-
1.
公开(公告)号:US20250030702A1
公开(公告)日:2025-01-23
申请号:US17389913
申请日:2021-07-30
Applicant: Wells Fargo Bank, N.A.
Inventor: Peter BORDOW , Jeff J. STAPLETON , Ramesh YARLAGADDA
IPC: H04L29/06
Abstract: A computer-implemented method, apparatus, and computer program product for digital identity based authentication are provided. An example method includes receiving a request for authentication associated with a first user and determining attributes associated with the first user that include at least one static attribute and at least one dynamic attribute. The method further includes generating an inquiry authentication credential based upon the static attribute and the dynamic attribute and includes querying a digital identity construct database storing one or more previously acquired attributes of the first user. The method includes obtaining a verified authentication credential based upon the previously acquired iterations of the static and dynamic attributes and includes authenticating the first user based upon a comparison between the inquiry authentication credential and the verified authentication credential.
-
公开(公告)号:US12206817B2
公开(公告)日:2025-01-21
申请号:US18387756
申请日:2023-11-07
Applicant: Global Tel*Link Corporation
Inventor: Stephen L. Hodge
IPC: H04L29/06 , H04L9/40 , H04L65/1069 , H04M3/00 , H04M3/22
Abstract: Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
-
公开(公告)号:US12206780B2
公开(公告)日:2025-01-21
申请号:US18446939
申请日:2023-08-09
Applicant: Anat Naschitz , Jan Schultink
Inventor: Anat Naschitz , Jan Schultink
Abstract: In some embodiments, the present description provides systems and/or methods including receiving an asset token associated with a source entity, the asset token encoding asset metadata associated with a particular data asset. A query is received from a recipient entity and a similarity measure between the query and the asset metadata of the asset token is determined. A notification is provided to the source entity identifying a matching query to the asset token and a percent match. A source entity response to the notification is received including a consent to interact with the recipient entity. A recipient notification is provided to the recipient entity identifying the particular data asset associated with the asset token and initiating an escalating confidentiality workflow to enable the recipient entity to access private data associated with the source entity for executing a transaction regarding the particular data asset.
-
公开(公告)号:US12206763B2
公开(公告)日:2025-01-21
申请号:US18136177
申请日:2023-04-18
Applicant: Winkk, Inc.
Inventor: Rustam Islamov
Abstract: Aspects of associative cryptography key operations are described. In one embodiment, a first cryptographic function is applied to secret data to produce a first encrypted result. The first encrypted result is transmitted by a first device to a second device. The second device applies a second cryptographic function to the first encrypted result to produce a second encrypted result. At this point, the secret data has been encrypted by two different cryptographic functions, each of them being sufficient to secure the secret data from others. The two different cryptographic function can be inversed or removed, in any order, to reveal the secret data. Thus, the first device can apply a first inverse cryptographic function to the second encrypted result to produce a first result, and the second device can apply a second inverse cryptographic function to the first result to decrypt the secret data.
-
公开(公告)号:US12206683B2
公开(公告)日:2025-01-21
申请号:US17305303
申请日:2021-07-02
Applicant: Palo Alto Networks, Inc.
Inventor: Krishnan Shankar Narayan
IPC: H04L29/06 , G06F18/24 , H04L9/40 , H04L67/133
Abstract: A system processes an API specification provided by a vendor to determine and classify the functions defined therein by CRUD operation type based on analysis of the function names. Classification of the function includes associating a bitmask corresponding to the class with the function name. The system then subscribes to an event stream including logged API function call events during a time window overlapping with a “blind spot” period of attack detection. The system analyzes incoming events to identify an associated resource and an API function call. The system classifies the function based on the determined function classes and performs a bitwise operation between bit values maintained for the identified resource that are indicative of resource state and the bitmask of the function class. If the resulting bit values indicate that the resource was both created and deleted during the time window, the system flags the resource as potentially involved in an attack.
-
公开(公告)号:US12206662B2
公开(公告)日:2025-01-21
申请号:US17811178
申请日:2022-07-07
Applicant: BROTHER KOGYO KABUSHIKI KAISHA
Inventor: Kentaro Arai
Abstract: A server may receive, from a terminal device, a change instruction for changing a password of a communication device different from the server and the terminal device. The server may, in a case where the change instruction is received from the terminal device, send first authentication information to the terminal device. The first authentication information may be inputted to the communication device by a user of the terminal device after the first authentication information has been sent to the terminal device. The server may, in a case where the first authentication information is inputted to the communication device, receive the first authentication information from the communication device. The server may, in a case where the first authentication information is received from the communication device, send a change permission notification to the communication device. The change permission notification may be a notification to permit the communication device to change the password.
-
公开(公告)号:US12206661B2
公开(公告)日:2025-01-21
申请号:US18378739
申请日:2023-10-11
Applicant: Bank of America Corporation
Inventor: Morgan S. Allen , Melissa Ortiz-Munoz , ChellaPrabhu Andrew Mariadoss
Abstract: Arrangements for providing multi-party exchange functions are provided. In some aspects, a request for exchange may be received by a computing platform. The request for exchange may include identification of parties involved in the exchange, identification of goods, services, property, or the like, involved in the exchange, and the like. In some examples, the computing platform may determine a value of property, goods, or services associated with the exchange. The computing platform may request additional exchange data from one or more other parties. For instance, data associated with the exchange and another party to the exchange may be requested and received. In some examples, unique exchange identifiers may be generated linking each party to the exchange to the goods, services or property being exchange, a value, or the like. An indication of acceptance may be received and one or more exchange processing functions may be executed.
-
公开(公告)号:US12204637B2
公开(公告)日:2025-01-21
申请号:US17209603
申请日:2021-03-23
Applicant: International Business Machines Corporation
Inventor: Shripad Nadgowda , Fabio Abreu Oliveira
Abstract: A computer implemented method for compliance profiling, the method comprising creating an application security profile indicating a set of permissions enabled for a corresponding application, associating one or more source files corresponding to the application to a running workload, executing the running workload, capturing a workload security profile with respect to one or more operations executed by the running workload, wherein the workload security profile indicates a set of permissions utilized by the running workload, comparing the workload security profile and the application security profile to identify one or more differences, and recommending a change to the application security profile according to the identified one or more differences.
-
公开(公告)号:US12200107B1
公开(公告)日:2025-01-14
申请号:US18177568
申请日:2023-03-02
Applicant: Wells Fargo Bank, N.A.
Inventor: Brad A. Shea , Jeff J. Stapleton , Robert L. Carter, Jr. , Pierre Arbajian , Peter Bordow , Michael Erik Meinholz
Abstract: A computing entity accesses one or more blocks of a blockchain, encrypts the content of the one or more blocks using a first cryptographic technique to generate one or more first encrypted block values, and writes a first side chain block comprising the one or more first encrypted block values and a first signature to a first side chain. The computing entity accesses at least one of (a) at least one block of a particular second set of one or more second sets of the plurality of blocks or (b) one or more first side chain blocks corresponding to blocks of the second set, encrypts the content of the accessed block(s) using a second cryptographic technique to generate at least one second encrypted block value, and writes a second side chain block comprising the at least one second encrypted block value and a second signature to a second side chain.
-
公开(公告)号:US12200003B2
公开(公告)日:2025-01-14
申请号:US18475821
申请日:2023-09-27
Applicant: KOUNT INC.
Inventor: Matthew Lewis Jones
Abstract: A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.
-
-
-
-
-
-
-
-
-