-
公开(公告)号:US20240028610A1
公开(公告)日:2024-01-25
申请号:US18206763
申请日:2023-06-07
发明人: Jianju Liu , Aaron Jimenez , Wenxuan Xu , Jianglan Han
IPC分类号: G06F16/27
CPC分类号: G06F16/27 , G06F16/275 , G06F16/273
摘要: Techniques are provided for tracking a number of transactions-of-interest in a transaction-recording blockchain using a control blockchain. A transaction-of-interest is a transactions that is in a particular state. A request to perform an action is received. Upon receiving the request and determining that the action corresponds to a new transaction-of-interest, a control blockchain is checked to determine the current number of transactions-of-interest in the transaction-recording blockchain and maximum allowed number of transaction-of-interest for the transaction-recording blockchain. In response to determining that the current number of transaction-of-interest in the transaction-recording blockchain are less than the maximum allowed: allowing the action to occur, adding a new block to the transaction-recording blockchain, and updating the control blockchain to indicate the new number of transaction-of-interest. In response to determining that the current number of transaction-of-interest are at least at the maximum allowed number, prohibiting the addition of a new block to the transaction-recording blockchain.
-
公开(公告)号:US11651093B1
公开(公告)日:2023-05-16
申请号:US17680260
申请日:2022-02-24
发明人: Anton Mobley , Jixin Li , Nickolaus Mueller
IPC分类号: G06Q30/00 , G06F21/62 , G06F16/93 , G06Q30/018
CPC分类号: G06F21/6209 , G06F16/93 , G06Q30/0185
摘要: Techniques are disclosed for determining the authenticity of a digital-origin document based, at least in part, on the code of the document. By determining authenticity based on the code of the document, authentication may take into account several features that are not detectable on the rendered image of a digital-origin document. The document class of a target document is initially determined. Anomalies are then detected in the code using various detectors, including but not limited to metadata-based detectors and content-based detectors. The output of the detectors may be combined to generate a document anomaly score that indicates likelihood that the document is not authentic.
-
公开(公告)号:US20240250954A1
公开(公告)日:2024-07-25
申请号:US18626174
申请日:2024-04-03
发明人: Hyunsuk Han , Mahesh Acharya
IPC分类号: H04L9/40 , G06F16/955
CPC分类号: H04L63/105 , G06F16/9558 , H04L63/0876
摘要: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
-
公开(公告)号:US11757882B2
公开(公告)日:2023-09-12
申请号:US17972516
申请日:2022-10-24
发明人: Hyunsuk Han , Mahesh Acharya
CPC分类号: H04L63/0884 , H04L63/0892 , H04L63/105 , H04L2463/082
摘要: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.
-
公开(公告)号:US11741735B2
公开(公告)日:2023-08-29
申请号:US17317094
申请日:2021-05-11
发明人: Aaron Brown , Samantha Puth
IPC分类号: G06K9/00 , G06V30/416 , G06T1/00 , G06V30/10
CPC分类号: G06V30/416 , G06T1/0021 , G06T2201/0062 , G06T2201/0065 , G06V30/10 , G06V2201/10
摘要: Techniques for automatically attaching optical character recognition data to images are provided. The techniques include receiving an image file containing an image and performing optical character recognition on the image to generate text output. The techniques then continue by identifying a particular text item from within the generated text output and determining that the particular text item is a value for particular corresponding key. Then metadata that indicates that the particular text item is a value for the particular key is stored in the image file.
-
公开(公告)号:US20230261865A1
公开(公告)日:2023-08-17
申请号:US18139755
申请日:2023-04-26
发明人: Mohsin Roowalla , Tianhao Gu , Pranamya Raghuveer Nayak , Edward Suryadi , Roger Santosa Tanuatmadja , Raul Acevedo
CPC分类号: H04L9/0891 , H04L9/0825 , H04L63/123 , G06F16/182 , G06F11/3006 , G06F9/546 , G06F16/137 , G06F11/076
摘要: Techniques are described herein for efficiently and expeditiously performing key rotation and key replacement. In an embodiment, a key replacement request is received that specifies one or more key names of a plurality of key names. A location-to-key-name mapping that maps the plurality of key names to a plurality of encrypted-data locations is used to determine one or more encrypted-data locations that are mapped to the one or more key names. A first set of messages is generated where each message identifies a table that is associated with the one or more encrypted-data locations. The first set of messages is stored in a queue for processing by a first plurality of worker processes. Each worker process of the first plurality of worker processes retrieves a message of the first set of messages from the queue and generates a message of a second set of messages that identifies a subset of encrypted data records from the table identified in the message of the first set of messages. Each message of the second set of messages is stored in a distinct queue which is assigned to a worker process of a second plurality of worker processes. Each worker process of the second plurality of worker processes retrieves the message from the assigned queue, decrypts the subset of encrypted data records identified in the respective message, re-encrypts the decrypted data records using a new encryption key that corresponds to a new key name, and stores the re-encrypted data records in a database.
