Patent classifications
G06F21/30
Resolving blockchain domains
A request to resolve a name of a domain of an identifier of web content is received. It is automatically determined that the name of the domain is to be resolved using a blockchain. A request is sent to a smart contract of the blockchain to obtain one or more resolution records for the domain. The one or more resolution records of the domain are received. The received one or more resolution records are utilized to resolve the name of the domain.
Context-dependent authentication system, method and device
A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.
Blood glucose control system switching without interruption of therapy delivery
Systems and methods are disclosed herein for switching an application executing on an ambulatory medical device to a new application without interrupting therapy provided by the ambulatory medical device to a subject. The ambulatory medical device may receive an indication that an update to an application executing on the ambulatory insulin pump is available, establish a communication connection to a host computing system, download and install the application update, while a prior version of the application continues to run. The disclosed systems and methods can confirm successful installation of the application update on the ambulatory medical device and switch control of the ambulatory medical device from the prior version to the new version of the application without interrupting therapy provided to the subject.
Automatic building system control restrictions based on physical presence defined by access control event information and knowledge base system
A method of controlling a building system is provided. The method comprising: receiving an action request to adjust a building device from a user device; obtaining a token from a previous action request from the user device to adjust the building device when a token exists from a previous action request; transmitting the token for validation within the building device; and adjusting the building device when the token has been validated.
Using security event correlation to describe an authentication process
Techniques are described herein that are capable of using security event correlation to describe an authentication process. Multiple events may describe a common (i.e., same) attempt to authenticate the user. For instance, a first event may include a first description of the attempt, a second event may include a second description of the attempt, and a third event may include a third description of the attempt. The first, second, and third events may be correlated based at least in part on the first, second, and third descriptions. The first, second, and third events may be aggregated to provide an aggregated event that includes an aggregation of the first, second, and third descriptions. An authentication report may be generated to include the aggregation of the first, second, and third descriptions to describe the authentication process.
Identifier
A computer device (100), configured to encode identifiers by providing audio identifiers therefrom, is described. The computer device (100) is configured to provide a set of audio signals as respective bitstreams. Each audio signal of the set of audio signals is defined based, at least in part, on audio signal information including at least one of a type, a fundamental frequency, a time signature and a time. Each audio signal comprises a set of audio segments. Each audio segment of the set of audio segments is defined based, at least in part, on audio segment information including at least one of a frequency, an amplitude, a transform, a time duration and an envelope. The computer device (100) is configured to receive an identifier and select a subset of audio signals from the set of audio signals according to the received identifier based, at least in part, on the audio signal information and/or the audio segment information. The computer device (100) is configured to process the audio selected subset of audio signals by combining the selected subset of audio signals to provide an audio identifier. The computer device (100) is configured to output the audio identifier in an output audio signal as an output bitstream, wherein the audio identifier encodes the identifier. Also described is a method of encoding identifiers by providing audio identifiers therefrom.
Access control apparatus and method for controlling configuration of automation apparatus
An access control apparatus and method for controlling a configuration of an automation apparatus. The method includes: reading authentication information from an electronic tag; transmitting the authentication information to a networked service; receiving access rights from the networked service; and controlling the configuration of the automation apparatus according to the access rights.
Machine learning-based method and system for detecting plaintext passwords
A technological solution for mitigating a cybersecurity risk on a computer that potentially includes a plaintext password. The solution includes searching a computer resource on the computer, analyzing any text, detecting a string of characters in the text that potentially includes a plaintext password, determining a confidence score for the string of characters indicating a likelihood the string of characters includes the plaintext password, and effectuating a remediation action based on the confidence score, wherein the remediation action includes encrypting the string of characters when the confidence score is equal to or greater than a first certainty level.
Trusted autonomy framework for unmanned aerial systems
Disclosed herein are embodiments for providing a trusted autonomy framework for unmanned aerial systems. One embodiment of a method includes receiving a request from an entity to participate in secure data sharing within the trusted autonomy framework for unmanned aerial systems, receiving a type of data that will be shared via the entity, and verifying an identity of the entity, a security infrastructure of the entity, and validating the data to be shared. In some embodiments, in response to verifying, accepting the entity into the trusted autonomy framework for unmanned aerial systems.
Device protection using configuration lockdown mode
Techniques are provided for device protection using a configuration lockdown mode. One method comprises receiving a configuration command from a user for a device; determining, responsive to receiving the configuration command, if the device is in a configuration lockdown mode that limits an execution of one or more configuration commands; and performing one or more automated remedial actions in response to determining that the device is in the configuration lockdown mode, such as generating a configuration lockdown alert. A configuration manager associated with the device may (i) determine if a duration of a disabling of the configuration lockdown mode violates one or more duration limits, and/or (ii) determine if the device is in the configuration lockdown mode.