Patent classifications
H04L63/0478
Intelligent preprocessing routing to decisioning services
The system and methods described herein allow users to give their applicant information when seeking to purchase a good with financing from multiple potential lenders, and may be pre-screened by one or more rule sets implemented by a marketplace client in an eligibility analysis to ultimately submit applicant information to a subset of the multiple potential lenders which are found to be suitable for lending to an applicant based on the applicant information, wherein lender microservices are then run in a jailed, firewalled, and self-contained, autonomous environment, and the results of said lender microservices are reported to the user and may be used to change the one or more rule sets implemented by the marketplace client for future pre-screening of applicants.
Reliable user service system and method
A method includes sending an encrypted first hash value set to a data provider; receiving an encrypted second hash value set and a double-encrypted first hash value set from the data provider; re-encrypting the received encrypted second hash value set to obtain a double-encrypted second hash value set; calculating an intersection of the double-encrypted first hash value set and the double-encrypted second hash value set to determine one or more shared users shared with the data provider; and recommending or providing a service to the one or more shared users.
SECURE DEVICE COUPLING
The present disclosure includes secure device coupling. An embodiment includes a processing resource, memory, and a network management device communication component configured to, identifying a network attached device within a first domain. Generating a domain device secret corresponding to the first domain. Each network attached device within the first domain can share the same domain device secret. Coupling iterations may be performed for each device within the first domain can include: generating a network management device private key and public key. Providing, via short-range communication, the network management device public key and the domain device secret to a network attached device communication component included in each network attached device of the first domain. A network attached device public key and data from the network attached device communication component in response to providing the network management device public key to the network attached device communication component is received from each device in the first domain.
Apparatus and method for secure router device
Method, systems, and devices for providing a multi-function router. A router may receive, process, and forward data packets between a physical network interface and a logical network interface. The router may also run a virtualized machine that uses the logical network interface mapped statically or dynamically to the physical network interface.
SYSTEMS, METHODS AND SOFTWARE FOR SECURE ACCESS CONTROL TO DIGITALLY STORED INFORMATION
Systems, methods, and software for secure access control to digitally stored information. Owners of digitally stored information enter access control data using a first graphical user interface (GUI) on a first device. Vault space is allocated in memory for receiving and storing the information remotely from the first device. A keyholder and a guardian identified by the access control data are associated with the information. A keyholder access request for the information is transmitted via a second GUI on a second device. Responsive to determining the keyholder to be associated with the information, a third device of a guardian receives a notification of the access request, and the guardian may use a third GUI to transmit an access authorization. The information may be transmitted to the second device upon determining that the guardian is associated with the information.
SECURE WIRELESS COOPERATIVE BROADCAST NETWORKS
Cryptographically secure data communications between layered groups of devices in a wireless cooperative broadcast network encrypts datagrams twice prior to transmission by a source device, first using an inner layer key that is shared by a first group of devices, and second using an outer layer key that is shared by a second group of devices; the devices of the first group being members of the second group. Received datagrams are recovered by first decrypting with the outer layer key and second decrypting with the inner layer key.
Secure de-centralized domain name system
A computer-implemented method for secure de-centralized domain name system, the method comprising: recording a domain registration transaction to a blockchain, the domain registration transaction comprising a domain name, a domain primary key corresponding to a domain public key and domain certificate information for a server node; recording a domain security transaction, comprising the domain public key, to the blockchain to generate a domain name record comprising the domain name, an associated IP address, the domain public key and the domain certificate information, wherein the domain security transaction being signed using the domain primary key; transmitting, by a client node, a domain name request to a domain name node; receiving, by the client node, a domain name response from the domain name node, the domain name response comprising the domain public key, the domain certificate information and the associated IP address retrieved from the domain name record of the blockchain; and initiating a secure communication between the client node and the server node using at least one of the domain public key and the domain certificate information.
Protecting study participant data for aggregate analysis
Embodiments of the invention include systems and methods for protecting study participant data for aggregate analysis. Aspects include sending a broker encryption key to a plurality of subjects. Aspects also include receiving double-encrypted subject data from the plurality of subjects. Aspects also include decrypting the double-encrypted subject data with a broker decryption key to generate single-encrypted subject data for the plurality of subjects. Aspects also include aggregating the single-encrypted subject data for the plurality of subjects to generate an aggregated single-homomorphically encrypted data set. Aspects also include including a plurality of random factors in the aggregated single-encrypted data set. Aspects also include sending the aggregated single-homomorphically encrypted data set to a researcher.
System and method for capturing, recording, monitoring, examining, filtering, processing, limiting and controlling intra-network and extra-network data communications
A network appliance is provided. The network appliance includes a communications sub-system for sending and receiving data packets and network interface ports for individually connecting external computing devices so that the external computing devices' data communications must traverse the network appliance before reaching any other device or destination. The network appliance further includes electronic storage and memory comprising code executable by a processor to capture data packets, extract metadata from the data packets and store the data packets and their metadata with further capabilities to parse and examine the data packets and their metadata and apply instruction sets (aka rule sets) and command where the data packets and metadata should be stored, whether they should be modified and whether they should be allowed traversal through the network appliance according to their characteristics and content. The network appliance includes further logic for sorting, counting, correlating and analyzing data packets. The network appliance includes further logic to implement a method or process that allows human users of external computing devices to invoke a routine to temporarily or permanently enable or disable one or more instruction sets or rule sets without directly accessing or reconfiguring the network appliance through its management interface. Multiple systems and appliances could interconnect and securely communicate and share data via a tripartite or two-party encryption method.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC-CHAIN-BASED GROUP MEMBERSHIP CONTENT SHARING
In some embodiments, a first device may generate a data block for an ordered set of data blocks such that the data block is cryptographically chained to a given data block preceding the data block in the ordered set. The first device may obtain an encryption key used to encrypt information related to the data block, and use group members' keys to encrypt the encryption key to generate a group key. As an example, the group's members may include a first member associated with the first device and other members. The keys used to encrypt the encryption key may include the other members' keys. The first device may transmit the ordered set and the group key to a communication resource (e.g., accessible by the members). Other devices (associated with the other members) may use the ordered set and the group key to obtain content related to the ordered set.