G06F21/305

IDENTITY PROVIDER SELECTION FOR IDENTITY ATTRIBUTE SHARING PROCESS
20230075915 · 2023-03-09 ·

Methods of selecting an identity provider using an identity attribute sharing system may include accessing, by a user device, a page of a relying party. The methods may include receiving, by the user device, a selection to utilize an identity network to share a number of identity attributes with the relying party. The methods may include displaying, by the user device, a plurality of identity providers enrolled for use with the identity attribute sharing system. The methods may include receiving, by the user device, a selection of one of the plurality of identity providers. The methods may include providing access to a page of a selected identity provider.

AUTHORIZATION CODE FOR ACCESS

A method for sharing digital identity data, the method comprising, using the identity network, receiving an indication of consent from a user device to share a plurality of identity attributes with a relying party, wherein the plurality of identity attributes are associated with a user of the user device, generating an internal authorization code after receiving the consent, providing the internal authorization code to the user device, receiving the internal authorization code from the relying party, in response to receiving the internal authorization code, providing an internal access token to the relying party, receiving the internal access token from the relying party, and in response to receiving the access token, providing the plurality of identity attributes to the relying party.

Vehicle operation device, vehicle operation method, and non-transitory storage medium storing vehicle operation program
11597349 · 2023-03-07 · ·

A vehicle operation device includes memory and a processor. The processor is configured to store tokens received from a server in the memory to be used for authentication to a vehicle. When an operation of the vehicle is performed in a state in which communication with the server is possible, a token is used to conduct authentication to the vehicle. When a predetermined operation of the vehicle is performed in a state in which communication with the server is interrupted, authentication to the vehicle is conducted without using a token.

Secure hardware backdoor for digital devices
11475108 · 2022-10-18 ·

This Application describes devices, and techniques for using them, capable of providing a secure hardware backdoor for digital devices, thus allowing valid access to secure target device data without the owner's consent, while still assuring the owner's knowledge whenever any access has occurred, whether validly or not. Each target device's data is protected by maintaining protected data encrypted on the target device, maintaining encryption keys for protected data in a “secure enclave”, causing the secure enclave to generate secure data in response to a hardware trigger, the secure data being usable to provide access to the device, and providing relatively difficult yet achievable retrieval of the secure data with physical access to the target device, and using the secure data to access protected data on the target device, while also assuring that the target device's owner can determine when the secure data was retrieved.

Method and system for pro-active desktop resume operation based on historical data

A system and method for resuming a remote desktop for a networked client device. An access control system accepts login data from a user input to a networked client device, and/or user activity data collected by an agent running on the desktop. The networked client device may include a client application. A data center allows access to an activated desktop to the networked client device. The access control system suspends the desktop when the user is inactive in operating the client device. The access control system resumes the desktop on the networked client device in relation to a predicted start time. The predicted start time is based on login data from past logins by the user on networked client devices.

DIGITAL IDENTITY SIGN-IN

Disclosed herein is an identity network that provides a universal, digital identity for users to be authenticated by an identity provider for relying parties upon sign-in to the relying party. The identity network receives the sign-in request from a relying party for a user using a user device. The identity network can provide a session identifier to the relying party for the request and launch an identity provider application associated with the user via a software development kit in the relying party application. The user may sign-in to the identity provider via the software development kit, thereby authenticating the user for the relying party. Additionally, the identity provider may generate a risk validation score and provide it to the relying party that provides a confidence value that the user is validly using the user device and a risk score based on device activity on the identity network.

ELECTRONIC DEVICE FUNCTIONALITY IN LOW POWER MODE

Embodiments disclosed herein relate to reducing a power consumption of an electronic device while maintaining some functionality of the electronic device while the electronic device is in a low power mode. The device may be in the low power mode due to a battery level being below a threshold. If the battery level is below the threshold, the electronic device may enter the low power mode. However, before entering the low power mode, some functionality of an application processor may be transferred to a communication controller. Once the functionality is transferred, the application processor may be disabled to reduce power consumption while maintaining functionality of the application processor. The electronic device may also utilize various communication protocols to communicate with a peripheral device. Even though the electronic device may be in the low power mode, the communication controller may be used to cause the peripheral device to perform various actions.

System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information
11630704 · 2023-04-18 · ·

A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.

Processing device, system, and authentication device for secure authentication between devices

To provide a structure capable of performing more secure authentication between devices. There is provided a processing device comprising: a processing unit that executes a defined process that is defined in advance according to an input first request, executes calculation using first information included in the first request, and transmits a first response including a result of the calculation to a first device having output the first request, wherein the processing unit transmits a second request including second information different from the first information to at least one second device different from the first device, and acquires a second response including a result of calculation using the second information from the at least one second device.

Remotely controlled technician surrogate device

A remote technical support system includes an edge device that operates as a highly secured conduit for a technician to view, access, and control a target device via a secure protocol over a connection medium between the edge device and the target device. The edge device's architecture allows it to selectively present numerous peripheral devices to the target device. The architectural components of the edge device can be controlled by a technician through a secure connection with a trusted server which allows authorized to access the edge device. The edge device also relays technician commands to and obtains diagnostic information from the target device and communicates feedback to the technician over the secure connection. The commands may be relayed to the target via the one or more selectively connected USB peripherals.