H04L63/0846

Secret distribution system and secret distribution method of files

A method for causing sending and receiving of an encrypted file between a sending user terminal and a receiving user terminal connected via a network to be performed in a secret state via a management server is provided. The sending user terminal encrypts an original file and then fragments the original file into a plurality of divided files, creates a plurality of combined files formed by combining a plurality of the divided files, and distributes and saves the combined files to which restoration information for opening the combines files has been added in a plurality of online storages. The receiving user terminal can open the combined files obtained from the online storages by using the restoration information received from the management server to extract the divided files included in the combined files, and can restore the original file from the divided files.

STORAGE INTEGRATION WITH AN EXTERNAL STORAGE LOCATION

A command to load or unload data at a storage location is received. In response to the command, a storage integration object associated with the storage location is identified. The storage integration object identifies a cloud identity object that corresponds to a cloud identity that is associated with a proxy identity object corresponding to a proxy identity granted permission to access the storage location. The data is loaded or unloaded at the storage location by assuming the proxy identity.

Conducting transactions with dynamic passwords

Techniques for conducting transactions with one-time passwords are described herein. These techniques may include receiving a request to conduct a transaction, as well as a one-time password and an identifier linked with a payment instrument. The identifier may or may not identify the linked payment instrument. In both instances, a transaction processing service may compare the received one-time password with a one-time password stored at or accessible by the transaction processing service. If the passwords match, the service may approve the transaction. Otherwise, the service may decline the transaction or implement one or more additional authorization procedures.

Presence identification

Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.

COMPUTER-IMPLEMENTED METHOD FOR CONNECTING A VEHICLE TO A WIRELESS LOCAL NETWORK OF A WORKSHOP
20230262462 · 2023-08-17 ·

The invention relates to a computer-implemented method for connecting a vehicle to a wireless local network of a workshop, comprising: identifying at least one wireless local network configuration of the wireless local network, said wireless local network configuration being associated with credentials for using said wireless local network, associating at least one validity parameter to said credentials in order to allow limited accessibility for the vehicle to said wireless local network, sending to a remote server said credentials, thereby enabling said credentials to be provided to the vehicle, upon receipt of a connection request including the credentials from the vehicle, checking the at least one validity parameter to determine that the credentials are still valid for the vehicle, and upon determination that the credentials are still valid, allowing the vehicle to connect to the wireless local network of the workshop.

Systems and methods for secure authorization of registry functions

Systems, methods, and computer-readable storage media for enabling secure transfer of Internet domains between registrars. An example method can include receiving, at a registry, a request from a first registrar for information associated with an object recorded in the registry and registered by the first registrar, then generating, at the registry, an authorization code, the authorization code having an expiration. The registry can then transmit, to the first registrar, the authorization code, which in turn can be given to the registrant. The registrant can forward the authorization code to the second registrar, and the registry can receive, from a second registrar before the expiration has been reached: the authorization code and a transfer request for the object, the transfer request identifying a transfer of the object from the first registrar to the second registrar. At that point the registry can verify the authorization code authorize the transfer request of the object from the first registrar to the second registrar.

Information communication system for establishing pairing in information communication network
11728989 · 2023-08-15 · ·

A first apparatus performs a pairing providing process of displaying a provision string on the first apparatus and transmitting the provision string to a server apparatus, the provision string being of a given number of digits that changes every given amount of time in such a manner that, every given amount of time, the provision string is subjected to carrying and a new character is added to the rightmost digit of the provision string. A second apparatus transmits an acceptance string to the server apparatus, the acceptance string being input from the second apparatus based on the provision string displayed on the first apparatus. The server apparatus compares the provision string with the acceptance string, and determines that pairing is established between the first apparatus and the second apparatus when the provision string and the acceptance string match each other.

NETWORK ENCRYPTION METHOD
20220141204 · 2022-05-05 ·

This invention involves an encryption method that is mainly applied to network. The network could be both wireless or wired, the former is connected through a wireless router, and the latter is connected through a router. When the network receives a message requesting connection from at least one new networking device, it can authenticate and authorize the message through the key to form a fixed connection with the network, and at the same time, at least one connected device to the network can update the password connected to the network synchronously, or at least one connected device connected to the network can update the password connected to the network at any time, so as to improve the performance of network security and avoid hacking.

METHOD AND SYSTEM FOR MANAGING WORKSTATION AUTHENTICATION

A method may include obtaining, from a user device, a request to access a control system among various control systems. The method may further include determining whether a user associated with the user device is authorized to access the control system based on user information associated with the user in a database. The method may further include generating, in response to determining that the user is authorized, a user code associated with a predetermined time period for accessing the control system. The method may further include transmitting the user code to the user device and the control system. The user code may authenticate a user session between the user device and the control system. The method further includes transmitting, in response to the predetermined time period expiring, a command that terminates the user session between the control system by the user device.

Content access based on location token

A system and method for providing content to a user outside of a home region. A portable device displays content to a user through a network connection. A home content provider provides content to the portable device from the home region. Some of the content provided is region restricted content. A location verifier determines that the portable device and the user are both physically located within the home region. The location verifier issues to the user a location token when the user and the portable device are in the home region. A token verifier verifies the location token when the user requests the region restricted content outside of the home region. The token verifier further instructs the home content provider to provide region restricted content to the user when the user has the location token.