H04L63/062

PROCESSING DEVICE, PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20230022953 · 2023-01-26 · ·

The present invention provides a processing device (1) including a storage unit (112) that stores device-specific information in association with device identification information for identifying each of a plurality of devices, an authentication key request reception unit (101) that receives an authentication key request including the device identification information, an authentication key issuing unit (102) that issues the authentication key, a license key request reception unit (103) that receives a license key request including the device identification information and the authentication key, a license key issuing unit (104) that issues a license key, a user identification information registration unit (107) that stores the user identification information of the user who has presented the license key, in association with the device identification information associated with the license key, and a device control unit (111) that integrally controls the plurality of devices identifying a plurality of pieces of device identification information associated with the same user identification information.

BIOMETRIC ACTIVITY BASED PAIRING PROTOCOLS FOR WEARABLE DEVICES
20230239698 · 2023-07-27 ·

The present invention teaches a method of pairing two user worn devices including collecting first and second biometric activity from respective first and second user worn devices to create first and second biometric signals, processing the first and second biometric signals to create first and second keys and determining if the keys match to allow for pairing of the two user worn devices. The first and second biometric activity may be the same or different biometric activities. The processing of the biometric signals is adjusted based upon the types of biometric activities being sensed.

Distributed management and installation of digital certificates on a cluster for authentication with an external key management service

Hosts in a cluster in a virtualized computing environment bypass a management layer when communicating with an external key management service (KMS). One of the hosts is configured with KMS configuration information (including digital certificate information) that enables the host to directly communicate with the KMS via a secure communication connection, instead of communicating with the KMS via the management layer. This KMS configuration information is replicated in a distributed manner from the host to the other hosts in the cluster, thereby enabling the other hosts in the cluster to also directly and independently communicate with the KMS to obtain encryption keys to perform cryptographic operations.

Multi-Party Exchange Platform

Arrangements for providing multi-party exchange functions are provided. In some aspects, a request for exchange may be received by a computing platform. The request for exchange may include identification of parties involved in the exchange, identification of goods, services, property, or the like, involved in the exchange, and the like. In some examples, the computing platform may determine a value of property, goods, or services associated with the exchange. The computing platform may request additional exchange data from one or more other parties. For instance, data associated with the exchange and another party to the exchange may be requested and received. In some examples, unique exchange identifiers may be generated linking each party to the exchange to the goods, services or property being exchange, a value, or the like. An indication of acceptance may be received and one or more exchange processing functions may be executed.

SYSTEM FOR ELECTRONIC DATA ENCRYPTION AND DECRYPTION USING A CONSENSUS DRAFT PROCESS
20230028290 · 2023-01-26 · ·

A system is provided for electronic data encryption and decryption using a consensus draft process. In particular, the system may use a custom encryption algorithm that generates an array with a number of entries that is dependent on the number of computing devices that participate in the encryption process. The encryption algorithm may cause a first computing device to open and read the array, randomly select and remove an entry, and pass on the remaining entries to a second computing device. The second computing device may then open and read the array, randomly select and remove an entry, then pass the remaining entries to a third computing device. The process may be executed in a reiterative manner until the entire array is distributed among the participating computing devices. In this way, encryption of data may be performed without revealing shared information among the participating computing devices.

Methods and apparatus to collect distributed user information for media impressions and search terms

Methods and apparatus to collect distributed user information for media impressions and search terms are disclosed. An example method includes accessing, from a media device, a first identifier and a search term at a first server, the first identifier corresponding to at least one of the media device or a user of the media device, the search term associated with a search request, generating a second identifier based on the first identifier, sending the second identifier and the search term from the first server to a data collection server to facilitate the data collection server to logging the search request, and receiving user information associated with the search request from a database proprietor based on the second identifier.

Method and System for Updating Certificate Issuer Public Key, and Related Device
20230232227 · 2023-07-20 ·

A method includes receiving, by an embedded universal integrated circuit card (eUICC), first information from a local profile assistant (LPA), where the first information includes a first certificate issuer (CI) public key identifier, and the first CI public key identifier is a CI public key identifier that the eUICC does not have. The method further includes sending, by the eUICC, second information to an OPS, where the second information includes the first CI public key identifier. The method further includes receiving, by the eUICC, a patch package from the OPS, where the patch package includes at least a first CI public key corresponding to the first CI public key identifier. The method further includes updating, by the eUICC, a CI public key of the eUICC by using the first CI public key.

Data access management for a composition

Systems and methods provide a transient component limited access to data in a composition. One method includes receiving a request for the transient component to access data in the composition. The composition may include permanent components operable to utilize encryption keys generated at selected intervals from a seed value shared by the permanent components. The encryption keys utilized by the permanent components at each selected interval may be identical to one another. The method also includes generating a set of encryption keys from the seed value for a specified period of time. The set of encryption keys may be identical to the encryption keys to be utilized by the permanent components at the selected intervals to occur during the specified period of time. The method further includes granting the transient component access to data in the composition for the specified period of time via the set of encryption keys.

Securing a path at a selected node

A path is secured from one node to another node of the computing environment. The one node obtains a first encryption key and a second encryption key. A shared key is obtained by the one node from a key server, and the shared key is used to encrypt a message. The encrypted message includes the first encryption key and the second encryption key. The encrypted message and an identifier of the shared key is sent from the one node to the other node, and a response message is received by the one node. The response message at least provides an indication that the other node received the encrypted message and obtained the shared key.

Video start-time reduction employing reductive edging principles

Prior to receiving a request from a client device for information from a content distribution network (CDN), a Reductive Edging device predictively requests the information from the CDN based on prior user activity and stores it in memory. The Reductive Edging device is thus configured to respond to the request from the client device for information from the CDN with the information stored in the memory prior to receiving the request.