H04L9/0863

Systems and methods for network authentication with a shared secret

A computing system can associate a customer device of a customer with a financial transaction record and the merchant, the financial transaction record indicative of a first purchase from the merchant by the customer, transmit a first query to the customer device prompting the customer to input information regarding an aspect of the first purchase, the first query including a description of a predetermined product parameter of the financial transaction record indicative of the first purchase from the merchant by the customer, authenticating, by the computing system, the first request by determining that the customer-input response to the first query corresponds to the established aspect of the first purchase in accordance with a predetermined accuracy threshold, and authorizing, by the computing system, connection of the customer device to the network provided by the merchant based at least in part on the first request being authenticated.

Encryption method, decryption method, encryption system and decryption system

An encryption method includes an operation method of an encryption system and is a method of encrypting encryption target information.

Secure scalable link key distribution using bootsrapping

An electronic device (such as an IoT controller) that distributes a link key is described. During operation, while an administrator is logged in, the electronic device may receive the link key using a secure widget, where the link key may facilitate secure communication via a link. Then, the electronic device may generate an access key, and may generate an encrypted version of the link key based at least in part on the access key and the link key, where the access key enables access to the link key based at least in part on the encrypted version of the link key. Next, the electronic device may store the link key, the access key and/or the encrypted version of the link key in a trusted envelope or partition in the memory with encryption. Moreover, when the administrator logs out, the electronic device may disable access to the trusted envelope.

PASSCODE AUTHENTICATION BASED DATA STORAGE DEVICE

A data storage device comprising a data path and an access controller, wherein: the data path comprises: a data port configured to transmit data between a host computer system and the data storage device, wherein the data storage device is configured to register with the host computer system as a block data storage device; a non-volatile storage medium configured to store user content data; and the access controller is configured to: repeatedly and automatically generate a dynamically changing unlock passcode for unlocking the data storage device; receive a first passcode including, at least, an input passcode provided by a user device external to the data storage device, wherein the input passcode is generated externally to the data storage device and synchronously with the generation of the unlock passcode by the access controller; and provide access to the user content data via the data port in response to the first passcode matching with a second passcode generated by the access controller, wherein the second passcode includes at least the unlock passcode.

Method and apparatus for managing user authentication in a blockchain network

Provided is an apparatus for managing user authentication in a blockchain network and the apparatus comprises a processor configured to transmit, to a server, a request for a snapshot identifier (ID) with user data comprising at least one of one-time password, biometric data, context data, routine data, or device metadata, receive the snapshot ID generated based on the user data, initiate a transaction with the snapshot ID in the blockchain network comprising a blockchain server which authenticates the snapshot ID, and output blockchain transaction data associated with the transaction based on the authentication of the snapshot ID.

METHOD AND DEVICE FOR SECURE COMMUNICATION
20220407693 · 2022-12-22 · ·

A method and device are provided for secure internet communication between a computing device and a server. The method employs non-extractable data stored within the device for the generation of a pair of master encryption keys, and the secure, non-internet transfer of one of the pair of keys to the server. Thereafter, communications between the device and the server are encrypted with one-time keys, the one-time keys being themselves encrypted with the master keys. At no time are either of the master keys transmitted over the internet, and at no time are the master keys stored together in a single device.

MULTIPLE DEVICE COLLABORATION AUTHENTICATION

An approach to multi-device collaboration authentication may be provided. The approach may include generating a password in response to a user requesting access to a service or application on a primary device. The approach may include dynamically determining whether secondary devices are located physically near a primary device. The generated password may be segmented into two or more parts, based on the number of secondary devices the physically located near the primary device. A password segment can be sent to the primary device and another segment of the password can be sent to the secondary device determined to be physically near the primary device. The approach can include receiving the password segments in prescribed manner to provide authentication and grant access to the requested application or service.

TRANSPARENT REMOTE MEMORY ACCESS OVER NETWORK PROTOCOL
20220398215 · 2022-12-15 ·

A system for providing memory access is disclosed. In some embodiments, the system is configured to receive at a source server fabric adapter (SFA), from a server, a memory access request comprising a virtual memory address; using associative mapping, determining whether the virtual address corresponds to a source-local memory associated with the source SFA or to a remote memory. If the virtual address corresponds to the source-local memory, the virtual memory address is translated, at the source SFA, into a physical memory address of the source-local memory. If the virtual address corresponds to the remote memory, a request message is synthesized, and the synthesized request message is transmitted to the destination SFA using a network protocol.

System for sending verifiable e-mail
11516187 · 2022-11-29 · ·

A system for and method of transmitting verifiable e-mail includes a message ID sent to a recipient of the e-mail. A system for and method of transmitting encrypted files using email and other electronic communication channels includes a computer program for storing encrypted files supplied by a user, creating a link to 5 the encrypted files to be e-mailed to a recipient, allowing download of the encrypted files when an authorization code is provided after the link is used to go to a system server, wherein the authorization code is sent to a telephone of the recipient, via text or aurally.

Password input system
11514148 · 2022-11-29 ·

A password input system equipped with a security setting function is disclosed. The system includes one input unit configured to receive an input from user; an output unit configured to output a current state and result; a dedicated communication port configured to transmit and receive data to and from a password adaptor; a memory configured to save a program for security setting function; and a processor configured to execute the program saved in memory. When the processor waits for an input of a password from user and simultaneously password adaptor is coupled to dedicated communication port, the processor receives a password through communication with password adaptor and compares received password with a pre-saved password, and when the received password matches the pre-saved password, the processor unlocks a secure state without further inputting a password.