-
公开(公告)号:US20220405767A1
公开(公告)日:2022-12-22
申请号:US17891367
申请日:2022-08-19
发明人: Srinivas Ambikapathi
摘要: Techniques are provided for propagating updates to user profile information using a blockchain and for controlling access to user profile information using a blockchain. In one embodiment, a first block is added to a blockchain. The first block includes a first transaction ID that identifies a first transaction entry in the blockchain and a first version of user profile information encrypted using the first encryption key. The first transaction ID and a first decryption key that is able to decrypt information encrypted with the first encryption key is communicated to a plurality of entity computing devices that are to use the user profile information. The user profile information is updated by adding a second block to the blockchain that refers to the first transaction ID and includes a second version of the profile information encrypted using the first encryption key.
-
公开(公告)号:US12095913B2
公开(公告)日:2024-09-17
申请号:US18139755
申请日:2023-04-26
发明人: Mohsin Roowalla , Tianhao Gu , Pranamya Raghuveer Nayak , Edward Suryadi , Roger Santosa Tanuatmadja , Raul Acevedo
IPC分类号: H04L9/08 , G06F9/54 , G06F11/07 , G06F11/14 , G06F11/30 , G06F16/13 , G06F16/182 , H04L9/14 , H04L9/40
CPC分类号: H04L9/0891 , G06F9/546 , G06F11/076 , G06F11/3006 , G06F16/137 , G06F16/182 , H04L9/0825 , H04L63/123
摘要: Techniques are described herein for efficiently and expeditiously performing key rotation and key replacement. In an embodiment, a key replacement request is received that specifies one or more key names of a plurality of key names. A location-to-key-name mapping that maps the plurality of key names to a plurality of encrypted-data locations is used to determine one or more encrypted-data locations that are mapped to the one or more key names. A first set of messages is generated where each message identifies a table that is associated with the one or more encrypted-data locations. The first set of messages is stored in a queue for processing by a first plurality of worker processes. Each worker process of the first plurality of worker processes retrieves a message of the first set of messages from the queue and generates a message of a second set of messages that identifies a subset of encrypted data records from the table identified in the message of the first set of messages. Each message of the second set of messages is stored in a distinct queue which is assigned to a worker process of a second plurality of worker processes. Each worker process of the second plurality of worker processes retrieves the message from the assigned queue, decrypts the subset of encrypted data records identified in the respective message, re-encrypts the decrypted data records using a new encryption key that corresponds to a new key name, and stores the re-encrypted data records in a database.
-
公开(公告)号:US11956246B2
公开(公告)日:2024-04-09
申请号:US17988508
申请日:2022-11-16
发明人: Hyunsuk Han , Mahesh Acharya
CPC分类号: H04L63/105 , G06F16/9558 , H04L63/0876
摘要: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
-
公开(公告)号:US20230169514A1
公开(公告)日:2023-06-01
申请号:US18097060
申请日:2023-01-13
CPC分类号: G06Q20/405 , G06N20/00 , G06Q20/047 , G06Q20/227 , G06Q20/401 , G06Q20/3572
摘要: Techniques are described herein for selecting an optimal financial account for a financial transaction. In an embodiment, a multi-account payment card is used to initiate a financial transaction. Transaction information of the financial transaction including a multi-account payment card ID is transmitted to a server for processing. The server determines that the multi-account payment card ID is associated with a plurality of financial accounts, wherein each of the plurality of financial accounts is associated with any one of a credit card, a debit card, an automatic teller machine (ATM) card, a gift card, or a credit line. A financial account of the plurality of financial accounts is selected by the server based on financial account information, such as anomalous transactions, associated with the plurality of financial accounts and the transaction information of the financial transaction. The financial transaction is then charged to the selected financial account.
-
-
-
-
-
-
-
-
-