H04L9/3226

Device independent encrypted content access system

Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.

Data content chain of custody and integrity validation

A device obtains previously created data content. The device unmasks and extracts one or more chain of custody blocks stored in association with the data content. The one or more chain of custody blocks includes chain of custody data identifying who, when, where, and, with what hardware and/or software, created or edited the data content. The device analyzes the one or more chain of custody blocks and validates an origination of the data content based on the analysis of the one or more chain of custody blocks.

Methods, systems, and devices for federated blockchain-enabled handover authentication
11582667 · 2023-02-14 · ·

Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.

KEY GENERATION AND PACE WITH PROTECTION AGAINST SIDE CHANNEL ATTACKS
20230041237 · 2023-02-09 ·

A method for key generation is arranged in a client processor device, by means of which a second public client key P.sub.c′ of the client is generated. The public key P.sub.c′ is formed by a calculation, or sequence of calculations, which does not contain any operation whose result depends exclusively on the nonce s and at least one public value, or the public key P.sub.c′ being formed by a calculation, or sequence of calculations, where into each operation in which the nonce s enters, at least one non-public value enters the first private client key k.sub.c or the second private client key k.sub.c′, for example as a result of the calculation P.sub.c′=(k.sub.c′.Math.s).Math.G+(k.sub.c′.Math.k.sub.c).Math.P.sub.t.

Multiple Relying Parties in a Single-Sign-On Environment

A system and method for providing secure Single-Sign-On (SSO) authentication in a zero-knowledge architecture. A first server component may operate as a first relying party in a first SSO flow. When the user of an application successfully authenticates to a first identity provider, a first part of a secret key may be provided to the application. Additionally, a second server component may operate as a second relying party in a second SSO flow. When the first part of the secret key is received by the application, authentication information may be provided to a second identity provider. Based on a successful authentication, a second part of the secret key may be provided to the application. The first and second parts of the secret key may be combined by the application to generate a final secret key that may be used to decipher encrypted user data.

Unlocking a data storage device

Disclosed herein is a data storage device comprising a data path and an access controller. The data path comprises a data port configured to transmit data between a host computer and the data storage device. The data storage device is configured to register with the host computer as a block data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine is connected between the data port and the storage medium and uses a cryptographic key to decrypt the encrypted user content data. The access controller generates a challenge for an authorized device; sends the challenge to the authorized device; receives a response to the challenge from the authorized device over the communication channel; calculates the cryptographic key based on the response; and provides the cryptographic key to the cryptography engine to decrypt the encrypted user content data stored on the storage medium.

Encoding a key touch on a device

A method, system, and computer program product for encoding a key touch on a device. The method may include detecting a key touch at one of two of more subareas of a key area and encoding the detected key touch into one code of a plurality of codes. Each code may be associated with one key area and one subarea of the key area. The method may perform an operation to determine whether to authorize access to a resource by determining whether the code, at least in part, authorizes the access. The key area may be marked with an indicia. The two or more subareas of the key area may be unmarked and may be of equal size. The key area may be divided into the two or more subareas by specifying two or more subregions of sensor pixels of a region of sensor pixels of a touch-sensitive screen.

Secure analytics using homomorphic and injective format-preserving encryption
11558358 · 2023-01-17 · ·

Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors; transmitting the set of homomorphic analytic vectors to a server system; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and a first injective, format-preserving encryption scheme to evaluate the set of homomorphic analytic vectors over a datasource.

Management of virtual goods in a blockchain-ledger based gaming architecture
11557174 · 2023-01-17 · ·

Various embodiments provide management of virtual goods. In some embodiments, a gaming platform can be used to provide a secure ledger system for recording money transfer, play action, bets, analytics, gaming statistics, and the like, which are associated with virtual goods. Non-limiting examples of virtual goods comprise: characters; badges/icons; gameplay attributes; virtual money; cryptocurrencies; tokens; digital gifts; gameplay levels/add-ons; and prizes, among other examples. In some examples, gaming systems can directly interact with the distributed multi-ledger architecture for secure and transparent transactions which can also be accessed by auditors, tax authorities, partners, and/or other entities. Some examples may use private and/or public blockchains as part of the distributed multi-ledger gaming architecture. For instance, multiple distributed network nodes may be utilized to manage transaction records.

Multidimensional attribute authentication

A user requesting authentication is presented a keypad that includes multiple keys and respective keys include a character that is associated with a shape. Responsive to selection of a key, a first set of attributes is activated for selection. Responsive to determining a selection of an attribute from the first set of attributes, activating one or more additional sets of attributes associated with the first key. Responsive to determining a selection from the one or more additional sets of attributes, determining whether a selection of an additional key is made. Responsive to determining the selection of the additional key, activating for selection a first set of attributes and one or more additional sets of attributes of the additional key, and responsive to determining selections of keys and corresponding attributes associated with the selection of respective keys, determining the validity of the authentication code.