Patent classifications
H04L63/0414
Network cache of device input for redundancy during device inoperability
There are provided systems and methods for a network cache of device input for redundancy during device inoperability. A device may detect that the device is in danger of failure, for example, if a battery is low on the device, the device is damaged, or the device may lose network connectivity. On detection of such a condition, the device may request that a server that performs electronic transaction processing establish or trigger a mode that allows for caching of transaction data as input for the transaction data is entered to a device, which may be done by sending signaling to the server indicating the condition that affects the device's operability. The server may then cache input for the transaction data. If the device fails prior to approving and completing electronic transaction processing, the server may use the cached data to generate a digital ledger for another entity.
Dynamic entitlement for blockchain data
An example operation may include one or more of receiving a data file submitted by a node, the data file comprising information about an event-driven process for a chain of nodes, retrieving an entitlement mode of the data file from a data block that is stored among a hash-linked chain of data blocks on a distributed ledger, determining access rights of the data file with respect to another node in the chain of nodes based on the retrieved entitlement mode of the data file, and transmitting information about the event-driven process to the other node based on the determined access rights of the other node.
Systems and methods of performing an identity verification across different geographical or jurisdictional regions
Systems and methods of performing identity verification across different geographical or jurisdictional regions are provided. In one exemplary embodiment, a method by a first network node comprises sending, by the first network node located in a first geographical or jurisdictional region, to a second network node located in a second geographical or jurisdictional region, an indication of an identity verification associated with a certain identity based on personally identifiable information of that identity received by the first network node from the second network node. Further, the identity verification is determined based on whether the PII data of the certain identity corresponds to PII data of at least one of a plurality of identities associated with the first region and stored in one or more databases located in the first region and on identity verification rule(s) associated with the first region.
SYSTEMS, METHODS, AND DEVICES FOR DIGITAL ADVERTISING ECOSYSTEMS IMPLEMENTING CONTENT DELIVERY NETWORKS UTILIZING EDGE COMPUTING
Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.
Privacy protecting transaction engine for a cloud provider network
A privacy protecting transaction engine for a cloud provider network is described. According to some embodiments, a computer-implemented method includes receiving a request from a customer of a cloud provider network to create a customer cloud in the cloud provider network, generating the customer cloud in the cloud provider network, receiving a first request at the cloud provider network for the customer cloud that includes private information of an end customer of the customer of the cloud provider network, removing the private information from the first request by a privacy protecting transaction engine of the cloud provider network to generate a second request, and sending the second request to the customer cloud for servicing.
SYSTEM AND METHOD FOR IDENTIFYING SERVICES WITH WHICH ENCRYPTED TRAFFIC IS EXCHANGED
System and method to receive respective copies of communication packets exchanged, over a network, with respective communication endpoints belonging to respective servers, the packets containing respective endpoint identifiers, each of which includes a respective Internet Protocol (IP) address and port number identifying the communication endpoint with which the packet containing the endpoint identifier was exchanged. The processor is further configured to ascertain respective services that use the communication endpoints, by communicating investigative traffic over the network. The processor is further configured to store an association between the communication endpoints and the services, respectively, in the memory, in response to ascertaining the services.
SYSTEMS AND METHODS OF COMMUNICATING ELECTRONIC DATA TRANSACTION UPDATES TO CLIENT COMPUTER SYSTEMS
A computer system is provided that includes a storage system, at least one transceiver, and a processing system with at least one hardware processor. The storage system stores a first list pair. The transceiver receives electronic data messages that each include a respective data transaction request. The processing system determines how the new data transaction request should be processed based on which communication protocol was used to submit the request. Updates regarding the first list pair are sent out to non-party client computer systems using different communication protocols, where one is faster than the other, but the slower update includes private data therein.
COMMUNICATION TERMINAL, NETWORK APPARATUS, COMMUNICATION METHOD, AND DE-CONCEALMENT METHOD
A communication terminal (10) includes control means for generating a subscription concealed identifier (SUCI) including a subscription permanent identifier (SUPI) concealed using a predetermined protection scheme, and a protection scheme identifier identifying the protection scheme, and transmission means for sending the SUCI to a first network apparatus during a registration procedure, the SUCI being sent for a second network apparatus to de-conceal the SUPI from the SUCI based on the protection scheme used to generate the SUCI.
PRIVACY PROTECTION FOR SIDELINK COMMUNICATIONS
Security and privacy mechanisms are provided to protect the L2 identifiers used in groupcast communications over the sidelink (e.g., PC5 interface) without requiring a UE to periodically refresh the L2 identifiers, which may cause extra signaling overhead, increased latency and greater risk of synchronization issues. To prevent tracking of a UE, a group identifier (ID) is used as a source layer 2 (L2) ID in groupcast messages. Additionally, a message authentication code (MAC) is introduced into the group discovery procedure to authenticate the UE sending a group discovery request.
DISTRIBUTED HYBRID MODEL FOR SECURITY AS A SERVICE
An apparatus includes a network interface and a processor. The network interface receives an application programming interface (API) request, transmits a customer management request including an identifier of the customer apparatus, and receives a customer management response including a policy. The processor performs a security service on the API request, at least in part based on the policy.