H04L63/0807

BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES
20230007002 · 2023-01-05 · ·

Arrangements for controlling access to a protected entity include receiving a redirected client request to access the protected entity that includes a public key of the client; granting, in response to the received redirected request, access tokens of a first type to a client using the public key of the client; identifying a conversion transaction identifying a request to convert the first type of access tokens with access tokens of a second type, the transaction designating the protected entity; determining a conversion value for converting the first-type access tokens into second-type access tokens based on at least one access parameter; converting, using the conversion value, a first sum of the first-type access tokens into a second sum of second-type access tokens; and granting the client access to the protected entity when the sum of second-type of access tokens is received as a payment from the protected entity.

Authentication of an Entity

There is provided a method performed by a first entity of a network. Contextual information for the first entity and a timestamp for the contextual information is acquired (102). An authentication token is generated (104) using the acquired contextual information. Transmission of an authentication request message is initiated (106) towards a second entity of the network requesting authentication of the first entity with the second entity. The authentication request message comprises the generated authentication token and the timestamp for use in the authentication. An authentication response message indicative of whether authentication of the first entity with the second entity is successful or unsuccessful received (108).

PARTNER INTEGRATION NETWORK

Systems and methods are provided for a media provider to allow a user to access media objects with a third-party partner that authenticates the user and authorizes the user to access certain media objects. The media provider offers access to media objects, such as video content or audio content. The partner, through a relationship with the media provider, similarly offers access to the media provider's media objects, for example, as a service or benefit to the partner's customers or users. In particular, a partner integration server mediates user authentication and authorization by the partner. The partner integration server also allows the media provider to easily and flexibly to add and integrate additional partners.

SYSTEMS AND METHODS FOR TOKENIZATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII)
20230237194 · 2023-07-27 ·

Described herein is a data security system for enabling tokenized access to sensitive data, including a token provider configured to connect to a remote client computing device over a secure communication channel, and cause display, at the remote client computing device, of a token request user interface including a selection form listing sensitive data elements associated with a first data subject. The token provider is also configured to receive a request for an access token, including a user selection of a subset of the sensitive data elements and one or more access authorization parameters, and generate an access token that enables access to only the subset of the sensitive data elements according to the authorization parameters. The token provider also stores the access token in a token database with the one or more authorization parameters, and transmits, to the remote client computing device, a response including the access token.

PLAN INTERACTION UTILIZING CRYPTOGRAM

A method includes a network processing computer receiving an authorization request message comprising a token and a cryptogram during an interaction between a resource provider and a user. The network processing computer determines user credentials associated with the token. The network processing computer then determines a plan identifier based on the authorization request message. The network processing computer provides the plan identified to an authorizing entity computer.

IDENTIFYING GROUP MEMBERSHIP THROUGH DISCHARGE MACAROON ACCESS TOKENS
20230239151 · 2023-07-27 · ·

The disclosed technology teaches delegating authorization to access a resource server contingent upon group membership confirmation by a third-party identity management provider. As part of the technology, a client obtains a Macaroon Access Token with a third-party caveat that requires the client to obtain a one-time Discharge Macaroon Authorization from a third-party authority, and identifies both user group membership that needs to be checked, and a hint how to find the third-party authority. The client provides the Macaroon Access Token to the third-party authority. The client obtains, from the third-party authority, a Discharge Macaroon Access Token that identifies user group membership, and sends the Macaroon Access Token and the Discharge Macaroon Authorization to the resource server as proof of authorization.

METHOD AND APPARATUS WITH PROVIDER INFORMATION ACCESS AUTHORIZATION

A method and apparatus with provider information access authorization are provided. The method includes receiving a single sign-on (SSO) token from a provider apparatus for a validated login request by a client device for a user account, wherein the SSO token is indicative of the provider apparatus having authorized secure protocol access with the provider apparatus to access information at the provider apparatus associated with the user account, retrieving customer information from the provider apparatus using the SSO token, receiving information from the client device, confirming whether, based on the information and the customer information that a user of the user account is eligible to complete a data exchange, and in response to a result of the confirming being that the user of the user account is confirmed eligible to compete the data exchange, cause the provider apparatus to process the data exchange corresponding to the information.

SECURELY ARMING A MEMORY DEVICE FOR SELF-DESTRUCTION BY IMPLEMENTING A SELF-DESTRUCTION COUNTDOWN TIMER USING A BATTERY BACKED REAL-TIME CLOCK
20230004319 · 2023-01-05 ·

A processing device receives a command to arm a memory device for self-destruction. In response to the command, a self-destruction countdown timer is commenced. An expiry of the self-destruction countdown timer and based on detecting the expiry of the self-destruction countdown timer, data stored by the memory device is destructed.

Secure end-to-end transport through in intermediary nodes

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.

Secure key management in a high volume device deployment
11570159 · 2023-01-31 · ·

A method is provided for remotely and securely accessing a modem is provided that uses an encrypted authentication token with a modem password. The method includes receiving an encrypted authentication token from the modem, the authentication token having a modem password stored in secure memory and being encrypted according to a public key, transmitting the encrypted authentication token to an authentication server. receiving a decrypted authentication token from the authentication server, the decrypted authentication token comprising the modem password, generating an authentication key and a privacy key from the modem password, configuring modem interfaces at least in part using the authentication token, the modem interfaces including a network management protocol interface and communicating with the modem using the network management protocol interface according to at least one of the generated authentication key and the privacy key.