Patent classifications
H04L63/0442
System and method for secure content streaming, governance, fraud prevention, and the embedding artificial intelligence into content
An automated system configured for streamed contents, to be self-aware in preventing fraudulent tactics, during real-time and offline usages, while communicating with its owner for accurate decision making, comprising: a content player module, and a content streaming service module; configured using a codec module to embed logic, encryptions, heuristics data, associated meta data, and management data into the content format; configured to use symmetric encryption keys, public keys, biometrics, and payload data; configured to authenticate the user and content owner; configured to request, receive, send, stream content, and analytics through a secure communication; configured to provide secure virtual communications between users and content owners; configured to use a call-home data, to enable the content and content owner to communicate and update one another securely; Configured to provide real-time, and offline, fraud prevention heuristics using artificial intelligence.
Accountless device control
Systems and methods for accountless device control are disclosed. For example, a smart device may be acquired and plugged in for use. The smart device may gain network connectivity and a system associated with the smart device may request enablement of an application for use with the smart device from another system, such as a system associated with a voice-enabled device. The other system may generate and send user identifier data, and the system associated with the smart device may generate a shadow account in association with the user identifier data. The application may be enabled in association with the shadow account, and access credentials may be exchanged to securely send and receive information associated with operation of the access device.
LOW ENTROPY BROWSING HISTORY FOR ADS QUASI-PERSONALIZATION
The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers.
SEAMLESSLY SECURING ACCESS TO APPLICATION PROGRAMMING INTERFACE GATEWAYS
Seamlessly securing access to application programming interface gateways includes receiving a request from a client for a token using which the client can make a call to an API. The request includes a client identifier identifying the client. In response to receiving the request, a call is made to the API for the token, and the token, including application credentials, are received from the API. In response to receiving the token, the token is encoded to include the encrypted client identifier and the encrypted application credentials. The encoded token is transmitted to the client.
Non-transitory computer-readable storage medium, terminal device, and information processing system
A non-transitory computer-readable storage medium storing a program configured to cause a terminal device to execute a game in communication with a server device, the program includes: a first storing step of receiving from the server device at least one token generated and stored in the server device to store the token in a terminal storage unit; a transmitting step of transmitting to the server device information-to-be-transmitted including an updating instruction of game data of a user and encrypted information obtained by encrypting information-to-be-encrypted at least including the token; and a deleting step of deleting the token stored in the terminal storage unit, wherein the updating instruction includes a first instruction to update the game data stored in the server device when the token extracted by decrypting the encrypted information and the token stored in the server device are matched.
Physical access control system and method
An access control system and method are described. In an example, an access control system includes a tag that interacts with a mobile device and communicates door information to the mobile device. The mobile device provides at least some of the information obtained from the tag to a trusted tag server that is configured to analyze whether or not the information was obtained from a valid and trustable tag. The trusted tag server may then forward along the door information to an access control server for analysis in connection with making an access control decision for the mobile device or a holder thereof. Results of the access control decision can be communicated to a mechanism that actuates and controls a protected asset that is within a predetermined proximity of the tag, thereby enabling access control without a dedicated access control reader deployed on or near the protected asset.
Authentication system and computer readable medium
In an authentication system (120) of a first organization that a first user belongs to, when the first user accesses a service of another organization from a user terminal of the first organization, an authentication device (300) receives a hello message from another organization system, encrypts the hello message using a client private key of the first user, and sends the encrypted hello message to said another organization system as a signature message.
Establishing a secure communication link
This disclosure is directed to devices, systems, and techniques for establishing a secure connection between two or more devices. In some examples, a device is configured for wireless communication. The device comprises signal reception circuitry configured to receive communications transmitted according to at least a first communication protocol, communication circuitry configured for wireless communication according to at least a second communication protocol, and processing circuitry electrically coupled to the signal reception circuitry and the communication circuitry. The processing circuitry is configured to receive, via the signal reception circuitry, a first signal according to the first communication protocol. In response to receiving the first signal, the processing circuitry is further configured to transmit, via the communication circuitry, a second signal according to the second communication protocol and establish a secure link according to the second communication protocol.
Subscription and key management system
One embodiment of the described invention is directed to a key management module deployed within a cybersecurity system that operates as a multi-tenant Security-as-a-Service (SaaS) by relying on Infrastructure-as-a-Service (IaaS) cloud processing resources and cloud storage resources. The key management module is configured to assign a master key to a subscriber upon registration and, as requested, generate one or more virtual keys, based at least in part on the master key, for distribution to the subscriber. Each virtual key is included as part of a submission into the cybersecurity system and is used to authenticate the subscriber of the submission and verify that the subscriber is authorized to perform one or more tasks associated with the submission before the one or more tasks are performed.
MODULE AND METHOD FOR AUTHENTICATING DATA TRANSFER BETWEEN A STORAGE DEVICE AND A HOST DEVICE
This document describes a module and method for authenticating data transfer between a storage device and a host device. The module is configured to allow encrypted data to be exchanged between the storage device and the host device once the module has verified that the storage device has been correctly paired with an authorized host device whereby the verification step does not require a password to be manually entered or an additional external device to be attached.