RESTRICTED BLOCKCHAIN CLUSTER
    1.
    发明公开

    公开(公告)号:US20240028610A1

    公开(公告)日:2024-01-25

    申请号:US18206763

    申请日:2023-06-07

    IPC分类号: G06F16/27

    摘要: Techniques are provided for tracking a number of transactions-of-interest in a transaction-recording blockchain using a control blockchain. A transaction-of-interest is a transactions that is in a particular state. A request to perform an action is received. Upon receiving the request and determining that the action corresponds to a new transaction-of-interest, a control blockchain is checked to determine the current number of transactions-of-interest in the transaction-recording blockchain and maximum allowed number of transaction-of-interest for the transaction-recording blockchain. In response to determining that the current number of transaction-of-interest in the transaction-recording blockchain are less than the maximum allowed: allowing the action to occur, adding a new block to the transaction-recording blockchain, and updating the control blockchain to indicate the new number of transaction-of-interest. In response to determining that the current number of transaction-of-interest are at least at the maximum allowed number, prohibiting the addition of a new block to the transaction-recording blockchain.

    Automated fraudulent document detection

    公开(公告)号:US11651093B1

    公开(公告)日:2023-05-16

    申请号:US17680260

    申请日:2022-02-24

    摘要: Techniques are disclosed for determining the authenticity of a digital-origin document based, at least in part, on the code of the document. By determining authenticity based on the code of the document, authentication may take into account several features that are not detectable on the rendered image of a digital-origin document. The document class of a target document is initially determined. Anomalies are then detected in the code using various detectors, including but not limited to metadata-based detectors and content-based detectors. The output of the detectors may be combined to generate a document anomaly score that indicates likelihood that the document is not authentic.

    Secure Content Management Through Authentication

    公开(公告)号:US20240250954A1

    公开(公告)日:2024-07-25

    申请号:US18626174

    申请日:2024-04-03

    IPC分类号: H04L9/40 G06F16/955

    摘要: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.

    Conditionally-deferred authentication steps for tiered authentication

    公开(公告)号:US11757882B2

    公开(公告)日:2023-09-12

    申请号:US17972516

    申请日:2022-10-24

    IPC分类号: H04L29/06 H04L9/40

    摘要: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.

    ENCRYPTION KEY ROTATION FRAMEWORK
    6.
    发明公开

    公开(公告)号:US20230261865A1

    公开(公告)日:2023-08-17

    申请号:US18139755

    申请日:2023-04-26

    摘要: Techniques are described herein for efficiently and expeditiously performing key rotation and key replacement. In an embodiment, a key replacement request is received that specifies one or more key names of a plurality of key names. A location-to-key-name mapping that maps the plurality of key names to a plurality of encrypted-data locations is used to determine one or more encrypted-data locations that are mapped to the one or more key names. A first set of messages is generated where each message identifies a table that is associated with the one or more encrypted-data locations. The first set of messages is stored in a queue for processing by a first plurality of worker processes. Each worker process of the first plurality of worker processes retrieves a message of the first set of messages from the queue and generates a message of a second set of messages that identifies a subset of encrypted data records from the table identified in the message of the first set of messages. Each message of the second set of messages is stored in a distinct queue which is assigned to a worker process of a second plurality of worker processes. Each worker process of the second plurality of worker processes retrieves the message from the assigned queue, decrypts the subset of encrypted data records identified in the respective message, re-encrypts the decrypted data records using a new encryption key that corresponds to a new key name, and stores the re-encrypted data records in a database.

    USER CONTROLLED SHARING OF PERSONAL AND CONTACT INFORMATION USING A BLOCKCHAIN

    公开(公告)号:US20220405767A1

    公开(公告)日:2022-12-22

    申请号:US17891367

    申请日:2022-08-19

    摘要: Techniques are provided for propagating updates to user profile information using a blockchain and for controlling access to user profile information using a blockchain. In one embodiment, a first block is added to a blockchain. The first block includes a first transaction ID that identifies a first transaction entry in the blockchain and a first version of user profile information encrypted using the first encryption key. The first transaction ID and a first decryption key that is able to decrypt information encrypted with the first encryption key is communicated to a plurality of entity computing devices that are to use the user profile information. The user profile information is updated by adding a second block to the blockchain that refers to the first transaction ID and includes a second version of the profile information encrypted using the first encryption key.

    Encryption key rotation framework

    公开(公告)号:US12095913B2

    公开(公告)日:2024-09-17

    申请号:US18139755

    申请日:2023-04-26

    摘要: Techniques are described herein for efficiently and expeditiously performing key rotation and key replacement. In an embodiment, a key replacement request is received that specifies one or more key names of a plurality of key names. A location-to-key-name mapping that maps the plurality of key names to a plurality of encrypted-data locations is used to determine one or more encrypted-data locations that are mapped to the one or more key names. A first set of messages is generated where each message identifies a table that is associated with the one or more encrypted-data locations. The first set of messages is stored in a queue for processing by a first plurality of worker processes. Each worker process of the first plurality of worker processes retrieves a message of the first set of messages from the queue and generates a message of a second set of messages that identifies a subset of encrypted data records from the table identified in the message of the first set of messages. Each message of the second set of messages is stored in a distinct queue which is assigned to a worker process of a second plurality of worker processes. Each worker process of the second plurality of worker processes retrieves the message from the assigned queue, decrypts the subset of encrypted data records identified in the respective message, re-encrypts the decrypted data records using a new encryption key that corresponds to a new key name, and stores the re-encrypted data records in a database.

    Secure content management through authentication

    公开(公告)号:US11956246B2

    公开(公告)日:2024-04-09

    申请号:US17988508

    申请日:2022-11-16

    摘要: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.