Patent classifications
H04L63/062
Cloud computing architecture with secure multi-cloud integration
Aspects of the disclosure relate to cloud computing architectures. A system may include a plurality of clouds. One or more of the clouds may transfer data to another one or more of the clouds. A data integration platform may control the data transfer. The transfer may be securely routed through the data integration platform. The transfer may be logged, and the log may be transmitted to an administrative network.
Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods
Systems, methods, and software are disclosed for provisioning tokens in a networked computing environment including merchants participating in payment networks. The method includes receiving, by a merchant processor, card account data of a purchase card from a cardholder. The method includes determining, by the merchant processor, that the card account data includes a multi-token enabled BIN. The method includes, in response to determining that the card account data includes the multi-token enabled BIN, receiving and storing, by the merchant processor and in a memory of the merchant, respectively, a primary token associated with a front-of-card brand of the purchase card. The method includes, in response to receiving the primary token, transmitting, by the merchant processor, a request for a secondary token. The method includes receiving and storing, by the merchant processor and in the merchant memory, respectively, the secondary token simultaneously with storing the primary token.
Information processing device, information processing system, and method for controlling information processing device including comparing request order information and order comparison information
An information processing device updates its own secret key according to an update request including request order information, the information processing device being provided with: a storage unit that stores, in a nonvolatile manner, a master secret key, a secret key, and order comparison information that enables comparison of the request order of the update request; and an update unit that, in a case where the update request has been made, compares the request order information and the order comparison information, and in a case where it has been determined that the order of the update request is authorized, updates the order comparison information to information corresponding to the request order information before update processing of the secret key is performed by using the master secret key.
Secure scalable link key distribution using bootsrapping
An electronic device (such as an IoT controller) that distributes a link key is described. During operation, while an administrator is logged in, the electronic device may receive the link key using a secure widget, where the link key may facilitate secure communication via a link. Then, the electronic device may generate an access key, and may generate an encrypted version of the link key based at least in part on the access key and the link key, where the access key enables access to the link key based at least in part on the encrypted version of the link key. Next, the electronic device may store the link key, the access key and/or the encrypted version of the link key in a trusted envelope or partition in the memory with encryption. Moreover, when the administrator logs out, the electronic device may disable access to the trusted envelope.
Authentication key-based DLL service
Systems and methods are provided for implementing an authentication key-based DLL service. For example, the system can expose a list of functionalities and request format, and a byte string denotes a functionality corresponding to the API. Output is received by the user after loading a DLL library maintained by a DLL provider. The system can generate a key corresponding to the functionality and transmit the key to the user. The invocation of the functionality can be performed using the keys. The shared memory space may be used for inputs from the user and outputs of the DLL. The system can perform an action based on the authentication of the keys. During any functionality advancement, the system can notify the user to unload and reload the new DLL in order to make use of the advancements.
CLOUD-BASED SHARING OF DIGITAL KEYS
A system for managing an access to an asset is provided. A digital key to the asset is generated and synchronized between a first user device of a first user and an access control device that controls the access to the asset. A key-sharing request is initiated by the first user device to grant a second user the access to the asset. Based on the key-sharing request, an application server communicates the digital key to a second user device of the second user. When the second user device is within a detection range of the access control device, the access control device receives the digital key from the second user device, validates the digital key, and grants the second user the access to the asset for an access duration defined in the key-sharing request.
Policy-enabled encryption keys having complex logical operations
Examples described herein relate to a system for orchestrating a security object, including a memory and processor configured to define a plurality of complex policies in a database, wherein the complex policies comprises one or more of EQUAL policy, ONE-OF policy, MEMBER OF policy, NULL policy, NOT-NULL policy, GREATER-THAN policy, GREATER-THAN-OR-EQUAL-TO policy, LESS-THAN policy, or LESS-THAN-OR-EQUAL-TO policy, receive the security object and at least one object attribute associated with the security object, determine acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of complex policies corresponding to the at least one object attribute, and distribute the security object to at least one communication device associated with the processor when the security object is determined to be acceptable, wherein the at least one communication device establishes communication based, at least in part, on the security object.
Systems and methods for quick start-up of playback
Systems and methods for quick start-up of playback in accordance with embodiments of the invention are disclosed. Media content may be encoded in a plurality of alternative streams and a quick start-up stream. The quick start-up stream may include media content that is encoded at a lower quality that the alternative streams and may be encrypted with a different, less secure encryption process than that of the alternative streams. During a start-up of playback, the playback device streams the media content from a quick start-up stream until a metric, such as a decryption key for the alternative streams is met. The device then streams the media content from the alternative streams in response to the metric being met.
Method and apparatus for managing user authentication in a blockchain network
Provided is an apparatus for managing user authentication in a blockchain network and the apparatus comprises a processor configured to transmit, to a server, a request for a snapshot identifier (ID) with user data comprising at least one of one-time password, biometric data, context data, routine data, or device metadata, receive the snapshot ID generated based on the user data, initiate a transaction with the snapshot ID in the blockchain network comprising a blockchain server which authenticates the snapshot ID, and output blockchain transaction data associated with the transaction based on the authentication of the snapshot ID.
Web application execution with secure elements
Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.