Patent classifications
H04L63/0414
CONTROLLING ACCESS TO DATASETS DESCRIBED IN A CRYPTOGRAPHICALLY SIGNED RECORD
In a dataset exchange environment in which datasets are available for exchange or transformation, a dataset validation platform may be configured to update a cryptographically signed record based on each dataset that is available via the data exchange environment. The dataset validation platform may be further configured to control access to the datasets based on whether a request to access a particular dataset is compliant with an availability requirement of the particular dataset. The dataset validation platform may be further configured to update the cryptographically signed record based on requests to access the datasets, transformations that are based on the datasets, or modifications to the availability requirement of the datasets, such as a modification to a privacy limitation or other availability requirement indicating a criteria for usage of the requested dataset.
System for Improving Data Security
A system allows a user to store his personally identifiable information (PII) on a personal device. When a third party wants to access the user's PII (e.g., to update the PII or to retrieve the PII), a notification will be presented to the user on the personal device seeking consent to the access. The notification may inform the user as to what information is being requested and which entity is requesting the access. The requested access will be denied unless the user consents to the access. In this manner, the user is given control over the dissemination of his PII. Additionally, the system alters or adjusts the PII that is stored in third-party servers so that even if these servers are breached, the user's actual PII is not exposed.
NETWORK CACHE OF DEVICE INPUT FOR REDUNDANCY DURING DEVICE INOPERABILITY
There are provided systems and methods for a network cache of device input for redundancy during device inoperability. A device may detect that the device is in danger of failure, for example, if a battery is low on the device, the device is damaged, or the device may lose network connectivity. On detection of such a condition, the device may request that a server that performs electronic transaction processing establish or trigger a mode that allows for caching of transaction data as input for the transaction data is entered to a device, which may be done by sending signaling to the server indicating the condition that affects the device's operability. The server may then cache input for the transaction data. If the device fails prior to approving and completing electronic transaction processing, the server may use the cached data to generate a digital ledger for another entity.
IDENTIFICATION OF TARGETS FOR A CAMPAIGN BY REFERENCING A BLOCKCHAIN AND/OR A DISTRIBUTED SYSTEM FILE SYSTEM
A device, that is part of a network of nodes that has access to a blockchain, may receive, from a user device associated with an entity, a request for campaign information for a campaign. The request may include data identifying campaign parameters. The device may interact with smart contracts associated with the blockchain to identify individuals to target for the campaign. The smart contracts may be configured to receive the campaign parameters as input and to output an indication of whether campaign preferences are compatible with the campaign parameters. The device may generate the campaign information to include information identifying the individuals targeted for the campaign and information identifying particular campaign preferences found to be compatible with particular campaign parameters. The device may provide the campaign information to the user device to permit the user device to use the campaign information to target the individuals for the campaign.
Media access control (MAC) address privacy handling
Implementations disclosed describe techniques to allow wireless devices to initially connect with randomized MAC addresses and send an encrypted permanent MAC for differentiated services. In one method, a first wireless device connects to an access point (AP) using a randomized MAC address. The first wireless device receives a request for a permanent MAC address from the AP. The first wireless device determines whether to send the permanent MAC address. Responsive to determining to send the permanent MAC address, the first wireless device encrypts the permanent MAC address to obtain an encrypted MAC address and sends a response to the request, including the encrypted MAC address, to the AP.
Proxy for avoiding on-line tracking of user
The invention provides a method that allows to counter tracking mechanisms to which user terminals are exposed when they communicate data on the Internet. This is achieved by a proxy 5 system, which conceals the activity of user terminals from such tracking mechanisms. At the same time, the proxy system builds an enriched and detailed activity and user profile, to which third parties may be granted conditional access.
Methods and systems for asset obfuscation
Techniques for obfuscating and deploying digital assets (e.g., mobile applications) are provided to mitigate the risk of unauthorized disclosure. An asset can be received that is to be deployed to a plurality of mobile devices, each of the mobile devices associated with a corresponding account having account attributes. A deployment group of one or more mobile devices for deploying the asset can be identified based on a set of one or more obfuscation parameters, comprising account attributes shared among the one or more mobile devices within the deployment group. A customized obfuscation scheme to be applied to the asset can be determined based at least in part on the set of obfuscation parameters. The customized obfuscation scheme can be applied to the asset to generate an obfuscated asset. The obfuscated asset can be transmitted and/or updated over a network to the one or more mobile devices within the deployment group.
SYSTEMS AND METHODS FOR GENERATING TOKENS USING SECURE MULTIPARTY COMPUTATION ENGINES
Disclosed herein are systems and methods for generating tokens using SMPC compute engines. In one aspect, a method may hash, by a node, a data input with a salt value. The method may split, by the node, the hashed data input into a plurality of secret shares, wherein each respective secret share of the plurality of secret shares is assigned to a respective SMPC compute engine of a plurality of SMPC compute engines. The respective SMPC compute engines may be configured to collectively hash the respective secret share with a secret salt value, unknown to the plurality of SMPC compute engines. The respective SMPC compute engine may further receive a plurality of hashed secret shares from remaining SMPC compute engines of the plurality of SMPC compute engines, and generate a token, wherein the token is a combination of the hashed respective secret share and the plurality of hashed secret shares.
Automated Risk Assessment Module with Real-Time Compliance Monitoring
Techniques are disclosed for usage-tracking of various information security (InfoSec) entities for tenants/organization onboarded on an instant multi-tenant security assurance platform. The InfoSec entities include policies, procedures, controls and evidence tasks. A policy or procedure is enforced by implementing one or more controls, and the collection of one or more evidence tasks proves/verifies the implementation of a control. The InfoSec entities are linked to each other across the platform and accrue a number of benefits for the tenants. These include generating a security questionnaire response (SQR), defining a readiness project and an audit project, sharing InfoSec entities encompassing the various products of a tenant, automating risk assessment, automatic collection of evidence tasks for verifying the implementation and/or operational state/status of various mitigating controls, etc.
Methods and Systems for Efficient Encrypted SNI filtering for Cybersecurity Applications
A packet-filtering system described herein may be configured to filter packets with encrypted hostnames in accordance with one or packet-filtering rules. The packet-filtering system may resolve a plaintext hostname from ciphertext comprising an encrypted Server Name Indication (eSNI) value. The packet-filtering system may resolve the plaintext hostname using a plurality of techniques. Once the plaintext hostname is resolved, the packet-filtering system may then use the plaintext hostname to determine whether the packets are associated with one or more threat indicators. If the packet-filtering system determines that the packets are associated with one or more threat indicators, the packet-filtering system may apply a packet filtering operation associated with the packet-filtering rules to the packets.