SECURING A CARDLESS ATM AUTHENTICATION THROUGH POSITION DETECTION

    公开(公告)号:WO2021145979A1

    公开(公告)日:2021-07-22

    申请号:PCT/US2020/064227

    申请日:2020-12-10

    发明人: MILLER, Mitchell

    摘要: Systems and methods includes a kiosk. The kiosk performs an electronic payment transaction based on instructions received from a portable device of a user. The system further includes a transmitting device electrically coupled to the kiosk. The transmitting device is configured to transmit a first signal to the portable device at a first direction. The system further includes a receiving device electrically coupled to the kiosk. The receiving device is configured to receive a second signal from the portable device at a second direction. The transmitting device and receiving device are positioned such that the first and second direction enable determination of a position of the user, where the processor enables the electronic payment transaction to be processed only when the portable device is at a location relative to the kiosk. The location is disposed within a transmission path coextensive with both the first direction and the second direction.

    AUTOMATED AUTHENTICATION AND AUTHORIZATION IN A COMMUNICATION SYSTEM

    公开(公告)号:WO2021150798A1

    公开(公告)日:2021-07-29

    申请号:PCT/US2021/014481

    申请日:2021-01-22

    申请人: VALIMAIL INC.

    摘要: An application-operating organization may delegate a third-party server to serve as an automated contextual authentication responder and an authorization responder. The third-party server may manage a delegated section of the organization's namespace that includes the public identities of various devices controlled by the organization. The third-party server may also dynamically generate interaction control list that is tailored to a requesting device's context based on the interaction control policies set forth by the organization. The interaction control list may include information that determines the authorization of the requesting device to interact with another device. The third-party server may also automatically determine the role of a new device to which existing policies are inapplicable and provide guided workflow for the organization to set up new interaction control policies in governing the new device. The determination of the roles of devices may be based on an iterative process using external data sources.

    DEVICE AND METHOD FOR HYBRID DEVICE ATTESTATION

    公开(公告)号:WO2022002384A1

    公开(公告)日:2022-01-06

    申请号:PCT/EP2020/068499

    申请日:2020-07-01

    摘要: The present disclosure relates generally to the field of trusted computing. In particular, the disclosure relates to a device and a method for performing remote device attestation. The device is configured to obtain an External Device Attestation (EDA) extension generation request for a target device, in which the target device has a trust relationship with the device. Then, the device is configured to obtain an EDA extension for the target device in response to the EDA extension generation request, in which the EDA extension comprises an identity of the device, an identity of the target device, and a security level of the trust relationship. Then, the device is configured to generate a device attestation message for performing the device attestation based on the EDA extension. In particular, information comprised in the EDA extension enables an external verifier to attest the trust relationship.

    DATA ACCESS CONTROL WITH A CONFIDENTIAL BLOCKCHAIN NETWORK

    公开(公告)号:WO2021262292A1

    公开(公告)日:2021-12-30

    申请号:PCT/US2021/027873

    申请日:2021-04-19

    摘要: Technologies are disclosed herein for secure data access. A client device accesses a slice of data using a ticket retrieved from a permissioned blockchain. To obtain the ticket, the client device submits ticket requests to multiple nodes of the permissioned blockchain. Each request identifies the slice of data, e.g. a particular row in a particular database table. Each request also includes parameters describing the circumstances of the request, such as the requesting user account, the geographic location of the computing device, etc. The permissioned blockchain stores each authorized combination of request parameters and data slices in a different access level block. If an access level block can be found that is associated with the requested slice of data and with all of the supplied parameters, and if that access level block grants permission, then the requested ticket is returned to the client device.