Patent classifications
G06F2211/009
Counting machine for manufacturing and validating event-relevant identities via an ensemble network
A Counting Machine for Manufacturing and Validating Event-Relevant IDs, tagged with both Trust and Confidence Scores, for Specific Entities (Individuals and Enterprises) and their Prosoponyms using a Managed Secure-Immutable-Nonreputable-Replicated-Verifiable and Fault-Tolerant Distributed Datastore via an Ensemble-Based Network of both Existing and Newly-Created Heterogenous Single- and Multi-Factor ID Validation Services, the Ensemble consisting of both Commercial Organizations (known as Members) requiring valid Entity IDs for use during various events, such as purchase transactions, and Service Providers (known as Partners) who supply technology services for ID validation (as standalone services or as licensed by Members). The instant abstract is neither intended to define the invention disclosed in this specification nor intended to limit the scope of the invention in any way.
Counting machine for manufacturing and validating event-relevant identities via an ensemble network
A Counting Machine for Manufacturing and Validating Event-Relevant IDs, tagged with both Trust and Confidence Scores, for Specific Entities (Individuals and Enterprises) and their Prosoponyms using a Managed Secure-Immutable-Nonreputable-Replicated-Verifiable and Fault-Tolerant Distributed Datastore via an Ensemble-Based Network of both Existing and Newly-Created Heterogenous Single- and Multi-Factor ID Validation Services, the Ensemble consisting of both Commercial Organizations (known as Members) requiring valid Entity IDs for use during various events, such as purchase transactions, and Service Providers (known as Partners) who supply technology services for ID validation (as standalone services or as licensed by Members). The instant abstract is neither intended to define the invention disclosed in this specification nor intended to limit the scope of the invention in any way.
Step-up authentication for single sign-on
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. The method further includes receiving first credentials of the user. The method further includes, responsive to validating the first credentials, generating a second authentication event, associating the second authentication event with the primary token, and issuing a first secondary token that authenticates the user to access the second resource.
Verification and validation of third party PLC code
A method for performing verification and validation of third party PLC code includes a marketplace computer receiving a program from a technology developer and identifying variables and operations included in the program. The marketplace computer performs (i) error handling testing on the program to yield error test results; (ii) vulnerability testing on the program to yield vulnerability test results; and (iii) performance testing of the program on target platforms to yield performance test results. Next, the marketplace computer generates a report based on the variables and operations included in the program, the error test results, the vulnerability test results, and the performance test results. This report may be sent by the marketplace computer to the technology developer.
STEP-UP AUTHENTICATION FOR SINGLE SIGN-ON
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. The method further includes receiving first credentials of the user. The method further includes, responsive to validating the first credentials, generating a second authentication event, associating the second authentication event with the primary token, and issuing a first secondary token that authenticates the user to access the second resource.
Demonstrating integrity of a compartment of a compartmented operating system
A computing platform 20 runs a compartmented operating system 22 and includes a trusted device 23 for forming an integrity metric which a user can interrogate to confirm integrity of the operating system. Also, the integrity of an individual compartment 24 is verified by examining status information for that compartment including, for example, the identity of any open network connections, the identity of any running processes, and the status of a section of file space allocated to that compartment 24. Hence, the integrity of an individual compartment 24 of the compartmented operating system 22 can be demonstrated.
Step-up authentication for single sign-on
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a primary token that is associated with a first authentication event of the user and authenticates the user to access the first resource, and receiving a first request to access the second resource. The method further includes receiving first credentials of the user. The method further includes, responsive to validating the first credentials, generating a second authentication event, associating the second authentication event with the primary token, and issuing a first secondary token that authenticates the user to access the second resource.
Decentralized online multi-agent visual question answering
An approach to real-time multi-agent visual question answering in a decentralized environment. The approach can include initializing a plurality of agents based on data associated with an image and a question about the image. The approach can include identifying a first portion of the plurality of agents to construct a grid of agents based on similarity between the first portion of agents. The approach can include determining a second portion of agents of the first portion of agents with edges between agents allowing sharing of agent concepts and agent parameters. The approach can include generate training trajectories of the grid of agents based on executing a collaborative rollout. Additionally, the approach can include optimizing agent policies of the grid of agents.