G06F21/31

SOFTWARE ACTIVATION CODE INVENTORY AND MANAGEMENT SYSTEM FOR AGRICULTURAL AND CONSTRUCTION EQUIPMENT APPLICATIONS
20180004498 · 2018-01-04 · ·

An activation code management system for a fleet of work vehicles includes a computing and data storage system to which vehicles in the fleet are connected for cellular data transmission. Each vehicle provides information regarding the activation codes operative thereon, and the information is compiled and reported by the computing and data storage system. The system also can obtain, retain and report actual usage of activated software.

DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING

The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.

TURING TEST VIA FAILURE

Current CAPTCHA tests are designed to be difficult for a bot and simple for a human-user to answer; however, as artificial intelligence improves, bots are more capable of using techniques such as optical character recognition to resolve current CAPTCHAs in similar manners as human-users. By providing a CAPTCHA challenge from a library or set of challenges that are designed in a manner that causes or likely causes a human-user to trivially get the answer to the challenge wrong, helps to confirm that a user is a human-user, as a bot would answer the challenge correctly.

TURING TEST VIA FAILURE

Current CAPTCHA tests are designed to be difficult for a bot and simple for a human-user to answer; however, as artificial intelligence improves, bots are more capable of using techniques such as optical character recognition to resolve current CAPTCHAs in similar manners as human-users. By providing a CAPTCHA challenge from a library or set of challenges that are designed in a manner that causes or likely causes a human-user to trivially get the answer to the challenge wrong, helps to confirm that a user is a human-user, as a bot would answer the challenge correctly.

CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM
20180013765 · 2018-01-11 ·

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information. The first authentication information may enable the social networking application to utilize a protected application programming interface call for the first social networking service and the second authentication information may enable the social networking application to utilize a protected application programming interface call for the second social networking service.

CROSS PLATFORM SOCIAL NETWORKING AUTHENTICATION SYSTEM
20180013765 · 2018-01-11 ·

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information. The first authentication information may enable the social networking application to utilize a protected application programming interface call for the first social networking service and the second authentication information may enable the social networking application to utilize a protected application programming interface call for the second social networking service.

SYSTEM AND METHOD FOR PROCESSING USER RIGHTS
20180013740 · 2018-01-11 ·

A system and method for processing entitlement rights are disclosed. The method, in one aspect, provides for storing content at a first time, receiving a request for playback of the content at a second time, and processing a user right associated with the content to authenticate the user right in response to the request for playback, wherein the user right is authenticated based upon a state of the user right at the first time.

PROTECTING PERSONAL INFORMATION UPON SHARING A PERSONAL COMPUTING DEVICE

In particular embodiments, a computing device may receive authentication information provided by a temporary user and retrieve personal information associated with the temporary user from a server using the authentication information. The device may present a personalized user interface on a screen of the computing device for the temporary user, the personalized user interface being generated based on the personal information. The device may detect a terminating event that indicates access to the computing device by the temporary user is to be disabled. The terminating event may be detected by determining that a biometric information associated with the temporary user is undetectable, or determining that the computing device is put down. In response to the detected terminating event, information associated with the temporary user may be removed from the computing device, and the computing device may be reverted to a default state.

PROTECTING PERSONAL INFORMATION UPON SHARING A PERSONAL COMPUTING DEVICE

In particular embodiments, a computing device may receive authentication information provided by a temporary user and retrieve personal information associated with the temporary user from a server using the authentication information. The device may present a personalized user interface on a screen of the computing device for the temporary user, the personalized user interface being generated based on the personal information. The device may detect a terminating event that indicates access to the computing device by the temporary user is to be disabled. The terminating event may be detected by determining that a biometric information associated with the temporary user is undetectable, or determining that the computing device is put down. In response to the detected terminating event, information associated with the temporary user may be removed from the computing device, and the computing device may be reverted to a default state.

AUTHENTICATION SYSTEM

A system for creating a combined electronic identification that obtains user information (202) about a user of a hardware device (100), authenticates the user from the user information (202), obtains a hardware profile (208) of the device (100), the hardware profile 208 comprising user generated data stored on the device (100) and links the user information (202) and the hardware profile (208) as a combined electronic identification. The hardware device (100) can be comprised of a main processor, memory, a touchscreen interface, and a wireless communication module, such as a mobile phone, computer, or tablet computer.