Authenticating key-value data pairs for protecting node related data

    公开(公告)号:US12120097B2

    公开(公告)日:2024-10-15

    申请号:US17889782

    申请日:2022-08-17

    CPC classification number: H04L63/0435 H04L9/0631 H04L9/0822 H04L9/321

    Abstract: A computer-implemented method according to one embodiment includes using a first symmetric key to encrypt a second symmetric key. The first symmetric key is securely loaded inside a hardware security module (HSM) by a key management service before the encryption of the second symmetric key, and a cloud provider only has access to encrypted bits of the first symmetric key. Key data of a key-value-pair of the second symmetric key is used as additional authenticated data (AAD) for the encryption of the second symmetric key. The second symmetric key is used to encrypt value data of the key-value-pair. The method further includes storing the encrypted second symmetric key, the AAD used in the encryption of the second symmetric key, and tag bits created during the encryption of the second symmetric key, to thereafter use for verifying node related data.

    Systems, methods, and computing platforms for executing credential-less network-based communication exchanges

    公开(公告)号:US12063211B2

    公开(公告)日:2024-08-13

    申请号:US18491202

    申请日:2023-10-20

    CPC classification number: H04L63/083 H04L9/0819 H04L9/321

    Abstract: Various embodiments of the present disclosure provide techniques for facilitating a credential-less exchange over a network using a plurality of identifier mapping and member interfaces. The techniques may include initiating the presentation of an enrollment user interface via a client device of a user and receiving selection data indicative of a selection of a service provider instrument from the enrollment user interface. The techniques include generating a matching code for authenticating the user, providing the matching code to a service provider platform, and receiving the matching code from a partner platform. In response to an authentication of the user based on the matching code, the techniques may include generating an UUEK for the user that may be used to replace persistent credentials.

Patent Agency Ranking