Data verification
    1.
    发明授权

    公开(公告)号:US10904008B2

    公开(公告)日:2021-01-26

    申请号:US16658227

    申请日:2019-10-21

    摘要: Systems and methods for user identity and transaction authentication are described. A user may be authenticated by a terminal configured to process image data of a two-dimensional code to decode key information, the two-dimensional code comprising a cryptographic binding of user credentials including a low-resolution image of the user's face and optionally user biometric data to database user information stored on a secure server. A hash of the two-dimensional code has several digits in common with the hash of the user information stored on the secure server. Authentication may be carried out by computing and comparing the hash values, comparing the high-resolution image of the user's face fetched from the secure server to the user and to the low resolution image embedded in the two dimensional code. The two-dimensional code may be generated to provide access to a restricted area.

    Method and apparatus for time limited messages in packet communications

    公开(公告)号:US09973461B2

    公开(公告)日:2018-05-15

    申请号:US14306515

    申请日:2014-06-17

    IPC分类号: H04L12/58

    CPC分类号: H04L51/18 H04L51/04 H04L51/34

    摘要: Systems and methods are provided for direct packet communications and store and forward packet communications including packets which have attributes which determine the lifetime of the packet contents and these lifetimes are optionally a function of the recipient. Example methods are given featuring the transmission of packets with limited lifetime, the storing and retransmission of packets to one or more recipients and confirmation of deletion of packet contents. It is also shown that cryptography may be employed to ensure that timed presentation of packet contents to recipients takes place and is authenticated by the sender.

    Binding data to a person's identity

    公开(公告)号:US10902242B2

    公开(公告)日:2021-01-26

    申请号:US16599497

    申请日:2019-10-11

    IPC分类号: G06F21/32 G06K9/00 G06T11/00

    摘要: Methods and systems are described for creating irrefutable binding data for a data file. An input sequence of data elements is derived based on information from the data file. A graphical representation of input regions corresponding to the input sequence of data elements is output on a display, superimposed on captured image data including a visible feature of a user associated with the data file. User input of each data element of the input sequence is captured by tracking the visible feature through the corresponding input regions, and the binding data is created from the captured images as the visible feature is tracked through the input regions.

    Binding data to a person's identity

    公开(公告)号:US10445561B2

    公开(公告)日:2019-10-15

    申请号:US15711311

    申请日:2017-09-21

    IPC分类号: G06F21/32 G06K9/00 G06T11/00

    摘要: Methods and systems are described for creating irrefutable binding data for a data file. An input sequence of data elements is derived based on information from the data file. A graphical representation of input regions corresponding to the input sequence of data elements is output on a display, superimposed on captured image data including a visible feature of a user associated with the data file. User input of each data element of the input sequence is captured by tracking the visible feature through the corresponding input regions, and the binding data is created from the captured images as the visible feature is tracked through the input regions.

    Data communication between a group of users

    公开(公告)号:US12003650B2

    公开(公告)日:2024-06-04

    申请号:US17642195

    申请日:2020-09-10

    摘要: Systems and methods are described for implementing communication of data between a group of users in a communication system. In one implementation, a plurality of quorum portions of a private group signing key are generated and provided to each of a plurality of devices of the group of users, wherein a group digital signature is reconstructed from a predetermined minimum number of encrypted portions of the group digital signature, each generated by a respective device of the group of users using a corresponding quorum portion of the private group signing key. Each user device may digitally sign group output data using a respective private group signing key portion. A reconstructed group digital signature may be verified using a corresponding public group signing key. Other embodiments are also described and claimed.

    Systems and methods for quorum-based data processing

    公开(公告)号:US11853171B2

    公开(公告)日:2023-12-26

    申请号:US16893937

    申请日:2020-06-05

    摘要: The present disclosure includes systems and methods for quorum-based data processing, in which quorum portions are distributed to candidate participants in determined proportions that control groups of required participants. In exemplary embodiments, a server generates a plurality of quorum portions from original data, wherein the original data includes secret information for data processing within a secured computing environment, and wherein at least a predetermined minimum number of the quorum portions are required to reconstruct the original data. Sets of quorum portions are determined from said plurality of quorum portions, wherein each set includes a respective proportion of the plurality of quorum portions, and at least one set includes a larger proportion of the quorum portions. Each set of quorum portions is distributed to a respective one of a plurality of computing devices associated with respective participants over a data network within a secured computing environment.

    Systems and methods for quorum-based data recovery

    公开(公告)号:US10678658B2

    公开(公告)日:2020-06-09

    申请号:US16211857

    申请日:2018-12-06

    摘要: The present disclosure includes systems and methods for quorum-based data recovery, in which data is recovered provided at least a minimum number of quorum data portions are presented. In exemplary embodiments, a predetermined minimum number of versions of original data is received, and the original data is reconstructed from the received versions, wherein the original data cannot be reconstructed without loss unless a predetermined minimum number of versions is received. In other embodiments, erroneous or corrupted quorum data portions are detected and associated participants presenting said erroneous or corrupted quorum data portions are identified.

    Controlled and verifiable information destruction

    公开(公告)号:US10467099B2

    公开(公告)日:2019-11-05

    申请号:US15782193

    申请日:2017-10-12

    摘要: Digital data archival methods and systems are described, providing controlled and verifiable information destruction. In one embodiment, the method comprises storing digitally encoded information, wherein the information is encoded as a sequence of numbers or symbols using parameters defining an associated error correction ability of an error correcting algorithm based on a lifetime of the digitally encoded information. Errors are periodically added to the sequence of numbers or symbols, such that the digitally encoded information is recoverable from the sequence of numbers or symbols during the defined lifetime, and after a total of number of added errors exceeds the associated error correction ability, the digitally encoded information cannot be retrieved.

    METHOD AND APPARATUS FOR TIME LIMITED MESSAGES IN PACKET COMMUNICATIONS

    公开(公告)号:US20180262456A1

    公开(公告)日:2018-09-13

    申请号:US15980019

    申请日:2018-05-15

    IPC分类号: H04L12/58

    CPC分类号: H04L51/18 H04L51/04 H04L51/34

    摘要: The present disclosure includes systems and methods for direct packet communications and store and forward packet communications including packets which have attributes which determine the lifetime of the packet contents and these lifetimes are optionally a function of the recipient. Example methods are given featuring the transmission of packets with limited lifetime, the storing and retransmission of packets to one or more recipients and confirmation of deletion of packet contents. It is also shown that cryptography may be employed to ensure that timed presentation of packet contents to recipients takes place and is authenticated by the sender.