Patent classifications
G06F21/31
PARTNER INTEGRATION NETWORK
Systems and methods are provided for a media provider to allow a user to access media objects with a third-party partner that authenticates the user and authorizes the user to access certain media objects. The media provider offers access to media objects, such as video content or audio content. The partner, through a relationship with the media provider, similarly offers access to the media provider's media objects, for example, as a service or benefit to the partner's customers or users. In particular, a partner integration server mediates user authentication and authorization by the partner. The partner integration server also allows the media provider to easily and flexibly to add and integrate additional partners.
TRUSTABILITY ANALYZING SYSTEM, TRUSTABILITY ANALYZING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
A trustability analyzing system (100) includes: a friend list acquisition unit (111) configured to acquire, via a network, person attribute information of a holder of an account that is subject to determination; a friend information acquisition unit (112) configured to acquire, via the network, a list of friend accounts of the account that is subject to determination; an attribute information acquisition unit (113) configured to acquire, based on the list of friend accounts, information about the friend via the network; a person attribute estimation unit (121) configured to estimate, based on the information about the friends, person attributes of the holder of the account that is subject to determination; a distance calculation unit (122) configured to calculate a distance between the person attribute information acquired by the person attribute acquisition means and the person attributes estimated by the person attribute estimation means; and a trust level calculation unit (123) configured to calculate, based on the distance calculated by the distance calculation means, a trust level of the account that is subject to determination.
METHOD AND APPARATUS FOR AUTHENTICATING HANDWRITTEN SIGNATURE USING MULTIPLE AUTHENTICATION ALGORITHMS
According to the present disclosure, a handwritten signature to be authenticated is received, a plurality of pieces of signature behavioral characteristic information are extracted, all of the plurality of the pieces of the extracted signature behavioral characteristic information are applied to each of first and second signature authentication algorithms using different techniques to analyze a degree of matching between the received handwritten signature and a registered handwritten signature, results of analysis performed by the first and second signature authentication algorithms are combined to adjust a false rejection rate and a false acceptance rate, and whether handwritten signature authentication succeeds is finally determined.
SYSTEMS AND METHODS FOR PROVIDING A DIGITAL CONTENT ITEM TO AN AUTHORIZED USER
Systems and methods for providing a digital content item to an authorized user are described. A system for providing access to a digital content item comprises a network interface, a memory, and one or more processors, the one or more processors to process a user request to obtain a digital resource identifier corresponding to a user-requested digital content item; select a digital resource provisioning platform to provide the user-requested digital content item, the selection based on holdings availability data; generate a link to the user-requested digital content item on the selected digital resource provisioning platform based on one or more rules specific to the selected digital resource provisioning platform; and provide to the user's computing device the link to the user-requested digital content item on the selected digital resource provisioning platform, the link to navigate a user interface directly to a view of the digital content item responsive to a selection of the link.
DATA ISOLATION AND TWO-FACTOR ACCESS CONTROL
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.
ELECTRONIC APPARATUS AND METHOD FOR CONTROLLING ELECTRONIC APPARATUS
An electronic apparatus is provided. The electronic apparatus includes a microphone, a memory configured to store at least one instruction, and a processor configured to execute the at least one instruction, and the processor may be configured to, by executing the at least one instruction, obtain a first command set corresponding to a first user voice input through the microphone and execute the obtained first command set on a host operating system, based on a user command different from the first user voice being input while the first command set is executed, identify whether it is possible to execute the first command set on a virtual machine through a bridge module, and based on a result of the identification, execute a command on the virtual machine through the bridge module and execute an operation corresponding to the user command on the host operating system.
SECURE PUF-BASED DEVICE AUTHENTICATION USING ADVERSARIAL CHALLENGE SELECTION
A method comprises generating, during an enrollment process conducted in a controlled environment, a dark bit mask comprising a plurality of state information values derived from a plurality of entropy sources at a plurality of operating conditions for an electronic device, and using at least a portion of the plurality of state information values to generate a set of challenge-response pairs for use in an authentication process for the electronic device.
SECURE PUF-BASED DEVICE AUTHENTICATION USING ADVERSARIAL CHALLENGE SELECTION
A method comprises generating, during an enrollment process conducted in a controlled environment, a dark bit mask comprising a plurality of state information values derived from a plurality of entropy sources at a plurality of operating conditions for an electronic device, and using at least a portion of the plurality of state information values to generate a set of challenge-response pairs for use in an authentication process for the electronic device.
Methods and Electronic Devices Enabling a Dual Content Presentation Mode of Operation
A method in an electronic device comprises detecting, with one or more sensors, a geometry or geometric form factor of the electronic device. One or more processors then enable, in response to detecting the geometric form factor, a dual content presentation mode of operation allowing presentation of first content on a first display of the electronic device and second content on a second display where the first content and the second content are different.
CRAFTING EFFECTIVE POLICIES FOR IDENTITY AND ACCESS MANAGEMENT ROLES
Disclosed herein are system, method, and computer program product embodiments for preemptively evaluating whether roles are over-privileged within an (IAM) identity and access management system. Roles may be over-privileged when they are granted permissions to perform certain actions outside the scope granted to those roles. The evaluation occurs without submitting the certain actions to the IAM system and allows roles to be evaluated on a preemptive basis so that corrective actions may be taken to prevent unauthorized access to resources. Roles may be associated with policies which may each define different permissions for accessing resources. The evaluation may involve generating an effective policy from the policies associated with a role to provide a comprehensive view of all permissions associated with the role. The specified solution operates to generate an effective permission for accessing a resource and evaluating whether that effective permission is outside of a permissible scope of access for the role.