H04L63/0442

Techniques for group message thread link administration

Techniques for group message thread link administration are described. In one embodiment, an apparatus may comprise a client front-end component operative to receive a join invitation command associated with a group message thread from an administrator client device, the group message thread associated with a message thread identifier, the message thread identifier identifying the group message thread on a messaging system; and send a join invitation link to the administrator client device; and a group management component operative to generate a join invitation link in response to the join invitation command, the join invitation link comprising a thread invitation identifier, wherein the thread invitation identifier is a hash of the message thread identifier. Other embodiments are described and claimed.

Providing access to data in a secure communication
11700277 · 2023-07-11 · ·

The present disclosure is directed to preventing computer data from being usurped and exploited by individuals or organizations with nefarious intent. Methods and systems consistent with the present disclosure may store keys and keying data for each of a plurality of connections in separate memory locations. These memory locations may store data that maps a virtual address to a physical memory address associated with storing information relating to a secure connection. These separate memory locations may have a unique instance for each individual communication connection session, for example each transport layer security (TLS) connection may be assigned memory via logical addresses that are mapped to one or more physical memory addresses on a per-core basis. Such architectures decouple actual physical addresses that are used in conventional architectures that assign a single large continuous physical memory partition that may be accessed via commands that access physical memory addresses directly.

Authentication method, authentication device, electronic device and storage medium
11700127 · 2023-07-11 · ·

The present disclosure provides an authentication method, an authentication device, an electronic device and a storage medium. The authentication method includes: receiving target voice data; obtaining a first voiceprint feature parameter corresponding to the target voice data from a device voiceprint model library; performing a first encryption process on the first voiceprint feature parameter with a locally stored private key to generate to-be-verified data; transmitting the to-be-verified data to a server, so that the server uses a public key which matches the private key to decrypt the to-be-verified data to obtain the first voiceprint feature parameter, and performs authentication on the first voiceprint feature parameter to obtain an authentication result; receiving the authentication result returned by the server.

VIDEO SECURITY SYSTEM WITH IMPROVED NETWORK RESPONSE TIME USING PRE-AUTHENTICATION INFORMATION
20230011133 · 2023-01-12 · ·

A video security system with improved network response speed using pre-authentication information, which is capable of improving a network response speed by simplifying handshaking for securely exchanging authentication information and an encryption key in a process of starting communication between a client terminal and a server using pre-authentication information that is valid only for the client terminal, is provided.

Systems and Methods in a Decentralized Network
20230214928 · 2023-07-06 ·

In one embodiment, a method includes identifying datasets associated with a party and identifying one or more decentralized identifiers (DIDs) associated with the datasets. The method also includes generating an aggregated dataset associated with the DIDs and generating a training dataset associated with the aggregated dataset. The method further includes using one or more machine learning algorithms to recognize patterns within the training dataset.

SYSTEM AND METHOD FOR SECURE FILE-SHARING VIA A DISTRIBUTED NETWORK
20230216694 · 2023-07-06 · ·

Systems, computer program products, and methods are described herein for secure file-sharing. The present invention may be configured to receive a request to store data on a network, process the request through a firewall. Processing the request includes: generating a first electronic digital certificate, storing the first electronic digital certificate on a distributed ledger, encrypting the data using the first electronic digital certificate, storing the encrypted data on at least one of the plurality of data server nodes, and recording the request on the distributed ledger. The present invention is further configured to receive and process a second request. Processing the second request includes: decrypting the data using the second electronic digital certificate, providing the decrypted data to the second requestor, and recording the second request on the distributed ledger.

Stateless mutual authentication between services

A server computing system generates a universally unique identifier (UUID) associated with a first application, the UUID to be encrypted using a private key associated with the first application to generate a first digital signature. The server computing system generates a first session key associated with the first application, the first digital signature to be encrypted using the first session key to generate a first encrypted digital signature. The server computing system encrypts the first session key using a public key associated with a second application to generate a first encrypted session key, wherein the first application and the second application are deployed with the PaaS associated with the server computing system. The server computing system transmits the UUID, the first encrypted digital signature, and the first encrypted session key to the second application using hypertext transfer protocol (HTTP) to enable the second application to authenticate the first application.

Sharing encrypted documents within and outside an organization
11695547 · 2023-07-04 · ·

A method and system of creating and managing encryption keys that facilitates sharing of encrypted content. The system may include an information management system with a key management server and a computing device having an encryption service module. The encryption service module detects operations at the computing device and encrypts a document with an encryption key created using user information and a secret.

Secure data processing

A first component determines encrypted data representing an event and encrypted threshold data corresponding to an outlier of the event. The first system may process the data using, for example, one or more composite integers, and may send the result to a second system. This second system may subtract the data to determine of the encrypted data is greater than, less than, or equal to the encrypted threshold. If so, the second system may determine that the encrypted data corresponds to an outlier of the data. The second system may send an indication of this determination to a third system.

Apparatus and method for secure transport using internet of things (IoT) devices
11694149 · 2023-07-04 · ·

A system and method are described for ensuring that a product has been transported in acceptable environmental conditions. For example, one embodiment of the invention comprises: one or more sensors to measure environmental conditions during transport of the IoT device from an origin location to a destination location; a sensor interface coupled to the one or more sensors to communicate environmental values associated with the environmental conditions; a storage device to store monitor application program code; a processor coupled to the sensor interface and storage device, the processor to process the monitor application program code to perform operations based on the environmental values including storing the environmental values on the storage device; and a wireless communication interface to connect to an Internet of Things (IoT) service at one or more intermediate locations between the origin location and the destination location and/or at the destination location, the wireless communication interface to transmit the environmental values and/or event data associated with the environmental values to the IoT service; wherein the IoT service is to provide the environmental values and/or event data associated with the environmental values to one or more apps running on one or more client devices, the one or more apps associated with one or more accounts on the IoT service.