G06F21/305

CENTRALIZED ACCESS MANAGEMENT OF WEB-BASED OR NATIVE APPLICATIONS
20170346830 · 2017-11-30 ·

Provided is a process including: processing, with a permission-management application requests to manage permissions of one or more users to access resources with client computing devices, wherein: the permission-management application is configured to manage permissions for users of an organization to access a plurality of network-accessible applications; the plurality of different network-accessible applications have different permission-management application program interfaces; and the permission-management application is configured to manage permissions for users to access respective instances of a plurality of different native applications executing on the client computing devices.

Secure time-to-live

Determining whether to allow access to a message is disclosed. A message is received from a sender. The message is associated with a first time-to-live (TTL) value. A determination is made that the first time-to-live value has not been exceeded. The determination is made at least in part by obtaining an external master clock time. In response to the determination, access is allowed to the message.

Device and method for controlling access to at least one machine
09830443 · 2017-11-28 · ·

The invention relates to a device for controlling access to a machine, comprising a portable object having a signal transmission member and a device for locking and unlocking a machine. The member for controlling the device is capable of triggering, once the second transceiver of the device has received the signal, the transmission of a signal to a wireless radio receiver supported by the portable object, and comprises a control member for triggering, when the wireless radio receiver has received the second signal, the transmission of a signal, the control member being connected to a calculator member for computing a distance between the portable object and the device using the signals, the portable object comprising a member for independently powering the transmission member, the receiver and the control member thereof. The device comprises a further calculator member for computing an incoming angle of the first signal and/or the third signal such as to trigger, when the angle is within a given angular range and when the distance is lower than a predetermined value, the unlocking of the machine and to trigger, when the distance is higher than a predetermined value, the locking of the machine.

Multi-modal approach to a secure and closed solution monitoring and control of user data
11509862 · 2022-11-22 · ·

A multi-modal portal system provides an authorization prior to establishing a visual interface connection between a support user or caller and a client user or receiving party. Once the caller is authorized, the caller is permitted to drop-in such that a visual interface connection is established with the receiving party. The authorization can be based on a profile configuration that indicates whether the caller has the credentials required for the visual interface. The authorization can require that a notification be sent to a trusted user or primary contact or the caller can be associated with a profile configuration that allows for a pre-authorization without requiring the notification. By providing such an authorization, a secure and private visual interface with the client user can be accomplished without requiring an express action or consent by the client user.

Multi-User Computer-Numerically-Controlled Machine

A method for accessing a computer-numerically-controlled machine can include receiving a command to be executed by the computer-numerically-controlled machine. A hardware state of a component in the computer-numerically-controlled machine can be determined by receiving, from the component, data indicative of the hardware state. An origin of the command including a user identification of a user who sent the command and/or a machine identification of a device that sent the command can be determined. Whether the computer-numerically-controlled machine is allowed to execute the command can be determined by applying a set of rules and based on the hardware state and/or the origin of the command. In response to determining that the computer-numerically-controlled machine is allowed to execute the command, the command can be executed at the computer-numerically-controlled machine.

SYSTEM AND METHOD FOR SUPPORTING OPERATIONS IN A RETAIL STORE
20170316190 · 2017-11-02 ·

A locator beacon (16) is configured to detect a nearby customer device (60), such as when a customer enters the store, and obtains identity information from the customer device (60). A server device (20) coupled to the locator beacon (16) receives the identity information and retrieves corresponding order information from an order database (28). At least one in-store device, such as a pair of wearable smart glasses (30a), is coupled to the server device (20) and is configured to receive the order information from the server (20) and display the order information to facilitate collection by the customer of one or more product items relating to the order.

Methods, Apparatuses, and Storage Mediums for Acquiring Legitimate Installation Packages

Methods, apparatuses, and storage mediums are provided for acquiring a legitimate installation package the field of computer technology. The method includes: acquiring characteristic information of a first installation package; sending the characteristic information to an authentication server; receiving a differential package fed back by the authentication server; and combining the differential package with the first installation package to obtain a legitimate installation package. The present disclosure solves the problem in the prior art that a user can only download a legitimate installation package of an application again to re-install the application when the user finds that malicious codes are implanted in an installed installation package of the application.

SETTING SYSTEM AND ELECTRONIC DEVICE
20220058246 · 2022-02-24 ·

A setting system comprises a first electronic device and a second electronic device. The first electronic device is configured to output information for the second electronic device. The second electronic device is configured to acquire the output information from the first electronic device and change a setting of the second electronic device on the basis of the output information. The first electronic device is further configured to automatically erase the information from a memory of the first electronic device after confirming that the second electronic device has acquired the information from the first electronic device.

Method, apparatus, and system for controlling a computer device through a mobile terminal

A control center receives a control instruction sent from a mobile terminal, forwards the control instruction to a computer device associated with the mobile terminal, and the computer device calls an execution module to execute the control instruction.

AMBULATORY MEDICAL DEVICE WITH THERAPY DATA SHARING VIA WIRELESS WIDE AREA NETWORK

Systems and methods presented herein relate to a method of sharing therapy data of an ambulatory medical device with a computing system of a networked computing environment. The computing system may be identified using an authorized system list that includes an address of approved computing systems. Using an address of an approved computing system, a direct end-to-end data connection may be established via a wireless wide area network. A public key of the computing system may be received permitting the ambulatory medical device to encrypt data to be transmitted to the computing system. The ambulatory medical device can transmit the encrypted therapy data to the computing system over the direct end-to-end data connection.