H04L63/0442

TRANSFER OF OWNERSHIP OF A COMPUTING DEVICE VIA A SECURITY PROCESSOR

Embodiments described herein are directed to transferring the ownership of a computing device from one entity to another entity. For example, a security processor is utilized to boot the computing device. During a boot session, the security processor loads and executes boot code, which determines whether specialized firmware authorized by the current owner indicates whether a transfer of ownership is to occur. In response to determining that the specialized firmware indicates that a transfer of ownership is to occur, the secure processor loads and executes the specialized firmware. The specialized firmware, when executed, causes the security processor to program a set of fuses with the public key of the new owner. Execution of the specialized firmware also causes the security processor to invalidate the public key of the original owner, which is stored in another set of fuses.

ENDORSEMENT CLAIM IN A VERFIFIABLE CREDENTIAL

A first verifiable claim is received at a second entity from a first entity. The first verifiable claim is signed by the first entity. A second verifiable claim is generated. The second verifiable claim embeds the first verifiable claim therein and specifies a service that is to be performed on behalf of a fourth entity. The second verifiable claim is provided to a third entity. The second verifiable claim is configured to cause the third entity to verify the signature of the first entity with a public key associated with a decentralized identifier (DID) of the first entity to determine that the first entity is a trusted entity that is able to verify that the second entity is authorized to specify the service to be performed on behalf of the fourth entity.

OPERATING SYSTEM AGNOSTIC AND SECURE BI-DIRECTIONAL DATA HANDLING
20220382890 · 2022-12-01 ·

An information handling system includes a virtual interface configured to provide communication between an agent and an embedded controller, wherein the virtual interface is located below a kernel space of the information handling system. The agent may be configured to transmit telemetry data published by the embedded controller to a data repository, wherein the agent is located at a user space of the information handling system. The embedded controller publishes telemetry data to the data repository via the virtual interface through the agent.

METHOD AND APPARATUS FOR PROVIDING A PRIVACY-PRESERVING YET TARGETED DELIVERY OF LOCATION-BASED CONTENT
20220383361 · 2022-12-01 ·

An approach is provided for providing a privacy-preserving yet targeted delivery of location-based content. The approach involves, for example, initiating a first transmission of content consumer public key(s) associated with content consumer(s) to a content provider. The approach also involves, in response to the transmission, receiving encrypted content encrypted with the content consumer public key(s). The encrypted content is cryptographically signed with a content provider private key associated with the content provider. The approach further involves initiating a second transmission of the encrypted content to a consumer device. A content provider public key for decrypting the encrypted content is made available based on (1) the consumer device scanning the content provider public key at a location designated by the content provider, or (2) detecting that the consumer device is located within a threshold proximity of the location.

END-TO-END ENCRYPTION FOR LOCATION SHARING

A device implementing end-to-end encryption for location sharing may include at least one processor configured to generate a public-private keypair. The at least one processor may be further configured to encrypt, using a first key of the public-private keypair, location data corresponding to a location of the electronic device. The at least one processor may be further configured to transmit, to a server, the encrypted location data for storage. The at least one processor may be further configured to transmit, via a secure communication channel, a second key of the public-private keypair to another electronic device for subsequent retrieval of the encrypted location data by the other electronic device.

Managing service capacity

Systems, apparatuses, and methods are described for adjusting capacity in a networking environment. A networking system comprising clients, servers, load balancers, and/or other devices may expand and contract network capacity as needed. When expanding network capacity, load balancers may instruct client devices to connect to servers that are part of the expanded network. When network capacity is reduced, a server and/or a load balancer my instruct client devices to close a connection with a first server and establish a connection with a second server. Client devices may seamlessly begin using the connection with a second server without having to wait for a connection timeout with the first server.

System and method for combinatorial security
11516192 · 2022-11-29 ·

A system and method for the creation of combinatorial security is herein presented. The security of the transmission of a message from sender to receiver is strengthened if there is no direct transmission between the parties. The system provides for transforming an incoming message into an alphanumeric content object, segmenting or sharding that object, encrypting each shard with a unique encryption algorithm, and storing each shard into an unknown number of network server. A recipient is provided with a message notification that permits the recipient to retrieve and reconstruct the message content with no direct communication between the sender of the message and the recipient of the message.

Managing digital events, affinities, digital queries, and private digital clip notes across client devices for an affinity networking system
11514118 · 2022-11-29 · ·

The present disclosure relates to systems, methods, and non-transitory computer readable media for an affinity networking system. In particular, the disclosed systems can determine and facilitate event-centric digital association among users and other entities (e.g., companies) based on event information, user profile information, company information, and private digital clip notes maintained for individual users. In addition, the disclosed systems can generate a digital event (e.g., for a seminar or a convention for users to attend) and can manage registration for the event based on user interactions via client devices. Further, the disclosed systems can enable a client device to create searchable private digital clip notes for co-users, events, or other entities.

Method for provision of identity verification certificate

A method for facilitating a provision of a certificate that securely verifies an identification of an application is provided. The method includes: validating a bootstrap identity that identifies the application at a time of invocation; generating a first token that is signed with a first private key and transmitting the signed first token to the application; receiving, from an external server, a request for a public key to be used for verifying the first private key; and transmitting the requested public key to the external server in order to prompt the external server to provide the certificate to the application. When prompted to provide the certificate to the application, the external server generates a second token that is signed with a second private key and transmits the certificate in conjunction with the signed second token to the application. The private keys are never shared with the application.

Transferring video encoding or decoding devices across regions of a cloud provider network

Techniques are described enabling users to transfer the association of a cloud-managed video encoding or decoding device from one region of a cloud provider network to another. A video processing service of a cloud provider network enables users to purchase video encoding or decoding devices that can be used to encode and reliably transfer video content to the video processing service from locations of the users' choice. The video processing service receives a request to transfer the association of a video encoding or decoding device from one region of the cloud provider to another and the video processing service executes workflows that enable the association of a video encoding or decoding device to be transferred to one region from another.