ADAPTIVE RECOVERY FOR DIGITAL IDENTITY PLATFORM

    公开(公告)号:WO2023043465A1

    公开(公告)日:2023-03-23

    申请号:PCT/US2021/051133

    申请日:2021-09-20

    Abstract: A method, performed by a digital identity computer, for processing a resource request is disclosed. The method includes receiving, from a user device operated by a user, a resource request and indication of identity attributes needed to process the resource request. The digital identity computer may then retrieve an identity token associated with the user and compute an authentication score based on the sensitivity and rarity of the identity attributes indicated. The authentication score can be used to determine an authentication process. After determining and executing the authentication process with the user device, the digital identity computer may then grant the user device access to the resource requested.

    PRIVACY-PRESERVING IDENTITY ATTRIBUTE VERIFICATION USING POLICY TOKENS

    公开(公告)号:WO2022015663A1

    公开(公告)日:2022-01-20

    申请号:PCT/US2021/041314

    申请日:2021-07-12

    Abstract: Methods and systems for privacy-preserving identity attribute verification are presented. During an interaction between a relying entity and a user, a relying entity computer can transmit a policy token to a user device. The policy token may indicate the information needed by the relying entity in order to perform the interaction. The user device can verify the policy token, then use the policy token in conjunction with an identity token to generate a zero-knowledge proof. The user device may transmit the zero-knowledge proof to an identity service provider computer. The identity service provider computer may verify the zero-knowledge proof, then generate a verification message. The identity service provider computer may sign the verification message and transmit the signed verification message to the relying entity computer. The relying entity computer may verify the verification message and complete the interaction with the user.

    OBLIVIOUS FILTERING OF DATA STREAMS
    3.
    发明申请

    公开(公告)号:WO2020069431A1

    公开(公告)日:2020-04-02

    申请号:PCT/US2019/053640

    申请日:2019-09-27

    Abstract: A technique for oblivious filtering may include receiving an input data stream having a plurality of input elements. For each of the input elements received, a determination is made as to whether the input element satisfies a filtering condition. For each of the input elements received that satisfies the filtering condition, a write operation is performed to store the input element in a memory subsystem. For those of the input elements received that do not satisfy the filtering condition, at least a dummy write operation is performed on the memory subsystem. The contents of the memory subsystem can be evicted to an output data stream when the memory subsystem is full. The memory subsystem may include a trusted memory and an unprotected memory.

    REMOTE CONFIGURATION OF SECURITY GATEWAYS
    4.
    发明申请

    公开(公告)号:WO2019036717A1

    公开(公告)日:2019-02-21

    申请号:PCT/US2018/047078

    申请日:2018-08-20

    Abstract: Methods and systems for generating a security policy at a gateway are disclosed. A server computer and a gateway can perform a protocol in order to train a security model at a gateway, such that it can detect attack packets and prevent those attack packets from reaching the server computer via the gateway. In a learning phase, the server computer can provide training packets and test packets to the gateway. The gateway can use the training packets to train a security model, and the gateway can classify the test packets using the security model in order to test its accuracy. When the server computer is satisfied with the accuracy of the security policy, the server computer can transmit an acceptance of the security policy to the gateway, which can subsequently deploy the model in order to detect and filter attack packets.

    AGILE CRYPTOGRAPHIC DEPLOYMENT SERVICE
    5.
    发明申请

    公开(公告)号:WO2022211899A1

    公开(公告)日:2022-10-06

    申请号:PCT/US2022/014994

    申请日:2022-02-02

    Abstract: Embodiments are directed to methods and systems for crypto-agile encryption and decryption. A computer system can possess a protocol file that identifies one or more cryptographic software modules. Using these cryptographic software modules, the computer system can generate a plurality of shared secrets and a session key, then use the session key to encrypt a message. The message can be sent to a server computer that can subsequently decrypt the message. At a later time, the protocol file can be updated to identify a different set of cryptographic software modules, which can be used to encrypt messages. Further, the server computer can transmit additional cryptographic software modules to the computer system, enabling the computer system to use those cryptographic software modules to generate cryptographic keys. As such, the cryptographic protocol file can be changed in response to changes in the cryptographic needs of the computer system.

    TOKEN-BASED OFF-CHAIN INTERACTION AUTHORIZATION

    公开(公告)号:WO2022154789A1

    公开(公告)日:2022-07-21

    申请号:PCT/US2021/013316

    申请日:2021-01-13

    Abstract: Methods and systems for token-based off-chain interaction authorization are disclosed, A hub computer can maintain a network of off-chain (or "layer two") channels between itself, cryptocurrency issuer computers, and cryptocurrency custodian computers. These off-chain channels correspond to one or more underlying blockchains. The hub computer can receive an access token, a resource provider identifier, and an interaction value. The hub computer can use the access token to identify a cryptocurrency issuer computer associated with the mobile device, and use the resource provider identifier to identify the cryptocurrency custodian computer associated with the access device. The hub computer can update the state of the off-chain channels corresponding to these two computers based on the interaction value, then transmit an authorization response message.

    DYNAMIC PRIVACY-PRESERVING APPLICATION AUTHENTICATION

    公开(公告)号:WO2022051463A1

    公开(公告)日:2022-03-10

    申请号:PCT/US2021/048822

    申请日:2021-09-02

    Abstract: An application or device is authenticated using secure application data validation. A server computer receives an authentication request comprising an application identifier or a user device identifier associated with a user device, the authentication request originating from the user device. The server computer receives a set of behavioral data associated with the application or the user device. Responsive to receiving the application identifier or device identifier, the server computer obtains a fuzzy vault associated with the application identifier or the user device identifier. The server computer determines a reconstructed key value using the fuzzy vault and the set of behavioral data. The application or the user device is authenticated using the reconstructed key value.

Patent Agency Ranking