-
公开(公告)号:US11743255B2
公开(公告)日:2023-08-29
申请号:US16861638
申请日:2020-04-29
申请人: Journey.ai
CPC分类号: H04L63/0876 , G06F8/61 , H04L63/0853
摘要: The techniques herein are directed generally to providing access control and identity verification for communications when initiating a communication from an entity to be verified. In one embodiment an initiating device initiates a communication to a receiving device on a communication channel, wherein the receiving device is configured to determine whether an identity associated with the initiating device is verified by a verification service. The initiating device verifies the identity through a verification service client application on the initiating device, and conveys, to the verification service over a verification channel, that the identity associated with the initiating device is verified, wherein the verification service conveys, to the receiving device over the verification channel, that the identity is verified. The communication then continues with the receiving device on the communication channel, wherein the receiving device manages the communication from the initiating device according to the identity being verified.
-
公开(公告)号:US11695767B2
公开(公告)日:2023-07-04
申请号:US17005491
申请日:2020-08-28
申请人: Journey.ai
IPC分类号: H04L9/40
CPC分类号: H04L63/0884 , H04L63/0876 , H04L63/0892 , H04L63/102 , H04L63/105
摘要: The techniques herein are directed generally to providing access control and persona validation for interactions. In one embodiment, a method for a first device comprises: interacting with a second device on a communication channel; determining, over a verification channel with a verification service, that an identity of a user communicating on the second device is a verified identity according to the verification service; determining a persona of the user; querying a third-party entity to make a determination whether the persona is validated and to correspondingly determine a current privilege level; and managing interaction with the second device according to the determination whether the persona is validated and the corresponding current privilege level. Another embodiment comprises a verification server's perspective of facilitating the interaction between the first and second devices, where the verification server queries the third-party entity to validate the persona.
-
公开(公告)号:US11637827B2
公开(公告)日:2023-04-25
申请号:US16861685
申请日:2020-04-29
申请人: Journey.ai
摘要: The techniques herein are directed generally to providing access control and identity verification for communications when receiving a communication at an entity to be verified. In one embodiment, a receiving device receives a communication from an initiating device on a communication channel, wherein the initiating device is configured to determine whether an identity associated with the receiving device is verified by a verification service. The receiving device verifies the identity through a verification service client application on the receiving device, and conveys, to the verification service over a verification channel, that the identity associated with the receiving device is verified, wherein the verification service is caused to convey, to the initiating device over the verification channel, that the identity is verified. The communication then continues with the initiating device on the communication channel, wherein the initiating device manages the communication according to the identity being verified.
-
公开(公告)号:US20220294765A1
公开(公告)日:2022-09-15
申请号:US17200034
申请日:2021-03-12
申请人: Journey.ai
摘要: The techniques herein are directed generally to personalized secure communication session management, such as for virtual private networks (VPNs). In one embodiment, a user is authenticated at a client device to verify that the user is present at the client device and authorized to access one or more secured resources, and in response, a secure communication session is established for the client device to access the secured resources. At a later time during the secure communication session, it is determined whether the user is still authenticated at the client device, such that if so, access to the one or more secured resources is maintained on the secure communication session, or else access is restricted to the one or more secured resources (e.g., the session is terminated, or access is otherwise limited).
-
公开(公告)号:US11133940B2
公开(公告)日:2021-09-28
申请号:US16703853
申请日:2019-12-04
申请人: Journey.ai
发明人: Brett Shockley , Alexander John Shockley , Michael Joseph Frendo , Shmuel Shaffer , Kenneth Keiter , James M. Behmke
IPC分类号: H04L29/06 , H04L9/32 , H04L9/08 , H04L9/06 , G06F3/06 , H04L9/30 , G06F21/60 , G06F21/62 , G06F21/64 , G06Q20/40 , H04L9/14 , G06Q20/38
摘要: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
-
公开(公告)号:US12088570B2
公开(公告)日:2024-09-10
申请号:US18541845
申请日:2023-12-15
申请人: Journey.ai
发明人: Brett Shockley , Alexander John Shockley , Michael Joseph Frendo , Shmuel Shaffer , Kenneth Keiter , James M. Behmke
IPC分类号: G06Q20/40 , G06F3/06 , G06F21/60 , G06F21/62 , G06F21/64 , G06Q20/38 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40
CPC分类号: H04L63/0471 , G06F3/062 , G06F3/0655 , G06F3/067 , G06F21/602 , G06F21/62 , G06F21/645 , G06Q20/38215 , G06Q20/3829 , G06Q20/383 , G06Q20/401 , H04L9/0643 , H04L9/0819 , H04L9/0825 , H04L9/083 , H04L9/0833 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3218 , H04L9/3236 , H04L9/3242 , H04L9/3247 , H04L9/3263 , H04L9/3265 , H04L9/3268 , H04L63/0421 , H04L63/0442 , H04L63/083 , H04L63/101 , H04L63/102
摘要: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
-
17.
