electronic prescription is to cause the device to at least: configure the device to apply the action to the patient; validate the action for the patient using the distributed ledger; and propagate a record of the action to the distributed ledger.

Secure aggregation of IoT messages

A system includes processing circuitry; and a memory device including instructions embodied thereon, wherein the instructions, which when executed by the processing circuitry, configure the processing circuitry to perform operations comprising: accessing input data, at an aggregator node, the input data including sensor data from a plurality of sensor nodes, each sensor data having a respective signature; validating the sensor data by using respective cryptographic hash functions on the sensor data and evaluating the respective result using the respective signature; performing an aggregation function on the sensor data to produce aggregate data; executing a hash function on the aggregate data to produce a hash value for the aggregate data; bundling the sensor data, respective signatures of the sensor data, aggregate data, and hash value for the aggregate data in a data structure; and exposing the data structure to subscriber nodes on the IoT network.