H04L9/3231

DECENTRALIZED IDENTITY WITH USER BIOMETRICS
20230029053 · 2023-01-26 ·

Systems, methods, and other embodiments for decentralized identity with user biometrics are presented herein. In one embodiment, a method includes, in response to a request to access resources of a cloud service provider by a computing device, transmitting a request for a biometric private key to a mobile device associated with a user; in response to receiving the biometric private key, submitting the biometric private key for validation against a blockchain associated with the user and the mobile device; adding a record of the results of the validation to the blockchain; and controlling access to the resources of the cloud service provider based on the record in the blockchain by (i) denying access where the record indicates that validation has failed (ii) granting access where the record indicates that validation has succeeded.

SECURE DATA PARSER METHOD AND SYSTEM

A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.

METHODS AND SYSTEMS FOR MANAGEMENT OF A BLOCKCHAIN-BASED COMPUTER-ENABLED NETWORKED ECOSYSTEM
20230230079 · 2023-07-20 ·

An ecosystem is configured to facilitate digital exchange of digital assets in a digital asset marketplace. The ecosystem includes one or more of a plurality of participant systems selected from a list of participant systems including asset user systems, asset holder systems, and asset mining systems. The ecosystem operates on a computer-executable asset wrapper that is associated with the digital asset and that is configured in the form of a multi-layered structure. The ecosystem also includes a codec that is associated with the asset wrapper and configured as a computer executable file. The codec is executed responsive to a request for an exchange on the marketplace that is associated with the digital asset. The ecosystem further includes a blockchain device to execute a blockchain smart contract for the asset exchange. The blockchain smart contract is executed against a set of right tokens characterizing a specific cryptocurrency value.

Authentication processing service

Systems, methods, and computer-readable media for facilitating an authentication processing service are provided.

SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
20230231820 · 2023-07-20 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

Detection of replay attack
11704397 · 2023-07-18 · ·

In order to detect a replay attack in a speaker recognition system, at least one feature is identified in a detected magnetic field. It is then determined whether the at least one identified feature of the detected magnetic field is indicative of playback of speech through a loudspeaker. If so, it is determined that a replay attack may have taken place.

Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal

Fingerprint encryption method and device, fingerprint decryption method and device, storage medium and terminal are provided. The fingerprint encryption method includes: acquiring a fingerprint image; dividing the fingerprint image into a plurality of block images according to a preset window, wherein a size of the block image is the same with a size of the preset window; determining identifiers of the plurality of block images, wherein the identifiers of the plurality of block images have a first preset order; and determining, according to the identifiers of the plurality of block images and a received encryption order, a plurality of encrypted block images to obtain an encrypted fingerprint image. Security of fingerprint storage or fingerprint transmission is enhanced.

Method and apparatus for user authentication

A method for user authentication according to one embodiment of the present disclosure includes acquiring authentication information including biometric information of a user, generating a random string and a helper string from the biometric information, generating a secret value that corresponds to the authentication information, generating a private key and a public key using the secret value and the random string, and transmitting the public key to an authentication server.

Subscriber identification module (SIM) authentication protections
11706629 · 2023-07-18 · ·

A method of computer authentication of a user request for a Subscriber Identity Module (SIM) card transfer by a biometric signature from a user equipment (UE) comprising assigning a risk score, by a mobile service provider, to a user account based on user activity in the user account, wherein the user activity includes a SIM card transfer authorization. The mobile service provider then sends a message requesting a biometric signature from an authentication application executing in memory on the UE. The authentication application on the UE then proceeds capturing a biometric signature, encrypting the biometric signature, and sending an encrypted biometric signature to the mobile service provider using a wireless communication protocol. The mobile service provider then compares the biometric signature to an authorized signature and modifies the risk score based on the comparison.

BIO-LOCKED SEED
20230224150 · 2023-07-13 ·

A computer-implemented method of storing a biometric vault system on a blockchain, wherein the biometric vault system comprises one or more biometric vaults, each biometric vault locking a respective secret value, and wherein the method comprises: obtaining at least one biometric reading; identifying a plurality of biometric features from the at least one biometric reading; generating one or more first biometric vaults; generating one or more blockchain transactions, wherein each blockchain transaction comprises a respective output comprising at least part of a respective second biometric vault, wherein each second biometric vault comprises a respective first biometric vault; and transmitting the one or more blockchain transactions to the blockchain network.