公开(公告)号:US20240297880A1
公开(公告)日:2024-09-05
申请号:US18664480
申请日:2024-05-15
申请人: Journey.ai
CPC分类号: H04L63/0876 , G06F8/61 , H04L63/0853
摘要: The techniques herein are directed generally to providing access control and identity verification for communications when initiating a communication to an entity to be verified. In one particular embodiment, an illustrative method according to one or more embodiments of the present disclosure may comprise: initiating, from an initiating device, a communication to a receiving device on a communication channel; determining, by the initiating device over a verification channel with a verification service, whether an identity associated with the receiving device is verified by the verification service; managing, by the initiating device in response to the identity associated with the receiving device being verified, the communication to the receiving device according to the identity being verified; and managing, by the initiating device in response to the identity associated with the receiving device being unverified, the communication to the receiving device according to the identity being unverified.
-
公开(公告)号:US12034711B2
公开(公告)日:2024-07-09
申请号:US17411201
申请日:2021-08-25
申请人: Journey.ai
发明人: Brett Shockley , Alexander John Shockley , Michael Joseph Frendo , Shmuel Shaffer , Kenneth Keiter , James M. Behmke
IPC分类号: H04L29/06 , G06F3/06 , G06F21/60 , G06F21/62 , G06F21/64 , G06Q20/38 , G06Q20/40 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/32 , H04L9/40
CPC分类号: H04L63/0471 , G06F3/062 , G06F3/0655 , G06F3/067 , G06F21/602 , G06F21/62 , G06F21/645 , G06Q20/38215 , G06Q20/3829 , G06Q20/383 , G06Q20/401 , H04L9/0643 , H04L9/0819 , H04L9/0825 , H04L9/083 , H04L9/0833 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3218 , H04L9/3236 , H04L9/3242 , H04L9/3247 , H04L9/3263 , H04L9/3265 , H04L9/3268 , H04L63/0421 , H04L63/0442 , H04L63/083 , H04L63/101 , H04L63/102
摘要: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
-
公开(公告)号:US20240205203A1
公开(公告)日:2024-06-20
申请号:US18541845
申请日:2023-12-15
申请人: Journey.ai
发明人: Brett SHOCKLEY , Alexander John SHOCKLEY , Michael Joseph FRENDO , Shmuel SHAFFER , Kenneth KEITER , James M. BEHMKE
IPC分类号: H04L9/40 , G06F3/06 , G06F21/60 , G06F21/62 , G06F21/64 , G06Q20/38 , G06Q20/40 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/32
CPC分类号: H04L63/0471 , G06F3/062 , G06F3/0655 , G06F3/067 , G06F21/602 , G06F21/62 , G06F21/645 , G06Q20/38215 , G06Q20/3829 , G06Q20/383 , G06Q20/401 , H04L9/0643 , H04L9/0819 , H04L9/0825 , H04L9/083 , H04L9/0833 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3218 , H04L9/3236 , H04L9/3242 , H04L9/3247 , H04L9/3263 , H04L9/3265 , H04L9/3268 , H04L63/0421 , H04L63/0442 , H04L63/083 , H04L63/101 , H04L63/102
摘要: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
-
公开(公告)号:US20240106812A1
公开(公告)日:2024-03-28
申请号:US18376100
申请日:2023-10-03
申请人: Journey.ai
发明人: Brett Shockley , Alexander John Shockley , Michael Joseph Frendo , Shmuel Shaffer , Kenneth Keiter , James M. Behmke
IPC分类号: H04L9/40 , G06F3/06 , G06F21/60 , G06F21/62 , G06F21/64 , G06Q20/38 , G06Q20/40 , H04L9/06 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/32
CPC分类号: H04L63/0471 , G06F3/062 , G06F3/0655 , G06F3/067 , G06F21/602 , G06F21/62 , G06F21/645 , G06Q20/38215 , G06Q20/3829 , G06Q20/383 , G06Q20/401 , H04L9/0643 , H04L9/0819 , H04L9/0825 , H04L9/083 , H04L9/0833 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3218 , H04L9/3236 , H04L9/3242 , H04L9/3247 , H04L9/3263 , H04L9/3265 , H04L9/3268 , H04L63/0421 , H04L63/0442 , H04L63/083 , H04L63/101 , H04L63/102
摘要: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
-
-
-
-
-
-
-
-
-