Patent classifications
G06F21/31
Techniques for repeat authentication
The invention provides an authentication technique that involves provision of a new authentication credential for each authentication attempt. The requestor of the new authentication credential is required to provide a previous authentication credential in order to successfully receive the new authentication credential. The previous authentication credential has however been de-authorised so it cannot be used to authenticate the requestor, only to successfully obtain a new authentication credential. The requestor then authenticates using the new authentication credential. The cycle is repeated for as many repeat authentication attempts as are made by the requestor.
Techniques for repeat authentication
The invention provides an authentication technique that involves provision of a new authentication credential for each authentication attempt. The requestor of the new authentication credential is required to provide a previous authentication credential in order to successfully receive the new authentication credential. The previous authentication credential has however been de-authorised so it cannot be used to authenticate the requestor, only to successfully obtain a new authentication credential. The requestor then authenticates using the new authentication credential. The cycle is repeated for as many repeat authentication attempts as are made by the requestor.
Pseudonym credential configuration method and apparatus
A pseudonym credential configuration method and apparatus are provided. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device.
Management apparatus and non-transitory computer readable medium for setting security levels of users in group resulting from unification
A management apparatus includes a memory, a unification policy setting unit, and a security level setting unit. The memory stores, for each of a user belonging to a first group and a user belonging to a second group, an authentication level of a domain assigned to a corresponding one of the users. The unification policy setting unit sets a unification policy that specifies a relationship between the authentication level and a security level for a state after unification. The security level setting unit sets the security level in a case where the first group and the second group undergo the unification into a third group. The security level is set for each of the users belonging to the third group by using the authentication level and the unification policy.
MANAGING INFORMATION ON A COMPUTER SYSTEM
The present disclosure generally relates to methods and user interfaces for managing information on computer systems. In some embodiments, methods and user interfaces for managing display of user interface elements based on movement of the computer system and requesting account information are described. In some embodiments, methods and user interface for provisioning an account onto a computer system are described. In some embodiments, methods and user interfaces for associating a transfer amount with an account are described. In some embodiments, methods and user interfaces for displaying user interface elements corresponding to transaction types are described. In some embodiments, methods and user interfaces for managing one or more pending loans are described. In some embodiments, methods for entering a numeric sequence are described. In some embodiments, methods for locking a computer system while entering a number sequence are described.
METHOD AND SYSTEM FOR A CONDITIONAL KEY STORAGE IN A HARDWARE RESOURCE MANAGER
A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.
METHOD AND SYSTEM FOR A CONDITIONAL KEY STORAGE IN A HARDWARE RESOURCE MANAGER
A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.
COMPUTER INTERFACES AND TECHNIQUES FOR PROTECTING SENSITIVE DATA
One example described herein includes a system that can provide a first graphical user interface (GUI) to a first user, the first GUI allowing the first user to input a first set of parameters for a record. The system can also provide a second GUI to a second user, the second GUI allowing the second user to add a second set of parameters into the record. The second graphical user interface may not display at least one parameter of the first set of parameters provided by the first user. The system can then obtain derived information, which can be generated based on the first set of parameters, the second set of parameters, and sensitive data of the first user. The system can then provide an indication associated with the derived information to the second user via the second GUI, without providing the sensitive data to the second user.
COMPUTER INTERFACES AND TECHNIQUES FOR PROTECTING SENSITIVE DATA
One example described herein includes a system that can provide a first graphical user interface (GUI) to a first user, the first GUI allowing the first user to input a first set of parameters for a record. The system can also provide a second GUI to a second user, the second GUI allowing the second user to add a second set of parameters into the record. The second graphical user interface may not display at least one parameter of the first set of parameters provided by the first user. The system can then obtain derived information, which can be generated based on the first set of parameters, the second set of parameters, and sensitive data of the first user. The system can then provide an indication associated with the derived information to the second user via the second GUI, without providing the sensitive data to the second user.
System and method for physiological feature derivation
The present disclosure relates to a device, method and system for calculating, estimating, or monitoring the blood pressure of a subject based on physiological features and personalized models. At least one processor, when executing instructions, may perform one or more of the following operations. A first signal representing a pulse wave relating to heart activity of a subject may be received. A plurality of second signals representing time-varying information on a pulse wave of the subject may be received. A personalized model for the subject may be designated. Effective physiological features of the subject based on the plurality of second signals may be determined. A blood pressure of the subject based on the effective physiological features and the designated model for the subject may be calculated.